The Open-Standards Solution

Perhaps the most exciting aspect of security’s convergence with information technology is the arrival of open standards. For far too long, security systems have been dominated by proprietary equipment. This constrained the scope of product choice and limited what users could achieve with their security systems.

Open standards aim to eliminate those constraints. By freeing users to choose what they want and how they want their systems to work together, standards not only lower costs but improve security operations.

Getting there will not be easy. Two major challenges exist: First, almost all large organizations have significant deployments of legacy systems that are generally quite proprietary. Designing them into an open standards-based system is difficult. Second, while security systems, large and important gaps exist that have an impact on system designs.

While these gaps are slowly closing, they need to be factored in.

What’s A Standard
A standard is a way of doing things that all parties agree to follow. The width of highway lanes is an example. All municipalities use the same width. In the famous Seinfeld episode when Kramer decides to widen the lanes for “comfort cruising,” the result is not only comedy but obviously chaos for drivers.

Unfortunately, today’s security systems can often resemble Kramer’s approach.

In IT, one of the most important standards is the Internet Protocol. IP ensures that any message sent from any computer can be received by another computer using IP. And since essentially every computer uses IP today, it ensures they can all communicate together. IP is the key element in allowing all security systems to use a single communication system.

IP makes sure the message is delivered but it does not guarantee that the message can be understood. It has often been compared to the postal system. If you follow the correct format for addressing and stamping a letter, your intended recipient will get it. However, if your letter is in a language that the recipient does not understand, you have a problem.

So while IP is great for moving information across networks, you still need a standard to ensure the information can be understood.

This is true whether you are speaking to a friend or your access control system is sending requests to your video surveillance system.

Unfortunately, today no standard exists for one security system to speak to another. A movement is now under way to rectify this problem, but it will take at least a few years to deliver widely adoptable standards.

We definitely can benefit from IP as a fundamental standard, but we have to work around the lack of a standard for sharing information between our security systems.

Being Open
All is not lost, because even without an information- sharing standard, if manufacturers decide to open up, we can design and deliver open systems that significantly improve security operations.

Returning to the analogy of the letter written in another language, the sender can include a dictionary (like those pocket Spanish-to-English ones) to overcome the lack of a standard way to communicate.

Then the recipient can translate and understand the letter. For software systems, including those tools is becoming common in security: such a dictionary is called a software development kit.

Even if a system does not adhere to a standard, an SDK can allow systems to be open to one another. If you can access the SDK of your video surveillance system, you may be able to get it to communicate with your intrusion detection system so they can work together, say, to display live video of a burglar who triggers a motion sensor.

In this fashion, any system can be “open.” It’s the manufacturer’s choice to develop and provide an SDK so its products can work with other products. Using IP as a standard and obtaining SDKs to open communication between security systems is one way to design open standards-based systems.

All Together Now
The ultimate goal of open standards-based designs is to make all systems work together to reduce costs and improve the effectiveness of security operations.

Three general approaches exist. In each approach, a different system acts as the hub to manage and coordinate all the other security systems. While they all take advantage of openness and use SDKs, they differ in how they communicate with other systems. They provide various levels of functionality and power at different costs and complexity.

PSIM as the Hub. The most elegant yet costly approach is to deploy a physical security information management application to integrate and manage all existing security systems. The PSIM application is designed to work with dozens of different manufacturers’ video, access, fire and intrusion systems. Even more importantly, PSIM applications are generally developed by independent manufacturers who are not motivated to promote any vendors’ products.

As such, PSIM vendors strive to support as many systems as possible, maximizing the probability that all of your legacy systems will work with your new systems.

PSIM is a growing segment with a number of early stage companies. Among the most well known are CNL, Proximex, Orsus and Vidsys. Because they are all young companies, you should carefully check references and conduct due diligence on the overall cost and complexity of implementing any of their products in your organization.

The PSIM application becomes the front end for your security operators. It gathers information from all of your security systems and displays them in a common operating picture. The PSIM also allows rules to be defined to help operators quickly and effectively respond to security incidents.

