Integrators in the crosshairs

August 2012 News

Welcome to our August issue. We have a bunch of focus areas this month, from fire to our IFSEC SA review to storage, to our annual healthcare feature and a look at the world of system integration.

The term system integrator (SI) is one of those titles that companies often apply to themselves without actually having the resources to deliver the services an SI should. But there again, what should an SI do? We put this question to a few people we thought should know and you can see the responses in our SI section.

Safe to say, calling yourself a SI is not simply a title, it involves a host of skills and technical capabilities you generally cannot get from the shop on the corner. And as the world moves to more integrated systems, those without the required skills are going to be in trouble. Although they did not say it openly, the only way smaller companies are going to compete in large projects is to ensure they have in-depth skills and knowledge on specific niche areas.

Making yourself an expert in a niche is really the only way for smaller businesses to prepare for the future and be co-opted into larger projects. Naturally there is still an enormous amount of smaller or solution-specific projects out there for the small players to play in, but money talks and as customers become more educated they will demand integrated solutions instead of silos of product specific installations.

A recent article on IPVM.com highlighted the problems customers have with their SIs. The article highlights three common reasons for firing your SI: poor service, lack of knowledge and too expensive/lack value. Sounds like these complaints are levelled at SIs globally, you can read the article at www.ipvm.com/report/why_integrators_get_fired .

Scenario planning

We also review the first Hi-Tech Security Solutions Executive Breakfast in this issue. Clem Sunter was our guest speaker on the topic of scenario planning. The audience was incredibly positive of his contribution with everyone giving him maximum points in the feedback.

Looking at the brief overview we offer in the article will give you food for thought with respect to planning for your own and your business’s future. However, you can find much more information on www.mindofafox.com or by grabbing one of his books. The books on sale at the Executive Breakfast sold out in minutes.

And on the topic of scenarios, we are working on the Access and Identity Management Handbook 2013. Let us know if you have anything to contribute, and if you have not received the brief for it yet, let me know on [email protected] and I will get it to you.

And, as always, any comments on this issue can be sent to the same address.

Correction

Axis Communications has notified Hi-Tech Security Solutions that the case study titled ‘Retail giant rolls out additional surveillance’ in the July issue contained outdated information and the company has therefore retracted information included in the case study.

Andrew Seldon – Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Spend on cloud to accelerate across Africa in 2023
News
More than two-thirds of companies using cloud computing across major African markets plan to increase their spending on cloud services in 2023.

Read more...
ChatGPT’s impacts will be social, not technical
News
ChatGPT is truly a remarkable achievement, an artificial intelligence (AI) that you can have a conversation with and ask to do everything from writing essays to coding computer programs.

Read more...
Artificial intelligence in Africa: levelling the narrative
News
While AI can benefit multiple industries, in Africa the key sectors that stand to gain are financial services (specifically fintech) and agriculture.

Read more...
Improving data security for a hybrid society
News
Researchers from Tokyo University of Science develop a method that can perform computations with encrypted data faster and at a lower cost than conventional methods, while also improving security.

Read more...
Cybersecurity in 2023: The latest trends and developments
News
In 2023, experts predict that several trends will shape the cybersecurity landscape, including the growing use of artificial intelligence (AI), the increasing focus on the Internet of Things (IoT), and the rise of quantum computing.

Read more...
What to do in the face of growing ransomware attacks
Technews Publishing Cyber Security Security Services & Risk Management
Ransomware attacks are proliferating, with attackers becoming more sophisticated and aggressive, and often hitting the same victims more than once, in more than one way.

Read more...
Texecom launches the Midnight Black Collection
Technews Publishing Perimeter Security, Alarms & Intruder Detection Products
Working in harmony with darker environments, the Midnight Black Collection has been created for businesses and sites that require or prefer a security solution which offers discreet protection that compliments their surroundings.

Read more...
SAN market set for growth
Technews Publishing News IT infrastructure
Storage-area network (SAN) market to hit US$ 26,86 billion in revenue by the end of 2029 due to factors like widespread adoption of Hybrid SAN-NAS solutions.

Read more...
Optimising remote technical support
Technews Publishing Asset Management, EAS, RFID Products
Sanden Intercool Kenya improves efficiency, removes manual processes with FIELDForce from MACmobile, making its technical backup and support staff more productive, while also optimising record keeping.

Read more...
Enterprise threats in 2023
News Cyber Security
Large businesses and government structures should prepare for cybercriminals using media to blackmail organisations, reporting alleged data leaks, and purchasing initial access to previously compromised companies on the darknet.

Read more...