From Risk to Reward: How Service Assurance Presents New Opportunities for Integrators

From Risk to Reward: How Service Assurance Presents New Opportunities for Integrators

Integrators need to find new ways to innovate to differentiate themselves from their competition and improve relationships with their customers both before and after installation.

In the professional security market, the model for revenue is changing. Systems integrators are looking for revenue beyond basic sales and maintenance—especially customer-oriented add-ons to generate recurring monthly revenues (RMR). Integrators need to find new ways to innovate to differentiate themselves from their competition and improve relationships with their customers both before and after installation. And increasingly, organizations are realizing their physical security IoT systems have become attack surfaces, they are subject to increased audit and compliance requirements, and they must be managed at scale. These new requirements are best addressed through providing automated verification and service assurance of physical security systems delivered as an RMR offering by an integrator.

The switch to IP-based security systems has happened and has brought many benefits to security system operators. Networked security systems added capabilities, intelligence, and performance, make it simple to integrate tasks, streamline workflows, and easily audit security procedures in addition to mitigating risk, improving overall data and managing liability. These benefits have enabled security systems to better secure facilities and protect employees and businesses. However, there are risks presented by the growing prevalence of threats aimed at security IoT systems.

As with IoT systems in general, networked security systems are comprised of multiple IP-based devices coordinated together to enable an application (e.g. the surveillance application is to deliver a video stream from the camera device into storage for the required retention period). Data is exchanged between multiple devices, and there are a growing number of security devices and functions being connected together. In today’s world, it is not surprising to see a security system comprised of more than access control and surveillance; the IoT nature of security systems brings IP-connected intercom systems, alarm systems, uninterruptable power supplies, visitor management kiosks, and others into the scope of a network connected security system.

A consequence of more devices, more connections between them, and their mission-critical nature is that organizations can’t leave to chance that everything is always working as it should. That’s where automated verification and service assurance for physical security systems comes into play. By constantly analyzing and verifying the entire video stream path, automation can make sure that the integrator knows about issues immediately and can also assist in automatically diagnosing and defining a fix-it plan for problems.

Relying on self-test health checks at the device level (such as the VMS testing itself, or camera device checking itself when powered on) is insufficient... Such tests miss critical system-level issues that prevent a video stream from recording properly. That is why, based on industry studies when such failures occur they are not found out immediately – it can take days, weeks, or longer to detect. An independent 3rd party survey in 2016 found that it typically takes 5-7 days to detect a failure to record. Unless an automated service assurance solution is being used, there literally is nothing detecting and alerting on that failure.

This is a major gap in the market, and integrators can solve it with an automated service assurance solution while generating significant RMR. The value to the customer is clear - if video is missing, it can have a catastrophic impact on an organization or business. A business’ ability to remain compliant with internal policy, various government or industry requirements, or regulations may be impeded. Many industries are under significant regulation regarding the deployment of security systems and retention of video. It’s essential for these systems to pass regular audits so that organizations do not incur fines or other impediments from their governing body. As well, missing video could cause a liability issue, or prevent an organization from defending itself from false claims. For these reasons and others, automated service assurance is now critical to security systems.

Mitigating downtime on a security system is vital. For security to protect a business and its employees, it can’t miss a thing and must be operational always. However, getting ahead of problems—proactive service—can be one of the greatest challenges for end users, especially at scale. Providing services that can reliably keep a system operating, lower downtime or alert security operators to possible failures on the system can deliver critical new ROI to end-users, as well as being an RMR generator for systems integrators.

An automated verification and service assurance solution on a monthly subscription service can do more than just generate valuable RMR for integrators – it can deepen their customer relationship by being more “digitally connected” to their customers. Solutions that look at the physical security system as a whole (instead of just at the device level) are critically important for identifying when the system is failing to achieve the business goals of the customer, namely the display, recording, and retention of video. The integrator will have a much deeper understanding of the nature of problems in the security system.

An automated solution is also a connection point for the IT department, who has increased security responsibilities for most businesses as security systems go digital and are viewed as IoT systems. A digital, automated system is essential to this new set of users.

Additionally, an automated verification solution is a boon for any physical security system operator facing compliance audits. For internal and external audits, an automated, fully documented solution makes compiling reports simple and accurate. Integrators can run automated solutions remotely, providing them with the resources to instantly detect and diagnose problems, aiding their customers with solutions and even dispatching maintenance from anywhere at any time.

There is a major need to be filled as to providing confidence to end users of security systems in knowing their systems are always working properly and scientific evidence of that. Integrators who fill this niche can expect a product that provides them with increased RMR as well as serving an important function for their customers with a service that increases overall security while simplifying operations.


  • Cloud Adoption Gives Way to Hybrid Deployments

    Cloud adoption is growing at an astonishing rate, with Gartner forecasting that worldwide public cloud end-user spending will approach $600 billion by the end of this year—an increase of more than 21% over 2022. McKinsey believes that number could eclipse $1 trillion by the end of the decade, further underscoring the industry’s exponential growth. Read Now

  • AI on the Edge

    Discussions about the merits (or misgivings) around AI (artificial intelligence) are everywhere. In fact, you’d be hard-pressed to find an article or product literature without mention of it in our industry. If you’re not using AI by now in some capacity, congratulations may be in order since most people are using it in some form daily even without realizing it. Read Now

  • Securing the Future

    In an increasingly turbulent world, chief security officers (CSOs) are facing a multitude of challenges that threaten the stability of businesses worldwide. Read Now

    • Guard Services
  • Security Entrances Move to Center Stage

    Most organizations want to show a friendly face to the public. In today’s world, however, the need to keep people safe and secure has become a prime directive when designing and building facilities of all kinds. Fortunately, there is no need to construct a fortress-like entry that provides that high level of security. Today’s secured entry solutions make it possible to create a welcoming, attractive look and feel at the entry without compromising security. It is for this reason that security entrances have moved to the mainstream. Read Now

Featured Cybersecurity


New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3