With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services.

Online Exclusive: ‘Integrated Security’ – Not Just an Industry Buzzword

With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services.

As the evolution of the “Internet of Things” reaches its zenith, the world demands that anything that can be connected should be connected. In this new age, technology has become the raw material that makes up the foundation of nearly all of our most precious business functions.

With so many business functions becoming integrated through networked devices or systems, it is no wonder that one of the newly re-introduced buzzwords spreading throughout the physical security industry is integrated security services. What comprises “integrated security?” An internet search might lead you to a few companies; however, like many other marketable phrases in our industry, “integrated security” doesn’t retain a standard definition. And it shouldn’t.

As the marketable phrase might suggest, “integrated security” implies an assimilation of different security services. And that definition would be correct, albeit incomplete. Depending on which organization you’re engaging with, the security services offered may vary from company to company. So how do you determine what services to integrate, and who to speak with about it?

Initially, one must understand the benefits of any type of integration. Your smartphone is an excellent example. Today, a typical smartphone provides an array of services. Its primary function is to provide a working mobile phone solution for calls and text messages. As a secondary function, it provides a slew of other uses. Access to apps, email, Internet, and a camera just to name a few. It incorporates many useful tools into one efficient device that can be more easily accessed, maintained, and controlled than if they were separate from each other. It offers an integration of useful tools in much the same manner that the multi-tool delivers to the outdoorsman. The strategy of pairing services together to create efficiencies isn’t new. But as technology improves it becomes more and more effective.

The data most imperative to recognize is the method by which organizations can begin to integrate different security services into their overarching physical security blueprint. As with all technology, there are two primary components: the user and the tool. Many organizations make a mistake by only focusing on the tool (i.e. – what inherent value will this bring our security function?). But it is just as important to respect users, and how technology will affect their role and daily operation. This applies not only to executive oversight, but also to the part-time security officer. When commencing a strategy to integrate security services, it’s essential to understand what services yield the most value through assimilation.

What to Integrate

Determining what to integrate is like catching a ball: it’s important to keep your eyes on the objective. At the same time, it’s valuable to keep your mind open to new solutions you may not have considered or otherwise known of. Physical security is generally comprised of two key elements: manpower and technology. I recommend the first area every organization should examine is how technology may impact its manpower. Something as simple as remote managed door access control can save an organization with a national footprint millions of dollars in labor that would otherwise be physically inspecting and locally controlling access. Thus, it’s valuable to consider where technology can impact or augment security labor. Second, maximize your understanding of the core technologies: video surveillance, access control, intrusion/fire & life safety/smoke alarms, incident management, situational & risk awareness tools, and managed remote monitoring.

Real-Time Focus

The aim should be to understand the fundamental value each piece of core technology can bring to your entire security design. Identify areas where the technologies benefit from each other, specifically in their real-time application. For example, video and access control nearly always work in tandem. When monitored, the two become a more effective tool than just the one. Layer in two-way audio, and you can completely control an access point in real time without the need for a full-time officer. Real-time incident reports coupled with a full security operations center creates an improved capability to modify security protocols in real time on a national or global level. GPS fleet or asset tracking combined with a risk visualization tool and managed remote monitoring grants real time, actionable intelligence for modification to any security risks that may arise.

Identify Duplicate Services

Perhaps most significant is to pinpoint areas where core security technologies can integrate with manned security operations for enhanced responsiveness. To use an example, imagine an office complex that deploys several dedicated security officers throughout the day—one of which is fully devoted to oversight of their video and access control monitoring. This example is one our organization has encountered several times. Through integrating cameras with video analytics and access control, together with a well-designed, remote security operations center, and deploying the remaining onsite security officers with smartphones, we were able to increase our client’s situational intelligence and responsiveness to incidents while also yielding cost savings to the customer’s annual spend. On demand reports, such as incidents that occur on property (place, date/time, protocol initiated) or number of visitors to the building became valuable resources for both onsite security personnel and operational oversight to make adjustments proactively. Many core technologies when properly deployed are duplicates of some day-to-day security officer operations. When duplicate services are identified, eliminate or reduce the technology or manned security operation that can be replaced.

Making the Right Connection

With ISC West just around the corner, end users and security organizations alike will be on the lookout for new innovations and compatible partnerships. While each year produces additional technologies and recommendations, take the time to also gather information on how existing services can be paired with like services. In many cases, it won’t require a complete redesign of security operations or the need of a fancy operations center. As mentioned earlier, sometimes it can be as simple as changing the locks.

As a rule of thumb, use the size of your operation as a good gauge to determine what type of security organization to examine for integrated services. Are their multiple properties in multiple states under your leadership with a need for strategic implementation of security services? If so, I would recommend looking for a provider that can offer blended services, hybrid solutions, and a multitude of integrated services. Within these organizations should be subject matter experts or consultants that spend their time specifically working with large customers on maximizing the effectiveness of security operations through integrated services. This isn’t to say that smaller providers or one-off vendors cannot be of value to larger operations. They certainly can. However, for most large organizations there is an intrinsic value in having “one throat to choke” by consolidating vendors.

On the other hand, smaller organizations have more flexibility to play the field. The large, one-stop shops will add value, but with so many customers, they sometimes lack the ability to provide dedicated service to smaller companies. Small business owners know only too well the gentle dance of balancing your commitment to safety, and your commitment to your balance sheet. But the bottom line always starts with first understanding your needs.

Decision Making

Overwhelmingly, security decisions are no longer being made solely by the security division of an organization. Corporate departments collaborate more on decisions about security – and it’s no longer just the accounting department, but procurement, human resources, legal and operations. In many corporations decisions pertaining to security will impact each one of these departments. Thus, with so many cooks in the kitchen and so many dollars on the table, it becomes imperative to eliminate duplicate services to maximize efficiency. End users should focus on the opportunities that will best allow them to systemize their security process and leverage current resources. Likewise, security organizations need to broaden their conversations with end users. It isn’t just selling a camera or an hour of operation per week anymore. It’s being able to assess the big picture and cast a strategy that multiple departments can understand and evaluate. If the organization you’re engaged with cannot provide that level of discussion, don’t make a decision. Keep looking. Your balance sheet, and the safety of your people and assets are worth it. In the context of making a decision, integrated security is summarized in two key points: increasing capabilities, and improving ROI. That is the ultimate objective.

*Cale Dowell and the Universal team will be available at ISC West at Booth 24123.

 

Featured

  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • 91 Percent of Security Leaders Believe AI Set to Outpace Security Teams

    Bugcrowd recently released its “Inside the Mind of a CISO” report, which surveyed hundreds of security leaders around the globe to uncover their perception on AI threats, their top priorities and evolving roles, and common myths directed towards the CISO. Among the findings, 1 in 3 respondents (33%) believed that at least half of companies are willing to sacrifice their customers’ long-term privacy or security to save money. Read Now

  • Milestone Announces Merger With Arcules

    Global video technology company Milestone Systems is pleased to announce that effective July 1, 2024, it will merge with the cloud-based video surveillance solutions provider, Arcules. Read Now

  • Organizations Struggle with Outdated Security Approaches, While Online Threats Increase

    Cloudflare Inc, recently published its State of Application Security 2024 Report. Findings from this year's report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams. Read Now

Featured Cybersecurity

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3