The Trend of Change

Education will play large role for integrators needing to keep pace with convergence

CHANGE will continue to be the biggest the biggest trend in the security industry well into 2008. Enterprise security management systems are becoming larger and more integrated. Multi-level convergence is occurring in logical security, IT, data, access control and integrated components. Video management and access control are forming an integrated security management system. The future is leading the industry toward an integration platform that involves access control, video, audio, building control, intrusion and fire protection.

Traditional access control manufacturers are on the forefront in producing new platforms which will be in great demand because of usability. These deeply integrated platforms allow the user to operate previously disparate systems from one common user interface without having to jump from system to system. For instance, multiple video systems from disparate manufacturers can be integrated and operated on one user interface with a common look and feel. Add to this video the overlay of alarms and events in one user-friendly interface. Functionality will be greatly enhanced, and training will be simplified to learning the basic operation of one integrated system.

Today, a security director can easily access and control pertinent information and commands, including alarms and video from remote locations such as from a home. These technological advances will not only be available in large, complex enterprise-level systems, but also in the small-business system where the user will choose desired system functionalities. Systems will become more open in architecture.

Living on the Edge
The industry is moving away from DVRs to IP cameras and encoders. Edge devices now exist which provide a flexible video management hardware platform for organizations moving toward digital video. Professional video server options enable customers to integrate existing analog CCTV systems into an IP-based solution, so a company can acquire all the benefits that digital technology offers without reinvesting in a new system. These IP-based solutions work with old and new technology including DVRs, IP and analog cameras on the same system. Video and access control integration allows recording based upon alarms and defined events. Video can be stored at the edge and only forwarded across the network upon an alarm or predefined event, or during non-peak network hours, helping to optimize a network.

Now, video can be tagged both before and after an alarm is triggered, when the system is recording or buffering. A truly integrated system also can tag alarms from other systems such as intrusion detection, building management and visitor management.

The fledgling, but rapidly growing, video analytics field will be a disruptor in the security space in coming years. There was a taste of it at ISC West in March, as more companies entered the analytics arena with native solutions. Operators are unlikely to spot incidents when there are many camera views. Intelligent video analytics turns video into a proactive tool, creating an extra layer of security for the organization. The demand for advanced analytics will increase as users understand the benefits of the technology, the costs of ownership diminish and internal applications become apparent.

A Critical Puzzle Piece
Integrators are being pushed by new requirements demanding IT or IP expertise for installation and service. These new requirements are quickly becoming the norm as security decisions are being significantly impacted by IT departments. Integrators are facing an expensive quandary, struggling to acquire the skill and proficiency demanded by the new technologies and network infrastructure. Change is becoming standard business in the industry, and successful integrators will either bring the necessary IT talent on board or will partner with companies with the expertise already on-hand.

Some IT companies are looking at the security space as a market to enter and grow business. This may prove to be a threat to the security integrator who is lacking IT expertise.
Education is a critical piece of the puzzle. Becoming educated in order to successfully install and support a system is commonplace, but the way to accomplish such training is by change. Options such as Internet-based learning tools and Web-based alternatives, are becoming available and attractive. Online training provides an alternative means to traditional training. Technicians can choose the appropriate timeframe to take online training classes so there is minimal downtime in the field. Integrators can educate more staff without sending their technicians to an offsite facility, thereby eliminating many travel-related expenses. The technician has the ability to review the course work prior to an installation, thereby refreshing his or her memory with up-to-date, pertinent course material.

The ever-changing security industry will not disappoint in 2007. Manufacturers, integrators, IT professionals and users will need to adjust accordingly to the continuing trend in the use of IP technology and the consolidation within the industry.

Education remains a key ingredient to success, and companies are providing convenient, cost-effective education solutions. Multi-level convergence with deeper integration across an open platform provides the solution today’s savvy end users demand.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3