Darren Nix

Tip of the Month: System Testing 101

I was recently asked to review and test a large security management system. Upon scheduling the testing date, I was asked if a construction review and auditing agency could follow us during the testing. The agency’s primary objective was to review and audit design and construction projects on a very routine basis. During the testing, the representatives from the agency asked questions and took many notes. I quickly realized that this was a learning opportunity for them. I was somewhat shocked that this type of agency did not fully understand the elements of a security management system and how to test the system. Nevertheless, I was more than happy to instruct along the way.

Whether you are directly responsible for routine audits, similar to this agency; a security professional accountable for testing your company’s systems; or even a home owner with a burglar alarm system, you must fully understand how to test your system and conduct frequent, routine testing.

When testing a system, the main objective is to ensure all equipment is functioning properly and all devices are reporting correctly (e.g. door alarms, video cameras, etc.). There are certainly many methods of testing multiple types of devices, equipment and systems; however, here are some of the basics:

1. Contact alarm operators – Before you begin testing, you should contact those responsible for monitoring the alarm activity on the system. In some cases, that may be a third party company. If so, you should request for them to keep an activity log during your testing time.

2. Arm the system – When testing a burglar alarm system, you must first arm the system. If you are testing a security management system, you should make sure all alarm devices are set to report alarm conditions during the testing period.

3. Doors

a. Door status switch or alarm contact – If a magnetic switch is used, place a magnet in front of the switch for a few seconds while the door is open. When removed, the alarm should report.

b. If using a 'door held open' alarm on a security management system, leave the door open and do not place the magnet in front of the switch for the amount of time allowed in the system for a door to stay open before an alarm sounds.

4. Card Readers – Use a variety of credentials for testing. Each credential should be set for the following:

a. Access granted
b. Access denied
c. Unknown badge

5. Cameras – Check for the following: (some systems will initiate an alarm on some events)

a. Correct field-of-view
b. Focused
c. Recording at set times
d. Loss of video signal
e. Covered lens
f. Clean domes

Finally, make sure you test all of the systems communications and associated alarms and be thorough when testing all aspects of your system.

About the Author

Darren Nix is a senior associate at Risk Management Associates, Inc.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.