What Makes a Good Integrator?

Professionalism and teamwork are key to successful projects

As security consultants, we are tasked with everything from creating a security program to recommending an integrator with whom clients can form a good relationship for all their security equipment needs.

This article is written specifically from the viewpoint of how to suggest a good integrator. Security consultants must ask themselves this basic question:

“Is this integrator going to perform professionally?” In this case, professionally means quite a few things. It breaks down the integrator’s competency into several key parts:

  • Can the integrator appreciate the consultant’s role, work as a team member to execute this project efficiently and be ready for the next one?
  • Can the integrator keep the scope, schedule and budget in focus?
  • Can the integrator communicate appropriately with the client?
  • At the end of the job, what will the client tell me about this integrator?

I have gathered these criteria from two sources: My 22 years in the industry, and direct experience working with good and bad integrators. I was an integrator for 12 years before becoming a consultant 10 years ago. When all of the above questions were answered with a yes and the last one with a thank you, my experience with the integrator was good. My experiences with bad integrators went like this: They couldn’t keep a schedule to save their lives; they couldn’t perform the work without whining about having to do each task or about having a consultant design the installation differently than they would have done it, regardless of the enhancement to the system’s serviceability; and they completely down-talked and badmouthed the consultant to the client as an unnecessary role.

Only one of these bad experiences resulted in a client discontinuing the use of the consultant (though the client later realized the specific, necessary role of the consultant), while all the other times the client did not want to use the integrator either to finish the project or for any future work in the agency/organization.

There are three mandatory roles in a security installation project: The consultant has to design the system or the criteria appropriately to the client’s needs, calling out specific security equipment and installation methodologies. The manufacturer must provide a support role to the integrator in a presales, during-sales and during-project process.

The integrator must install the security system(s) as designed in a neat, clean, trouble-free atmosphere, remembering that the key phrase to a successful project is smooth and easy.

If unforeseen problems arise warranting change orders, then put the information forth as soon as possible with a cause-and-effect statement. This makes any transition smooth and easy. If problems arise and something goes wrong (damage to a facility, complaints from client staff), own it -- and bring it to the consultant and client as soon as possible, explaining what happened and the remedy you took. The examples could go on and on, but you should get the point by these few.

It is easy to perform a project as an integrator working with a consultant from the client side if you can answer positively to all of the bullet points above and if you handle things with a smooth and easy approach throughout the project.

This article originally appeared in the March 2011 issue of Security Today.

About the Author

Charlie Howell is an independent security consultant in Northern California.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.