The PSIM application is deployed on a server in your network and communicates with your security systems. Using SDKs, the PSIM vendors write adapters to speak with your security systems. Often, they are already available. However, sometimes the PSIM vendor will have to build an adapter to support your specific type of system.

The chief downside is that it can potentially cost millions of dollars to build an effective PSIM-based solution.

Access control as the hub. The most traditional way to integrate security systems is to use your existing access control system as the information hub. For years, access control systems have been providing support to communicate with fire, intrusion and video systems. Your access control system becomes the main user interface for your security operators.

Almost all access control vendors, including AMAG, General Electric, Honeywell, Software House and Lenel, provide integration to a variety of security subsystems.

Your first step should be to talk with your existing access control vendor about what specific functionalities and third-party systems they support.

Using your access control system is less flexible but also is less expensive than a PSIM application. Access control systems tend to support a limited number of security systems. They also tend to favor systems that the access control system vendor manufacturers.

Either of these elements could block you from building an open solution that integrates all of your systems. However, on the positive side, using your access control system is generally fairly inexpensive and can be accomplished for $10,000 to less than $100,000.

Video management as the Hub. An emerging approach is the use of your video management system as the information hub to connect all of your security systems. None of these offerings are very sophisticated, but if you only need very limited integration (say, only with your access control system), using the video management system as the hub could provide a very user-friendly and inexpensive means for integration.

The video management vendors most focused today on providing PSIM-type functionalities include OnSSI, Verint and VideoNext.

The Future
Today, designing open standards-based systems requires some compromises and costs to accommodate the limited openness of the security systems available.

The good news is that the pressure and the momentum for openness are accelerating.

Expect actual standards for security applications to significantly simplify and reduce the costs of designing open standards- based systems in the next three to five years.

In the meantime, ensure your systems run on IP networks and strongly consider which of the three options presented provide the highest value for you.

Featured

  • 2025 Gun Violence Statistics Show Signs of Progress

    Omnilert, a national leader in AI-powered safety and emergency communications, has released its 2025 Gun Violence Statistics, along with a new interactive infographic examining national and school-related gun violence trends. In 2025, the U.S. recorded 38,762 gun-violence deaths, highlighting the continued importance of prevention, early detection, and coordinated response. Read Now

  • Big Brand Tire & Service Rolls Out Interface Virtual Perimeter Guard

    Interface Systems, a managed service provider delivering remote video monitoring, commercial security systems, business intelligence, and network services for multi-location enterprises, today announced that Big Brand Tire & Service, one of the nation’s fastest-growing independent tire and automotive service providers, has eliminated costly overnight break-ins and significantly reduced trespassing and vandalism at a high-risk location. The company achieved these results by deploying Interface Virtual Perimeter Guard, an AI-powered perimeter security solution designed to deter incidents before they occur. Read Now

  • The Evolution of ID Card Printing: Customer Challenges and Solutions

    The landscape of ID card printing is evolving to meet changing customer needs, transitioning from slow, manual processes to smart, on-demand printing solutions that address increasingly complex enrollment workflows. Read Now

  • TSA Awards Rohde & Schwarz Contract for Advanced Airport Screening Ahead of Soccer World Cup 2026

    Rohde & Schwarz, a provider of AI-based millimeter wave screening technology, announced today it has won a multi-million dollar award from TSA to supply its QPS201 AIT security scanners to passenger security screening checkpoints at selected Soccer World Cup 2026 host city airports. Read Now

  • Brivo, Eagle Eye Networks Merge

    Dean Drako, Chairman of Brivo, the leading global provider of cloud-native access control and smart space technologies, and Founder of Eagle Eye Networks, the global leader in cloud AI video surveillance, today announced the two companies will merge, creating the world’s largest AI cloud-native physical security company. The merged company will operate under the Brivo name and deliver a truly unified cloud-native security platform. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities