Learning the Language of Security Integration

Learn the true definition of systems integration and the craft’s three distinct levels.

This gives users access to real-time or recorded surveillance video, control data, door status and other information. Anyone who has the proper authorization can do this from anywhere inside a building, as well as remotely via Web-enabled mobile devices. Integrated security platforms can include environmental control and energy management, but not at the level of sophistication found in the high-level integrated systems discussed in our forthcoming section.

High-Level Integration: Systems Integrators

The security professional employed for high-end integrated systems is the systems integrator. The systems they create are data-driven, data-hungry and quite able to communicate with more than just security-related devices.

To qualify for this level of involvement the integrator usually, but not always, has a team of software developers capable of creating drivers, middleware and application protocol interfaces (APIs) that seek to marry dissimilar subsystems together. Where systems integrators create their own customized, coded products, security integrators usually outsource them to equipment manufacturers and third-par-ty vendors, like Setterbo’s company.

Integration at this level usually involves more than just security. In fact, in many cases security is absorbed into a much larger system that often includes network-based telephone systems, manufacturing processes, the monitoring of assembly lines and conveyors with video, and others associated with their business. And in the near future, with the advent of the Internet of Things (IoT), there will be virtually no end to what might be included in the mix.

Mark Laude, president of Integrated Security Solutions, says his company qualifies for and routinely performs work at all three integration levels, depending on the customer’s needs and contract requirements. An example of a midlevel system, Laude says, would be a single vendor ACS/IDS integration. An example of a high-level system would be a cross-platform integration of ACS/IDS and video surveillance systems.

“An even more advanced level of integration would involve implementation of a mid- or high-level system with se-cure external network connections to a third-party databases or clearing house, such as the Federal Bridge [Certificate Authority] for access control identity and credential management,” he says.

Security integrators also work at this level, but they are forced to subcontract the code-writing portion of the job to outside contractors, such as middleware and custom drivers.

“I believe our role is to not put our customer into a position where we create these unique technologies that are not supported by the various manufacturers,” says Brecher. “We do have specialized teams who can write code, but we work with our partners to assure compliancy.”

Data Is the Founda
tion of Systems Integration

Data is the foundation that fuels systems integration today. Using data, integrators are able to control room temperature using occupancy, thereby increasing or decreasing it accordingly. This is accomplished using time-and-attendance data from the access control system.

“We can step up the HVAC when a certain number of people are in the building,” says Brecher. “We take real-time data from the access control system and we use it to control the environment in the building.”

Another example is lighting control. Traditionally, security dealers and security integrators provide on/off control of lights through real-time data as people come and go throughout the building. Dimming and brightening lights also can be achieved through scheduling these events, sometimes combined with real-time occupancy data. Systems integrators, however, can take all of this another step by using analog light level sensors in conjunction with the right lighting controller.

This enables an even more detailed response when light intensity data is saved over a long period of time. In this case, it is possible to fine tune the system’s response based on the demand for lighting depending upon the day of week, week of year, among other factors. For example, lights in specific rooms and hallways can be brightened and dimmed based on room light intensity, not only occupancy. This is accomplished by detailed, in-depth analysis of all this data.

No matter whether you are a security dealer or a security integrator, taking that first step toward becoming a full-blown systems integrator is never easy. However, the final result is worth the effort because of the additional income your firm will realize in the long term by having done so.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

Tagged with: Systems Integration

About the Author

Contact:

Al Colombo is a long-time trade journalist and professional in the security and life-safety markets. His work includes more than 40 years in security and life-safety as an installer, salesman, service tech, trade journalist, project manager,and an operations manager. You can contact Colombo through TpromoCom, a consultancy agency based in Canton, Ohio, by emailing [email protected], call 330-956-9003, visit www.Tpromo.Com.

Security Is Our Business, Too

For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Commercial Integrator + Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add to your bottom line.

A FREE subscription to the top resource for security and integration industry will prove to be invaluable.

Subscribe Today!

Get Our Newsletters