With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services.

Online Exclusive: ‘Integrated Security’ – Not Just an Industry Buzzword

With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services.

As the evolution of the “Internet of Things” reaches its zenith, the world demands that anything that can be connected should be connected. In this new age, technology has become the raw material that makes up the foundation of nearly all of our most precious business functions.

With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services. What comprises “integrated security?” An internet search might lead you to a few companies; however, like many other marketable phrases in our industry, “integrated security” doesn’t retain a standard definition. And it shouldn’t.

As the marketable phrase might suggest, “integrated security” implies an assimilation of different security services. And that definition would be correct, albeit incomplete. Depending on which organization you’re engaging with, the security services offered may vary from company to company. So how do you determine what services to integrate, and who to speak with about it?

Initially, one must understand the benefits of any type of integration. Your smartphone is an excellent example. Today, a typical smartphone provides an array of services. Its primary function is to provide a working mobile phone solution for calls and text messages. As a secondary function, it provides a slew of other uses. Access to apps, email, Internet, and a camera just to name a few. It incorporates many useful tools into one efficient device that can be more easily accessed, maintained, and controlled than if they were separate from each other. It offers an integration of useful tools in much the same manner that the multi-tool delivers to the outdoorsman. The strategy of pairing services together to create efficiencies isn’t new. But as technology improves it becomes more and more effective.

The data most imperative to recognize is the method by which organizations can begin to integrate different security services into their overarching physical security blueprint. As with all technology, there are two primary components: the user and the tool. Many organizations make a mistake by only focusing on the tool (i.e. – what inherent value will this bring our security function?). But it is just as important to respect users, and how technology will affect their role and daily operation. This applies not only to executive oversight, but also to the part-time security officer. When commencing a strategy to integrate security services, it’s essential to understand what services yield the most value through assimilation.

What to Integrate

Determining what to integrate is like catching a ball: it’s important to keep your eyes on the objective. At the same time, it’s valuable to keep your mind open to new solutions you may not have considered or otherwise known of. Physical security is generally comprised of two key elements: manpower and technology. I recommend the first area every organization should examine is how technology may impact its manpower. Something as simple as remote managed door access control can save an organization with a national footprint millions of dollars in labor that would otherwise be physically inspecting and locally controlling access. Thus, it’s valuable to consider where technology can impact or augment security labor. Second, maximize your understanding of the core technologies: video surveillance, access control, intrusion/fire & life safety/smoke alarms, incident management, situational & risk awareness tools, and managed remote monitoring.

Real-Time Focus

The aim should be to understand the fundamental value each piece of core technology can bring to your entire security design. Identify areas where the technologies benefit from each other, specifically in their real-time application. For example, video and access control nearly always work in tandem. When monitored, the two become a more effective tool than just the one. Layer in two-way audio, and you can completely control an access point in real time without the need for a full-time officer. Real-time incident reports coupled with a full security operations center creates an improved capability to modify security protocols in real time on a national or global level. GPS fleet or asset tracking combined with a risk visualization tool and managed remote monitoring grants real time, actionable intelligence for modification to any security risks that may arise.

Identify Duplicate Services

Perhaps most significant is to pinpoint areas where core security technologies can integrate with manned security operations for enhanced responsiveness. To use an example, imagine an office complex that deploys several dedicated security officers throughout the day—one of which is fully devoted to oversight of their video and access control monitoring. This example is one our organization has encountered several times. Through integrating cameras with video analytics and access control, together with a well-designed, remote security operations center, and deploying the remaining onsite security officers with smartphones, we were able to increase our client’s situational intelligence and responsiveness to incidents while also yielding cost savings to the customer’s annual spend. On demand reports, such as incidents that occur on property (place, date/time, protocol initiated) or number of visitors to the building became valuable resources for both onsite security personnel and operational oversight to make adjustments proactively. Many core technologies when properly deployed are duplicates of some day-to-day security officer operations. When duplicate services are identified, eliminate or reduce the technology or manned security operation that can be replaced.

Making the Right Connection

With ISC West just around the corner, end users and security organizations alike will be on the lookout for new innovations and compatible partnerships. While each year produces additional technologies and recommendations, take the time to also gather information on how existing services can be paired with like services. In many cases, it won’t require a complete redesign of security operations or the need of a fancy operations center. As mentioned earlier, sometimes it can be as simple as changing the locks.

As a rule of thumb, use the size of your operation as a good gauge to determine what type of security organization to examine for integrated services. Are their multiple properties in multiple states under your leadership with a need for strategic implementation of security services? If so, I would recommend looking for a provider that can offer blended services, hybrid solutions, and a multitude of integrated services. Within these organizations should be subject matter experts or consultants that spend their time specifically working with large customers on maximizing the effectiveness of security operations through integrated services. This isn’t to say that smaller providers or one-off vendors cannot be of value to larger operations. They certainly can. However, for most large organizations there is an intrinsic value in having “one throat to choke” by consolidating vendors.

On the other hand, smaller organizations have more flexibility to play the field. The large, one-stop shops will add value, but with so many customers, they sometimes lack the ability to provide dedicated service to smaller companies. Small business owners know only too well the gentle dance of balancing your commitment to safety, and your commitment to your balance sheet. But the bottom line always starts with first understanding your needs.

Decision Making

Overwhelmingly, security decisions are no longer being made solely by the security division of an organization. Corporate departments collaborate more on decisions about security – and it’s no longer just the accounting department, but procurement, human resources, legal and operations. In many corporations decisions pertaining to security will impact each one of these departments. Thus, with so many cooks in the kitchen and so many dollars on the table, it becomes imperative to eliminate duplicate services to maximize efficiency. End users should focus on the opportunities that will best allow them to systemize their security process and leverage current resources. Likewise, security organizations need to broaden their conversations with end users. It isn’t just selling a camera or an hour of operation per week anymore. It’s being able to assess the big picture and cast a strategy that multiple departments can understand and evaluate. If the organization you’re engaged with cannot provide that level of discussion, don’t make a decision. Keep looking. Your balance sheet, and the safety of your people and assets are worth it. In the context of making a decision, integrated security is summarized in two key points: increasing capabilities, and improving ROI. That is the ultimate objective.

*Cale Dowell and the Universal team will be available at ISC West at Booth 24123.

 

Featured

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.