Introduce Yourself to Open Architecture

Introduce Yourself to Open Architecture

Looking at strategies well into the future

The concept of Open Architecture Access Control is taking on a lot of traction. Much more than a buzzword, Open Architecture Access Control is an idea whose time has come. And, with good reason.

Between the ongoing mass-migration from analog to IPbased systems and the evolution of the Internet of Things (IoT), which is now connecting more devices than ever before, the benefits of open architecture systems have never been more apparent. Among the headliners: An open architecture system provides and accepts services from other systems, connects multiple components from different suppliers without the need to change any components, is agnostic to changes and guarantees interoperability— making systems scalable and upgradeable well into the future.

The Forecast Looks Bright

In a recent report by IHS, a premier provider of global market, industry and technical expertise, highlighting the trends and drivers in Access Control, Open Standard was forecasted to provide some of the highest growth opportunities. They state that open standards help to increase innovation and product quality and several manufacturers are now building products to what are emerging industry standards that include Open Supervised Device Protocol (OSDP) and ONVIF Profile C. In the future, end users will have the ability to choose best of breed solutions that meet current needs and are flexible enough to expand and adapt to their changing environments.

The IHS report goes on to say that the ability for end users to have one user interface (OUI) to manage security and risk is now a necessity. In a world where so many devices now connect to a network, the ability to connect logical and physical security with HR and access databases, BMS, elevator control and other devices or sensors to one user interface is now possible. These integrated solutions are often limited by the partner integrations and can be based on proprietary technology. Be cautious in choosing just any solution as a proprietary solution could impact future usability with limitations and increased costs.

With so much being put on the network, IT departments are more involved and have begun to manage and in some instances, dictating, access control installations. Their preference is to avoid any proprietary constraints and, as a result, is seeking open platform solutions. They want software, controllers, readers and door hardware that will accept additions, upgrades, and component replacement. Some end users are asking their integrator partners to provide for life-cycle management of the system and, in a proprietary world, that becomes a difficult task. Ask yourself these questions:

  • How are you preparing your business for these changes?
  • Are you able to pull forward your existing legacy access control system, maintain your investment in access control hardware and provision with an open solution?
  • Do you have disparate access and video systems managing your security today?
  • Are you looking to have a single user interface to manage all your security needs?

Embrace New Technologies

One of the benefits of open platform design is the ability to quickly and efficiently integrate newer technologies like wireless locking hardware, biometrics, and mobile devices both for system administration and for use as a credential. Other advantages include combining traditionally architected access control systems with IP connected edge devices all on the same system software.

Do you want to use your video management system as your single user interface? That too is a possibility, where you can bring in the day-today management functionality of your access system and combine those features with analytics and other sub-systems. Imagine access control plus people counting or access control plus loitering. It is all possible with open design.

Arm Yourself to Manage Proactively

Many end users with disparate security systems force their security managers to be reactive to isolated events or alarms, such as: a door forced alarm, a glass break sensor, motion detection, unauthorized access, video monitoring, etc. Monitoring these systems often requires increased personnel costs to manage. Connect all these devices on a single system over the network and you have the means to be proactive and reduce costs with your security management.

Imagine an environment where a glass break sensor triggers, a motion sensor triggers, a lighting sensor triggers, and along with video of the event, we see an intruder and are able to lock down that area of the facility thus isolating the event. Perhaps you have analytics running, and with the combination of triggers, the system sends video and an alert to your mobile device and you are able to lock down the facility, activate the mass notification system, and alert local authorities all from that same mobile device. This real-time information provides for better management and better security.

  • What capabilities do you have to be proactive today?
  • Is your system providing you with actionable real-time information?
  • What are you missing that you would like to have or need?

Leverage all the Uses, Benefits of an Op en Architecture

Do you want to ensure compliance or avoid liability? Before an employee operates a piece of machinery or operates a vehicle, you want to be sure the system is able to check the HR database to ensure the employee is trained, certified, or licensed and will only provide authorization on confirmation that the conditions for operation were satisfied? Maybe you need real-time location in a facility or mustering capability or have need for non-traditional uses of your access control system? Solutions like these are available today.

With open architecture, open standards and open field hardware, you are no longer limited by what you are told the system can and cannot do. The choices are yours.

For dealers and integrators, there are many options and choices available promising them, and their end users, system flexibility, increased cost benefits, ease of installation, ease of integration, and the re-use of existing door, reader, and controller hardware. Education is key to understanding all these options, and the best ones for their particular needs. One way dealers and integrators can do that is by familiarizing themselves with, and adhering to, standards such as ONVIF, the first interoperability standard for network-based physical security. This will help teach how to build systems that are scalable and cost-effective well into the future.

This article originally appeared in the July 2015 issue of Security Today.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Featured Cybersecurity

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3