What is the real significance of system integrations? A survey on this topic would yield a multitude of perspectives. Some may assert that the role of a systems integrator is to unify all components from a security standpoint, ensuring they function together harmoniously.
I believe that the essence of integration lies in guaranteeing that all elements—such as locking hardware, surveillance cameras, access control systems, fire safety measures, the Internet of Things (IoT), building automation systems and in certain instances, audiovisual systems—work seamlessly within a singular framework.
How does one achieve such a formidable task? This prompts me to write this article.
The challenge arises from the fact that access control system integrators do not all operate in the same manner. Most integrators tend to focus on maglocks and electric strikes, which may lack aesthetic appeal yet are effective.
Conversely, some integrators tend to steer clear of electromechanical locks or electrified locksets, often due to discomfort with the hardware aspects of the project, insufficient knowledge, lack of expertise, or a deficit in confidence to address these tasks.
The Role of Systems Integrators
During site surveys, one often encounters various systems installed within a single building, which leads to miscommunications, cabling complications, and a lack of centralization, while the objective is to consolidate everything under one umbrella. It is widely acknowledged that numerous buildings house as many as twelve disparate systems, which stifle communication and hinder productivity.
From an infrastructure standpoint, when a system integrator collaborates with a large organization involving multiple teams during the planning phases, the process can become more streamlined if all parties are informed and poised to make appropriate decisions.
For example, if the HR department, IT department, facilities management, and public safety team collaborate
and share their concerns, this will empower the system integrator to bridge gaps and advise on a system that aligns with stakeholders’ expectations, thereby enhancing communication and efficiency.
In instances where system challenges occur, particularly when installation is improper and components are not centralized, blame may fall on IT, or the locksmiths or the integrators involved in resolving the issue. Hence, it is crucial to have a singular system managing access control.
However, we do not operate in an ideal environment. Not all organizations function in this manner, and departments often operate in silos, lacking communication and collaboration. Consequently, the burden falls upon the system integrator, whose responsibility is to orchestrate an effective solution.
Crafting a comprehensive plan that identifies all relevant stakeholders and fosters early collaboration is vital, emphasizing the importance of unified objectives. The scope of work is critical to ensuring that all parties comprehend what is at stake.
We must ensure that IT personnel are equipped with the appropriate resources and informed regarding protocols and regulations related to physical security, access control, and building codes. The information technology (IT) field encompasses vast specializations and understanding the strengths and limits of one’s team is paramount.
Bringing Everything Together
How do you ensure the right systems are provided to your clients? What resources are available to enhance your capabilities as a systems integrator? Having spent years in this industry, I have witnessed the evolution of access control systems firsthand.
I collaborate with locksmiths and integrators and observe overlap and opportunities; locksmiths excel in hardware installation, well understand their roles, and are cognizant of prevailing changes in the industry. Today, we have
smart locks, standalone access control devices, master key systems and strictly mechanical access control locks, among others.
Meanwhile, integrators are increasingly addressing client needs that necessitate these installations. There exists potential for partnership: integrators install power supplies, control panels, run cabling, set up card readers, cameras, fire panels, door controls and audiovisual systems, while locksmiths focus on the hardware aspects, including strikes, electrified locks and more.
Additionally, certain facets of installations may necessitate that a systems integrator outsource components or engage a consultant to ensure optimal outcomes. If there is a need for external expertise, I advise your organization to consider it.
Systems Integrators at the Table
Regarding IT, which was previously discussed as often the best option for managing access control—while generally valid—it’s essential to recognize that IT departments vary significantly in their approaches. Understanding their contributions is vital and will assist in alleviating issues as they arise.
Another avenue for enhancement is through training; many lock manufacturers offer complementary training tailored to their products. Integrators should take advantage of these opportunities to advance their employees’ skills and competencies.
Although numerous trade shows are organized throughout the year, integrators often do not participate. There are also short courses available for individuals looking to advance their careers. Additionally, the generational
gap poses a challenge, as many individuals may feel uncomfortable with changes primarily
aimed at the younger, tech-savvy generation.
Concurrently, manufacturers and distributors of security systems provide similar complimentary training to enhance the industry’s expertise and support integrators and locksmiths in handling various projects.
Companies including Axis Communications, Avigilon and Gallagher Security offer certifications to help locksmiths become more acquainted with the technological aspects of access control, including understanding IP address settings and factory default procedures, among other essential skills.
By pursuing these educational opportunities, integrators and locksmiths can refine their skill sets and knowledge, enabling them to adapt to the ongoing evolution in security—from mobile credentials to cloud-based systems and biometric solutions.
Step outside your comfort zone and seek out the resources essential for realizing your full potential as a system integrator. We all require assistance, and the most effective support is readily available once you can recognize it.
During an event in Boston, a panelist was posed a question regarding collaboration, and he articulated his response superbly; this is my interpretation of his message: Individuals should maintain a roster of professionals, akin to a starting five in basketball. This roster should include a project manager or consultant, IT personnel, integrators/locksmiths, lock and security manufacturers, and clients.
Having these key individuals in your network is crucial for ensuring your success.
Cybersecurity continues to pose a significant threat to this industry, and we must prioritize delivering exceptional service to our clients while ensuring the protection of lives and assets
Eddy Dacius is the co-owner of Dacius Facilities Management Inc.












