Integration Frustration

Many of today's security systems and products integrate with each other, and thanks to end user demand, manufacturers have made integrating with multiple security products easier. But while product integration is a huge advantage to the end user, and manufacturers regularly provide lists of compatible products, it is important to understand how integrated two products really are.

For example, multiple fixed, PTZ and megapixel cameras integrate with various Security Management Systems (SMS) and Video Management Systems (VMS). Beyond connecting the camera to the system for viewing capabilities and recording formats, integration may also involve configuration and control. Most of these cameras have on-board features that allow users to change the configuration and control other aspects of the camera, such as PTZ control. A "complete" integration should allow users full access to all of the camera features through the connection to a system. In other words, by logging into an SMS or VMS software application the integration should allow for full access. Some SMS and VMS providers make their own cameras, so it stands to reason that their cameras should be "completely" integrated with their SMS or VMS. But what about third party cameras?

The level of integration of products typically depends on the manufacturer that is primarily responsible for developing the integration. Because of the following reasons, some products are not fully integrated:

  • Proprietary issues
  • Some features are not capable of integration
  • Selective features only
The user, therefore, doesn't receive the full benefits of some products. The following is a list of questions that should be answered when trying to determine the integration of products:
  • What are all of the features of the product?
  • Which manufacturer is primarily responsible for developing the integration? (e.g. camera manufacturer or SMS manufacturer?)
  • Which of the features are included or not included in the integration?
  • Is there any other degradation to the product and its features as a result of the integration?
By reading all of the documentation, conducting a little extra research and asking questions, the product integration can be better understood.

About the Author

Darren Nix is a senior associate at Risk Management Associates, Inc.

Featured

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3