The Open-Standards Solution

Perhaps the most exciting aspect of security’s convergence with information technology is the arrival of open standards. For far too long, security systems have been dominated by proprietary equipment. This constrained the scope of product choice and limited what users could achieve with their security systems.

Open standards aim to eliminate those constraints. By freeing users to choose what they want and how they want their systems to work together, standards not only lower costs but improve security operations.

Getting there will not be easy. Two major challenges exist: First, almost all large organizations have significant deployments of legacy systems that are generally quite proprietary. Designing them into an open standards-based system is difficult. Second, while security systems, large and important gaps exist that have an impact on system designs.

While these gaps are slowly closing, they need to be factored in.

What’s A Standard
A standard is a way of doing things that all parties agree to follow. The width of highway lanes is an example. All municipalities use the same width. In the famous Seinfeld episode when Kramer decides to widen the lanes for “comfort cruising,” the result is not only comedy but obviously chaos for drivers.

Unfortunately, today’s security systems can often resemble Kramer’s approach.

In IT, one of the most important standards is the Internet Protocol. IP ensures that any message sent from any computer can be received by another computer using IP. And since essentially every computer uses IP today, it ensures they can all communicate together. IP is the key element in allowing all security systems to use a single communication system.

IP makes sure the message is delivered but it does not guarantee that the message can be understood. It has often been compared to the postal system. If you follow the correct format for addressing and stamping a letter, your intended recipient will get it. However, if your letter is in a language that the recipient does not understand, you have a problem.

So while IP is great for moving information across networks, you still need a standard to ensure the information can be understood.

This is true whether you are speaking to a friend or your access control system is sending requests to your video surveillance system.

Unfortunately, today no standard exists for one security system to speak to another. A movement is now under way to rectify this problem, but it will take at least a few years to deliver widely adoptable standards.

We definitely can benefit from IP as a fundamental standard, but we have to work around the lack of a standard for sharing information between our security systems.

Being Open
All is not lost, because even without an information- sharing standard, if manufacturers decide to open up, we can design and deliver open systems that significantly improve security operations.

Returning to the analogy of the letter written in another language, the sender can include a dictionary (like those pocket Spanish-to-English ones) to overcome the lack of a standard way to communicate.

Then the recipient can translate and understand the letter. For software systems, including those tools is becoming common in security: such a dictionary is called a software development kit.

Even if a system does not adhere to a standard, an SDK can allow systems to be open to one another. If you can access the SDK of your video surveillance system, you may be able to get it to communicate with your intrusion detection system so they can work together, say, to display live video of a burglar who triggers a motion sensor.

In this fashion, any system can be “open.” It’s the manufacturer’s choice to develop and provide an SDK so its products can work with other products. Using IP as a standard and obtaining SDKs to open communication between security systems is one way to design open standards-based systems.

All Together Now
The ultimate goal of open standards-based designs is to make all systems work together to reduce costs and improve the effectiveness of security operations.

Three general approaches exist. In each approach, a different system acts as the hub to manage and coordinate all the other security systems. While they all take advantage of openness and use SDKs, they differ in how they communicate with other systems. They provide various levels of functionality and power at different costs and complexity.

PSIM as the Hub. The most elegant yet costly approach is to deploy a physical security information management application to integrate and manage all existing security systems. The PSIM application is designed to work with dozens of different manufacturers’ video, access, fire and intrusion systems. Even more importantly, PSIM applications are generally developed by independent manufacturers who are not motivated to promote any vendors’ products.

As such, PSIM vendors strive to support as many systems as possible, maximizing the probability that all of your legacy systems will work with your new systems.

PSIM is a growing segment with a number of early stage companies. Among the most well known are CNL, Proximex, Orsus and Vidsys. Because they are all young companies, you should carefully check references and conduct due diligence on the overall cost and complexity of implementing any of their products in your organization.

The PSIM application becomes the front end for your security operators. It gathers information from all of your security systems and displays them in a common operating picture. The PSIM also allows rules to be defined to help operators quickly and effectively respond to security incidents.

The PSIM application is deployed on a server in your network and communicates with your security systems. Using SDKs, the PSIM vendors write adapters to speak with your security systems. Often, they are already available. However, sometimes the PSIM vendor will have to build an adapter to support your specific type of system.

The chief downside is that it can potentially cost millions of dollars to build an effective PSIM-based solution.

Access control as the hub. The most traditional way to integrate security systems is to use your existing access control system as the information hub. For years, access control systems have been providing support to communicate with fire, intrusion and video systems. Your access control system becomes the main user interface for your security operators.

Almost all access control vendors, including AMAG, General Electric, Honeywell, Software House and Lenel, provide integration to a variety of security subsystems.

Your first step should be to talk with your existing access control vendor about what specific functionalities and third-party systems they support.

Using your access control system is less flexible but also is less expensive than a PSIM application. Access control systems tend to support a limited number of security systems. They also tend to favor systems that the access control system vendor manufacturers.

Either of these elements could block you from building an open solution that integrates all of your systems. However, on the positive side, using your access control system is generally fairly inexpensive and can be accomplished for $10,000 to less than $100,000.

Video management as the Hub. An emerging approach is the use of your video management system as the information hub to connect all of your security systems. None of these offerings are very sophisticated, but if you only need very limited integration (say, only with your access control system), using the video management system as the hub could provide a very user-friendly and inexpensive means for integration.

The video management vendors most focused today on providing PSIM-type functionalities include OnSSI, Verint and VideoNext.

The Future
Today, designing open standards-based systems requires some compromises and costs to accommodate the limited openness of the security systems available.

The good news is that the pressure and the momentum for openness are accelerating.

Expect actual standards for security applications to significantly simplify and reduce the costs of designing open standards- based systems in the next three to five years.

In the meantime, ensure your systems run on IP networks and strongly consider which of the three options presented provide the highest value for you.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3