Integration not simple, but beneficial

April 2016 Editor's Choice, Integrated Solutions

Commercial environments are no longer looking for individual security solutions. Today they want a package that offers all the aspects of security they need. Part of the reason for this move is cost based – it’s supposedly cheaper and more convenient to get it all from one supplier. Another reason is the need for integrated solutions that talk to each other for easier management and improved security.

Well, that’s what we’re being told, but it seems that for every company looking at integration and expanding the scope of their security kit beyond simply raising an alarm or getting blurry images after the fact, there is another who follows the Twitter hashtag and simply #carryon as always.

In reality, however, there are benefits to integration and making better use of the data your security installations collect and many organisations are on track to exploit the new possibilities.

“We have found a definite upward trend towards the desire for integrated solutions. The end-users are becoming more educated with regards to integration and the benefits thereof,” says Gus Brecher, MD of Cathexis Africa.

Gus Brecher, Cathexis Africa.
Gus Brecher, Cathexis Africa.

“When one demonstrates how you can increase efficiency and effectiveness of a security solution control room environment by integration, it is easy to convince people of the benefits.

“The term integration includes the integration of old systems (where possible) and new systems. For example, we are busy with the University of the Western Cape project which includes integration with existing fire panels, alarm panels, DVRs and access control. All of these third-party devices being several years old.”

Bosch Security System’s Charles Coetzee also sees a move to integration, but notes it largely depends on the size and nature of the project and the legislative need. “For example, a company may purchase a stand-alone fire system instead of an integrated fire/voice evacuation system if the project is typically a warehouse environment rather than a hotel complex. Standalone systems are also more prevalent in projects requiring safety and security upgrades rather than a completely new installation. For the most part, new construction projects often require fully integrated safety and security systems.”

Charles Coetzee, Bosch Security Systems.
Charles Coetzee, Bosch Security Systems.

Coetzee also notes that due to rapidly changing technology and products, it can sometimes be difficult and expensive to integrate legacy multi-brand systems. “The market has come to understand this and therefore tenders for new installations often require fully integrated systems,with sufficient scalability to cater for new products and technologies.”

Standards, open or otherwise?

Depending on which article one may be reading at the time, integration may be a leading poster child for the adoption of open standards. If we believe the hype, any system developed on open standards will be able to integrate with other systems built on the same standards. Unfortunately, Brecher explains that there is no real ‘open’ standard right now that does the job completely.

However, Coetzee says that ultimately the customer is looking for a solution, not one that only works for now, but is certain to continue working in the future with new advances in products and technologies. “Open standards play a role in this as well as backward compatibility between systems.

“Most systems today are either an open source system or have a certain degree of integration capabilities, for example, LON Works, BACNet, MODBUS, OPC, ONVIF etc. These are predominantly the standard communication protocols for systems to be integrated with one another.”

A platform approach

When it comes to getting different applications to play together, an option is to make use of one of the management platforms available that claim to be able to integrate almost anything. However, as many people have found, just as the claim to integration and openness isn’t always on the level, a management platform’s ability to integrate almost anything can also be limited.

Many of large management platforms are able to offer integration to a multitude of vendors. However, Coetzee explains, this often tends to be somewhat rudimentary, resulting in the key features that make the field device best of breed being underutilised or in some cases completely neglected. “Using a management platform from a single vendor that also offers a full range of hardware solutions, which are designed and developed to work with one another, will in the majority of cases outperform a multi-vendor solution.”

“A lot of the PSIM/BMS systems may use OPC or BACNet protocols (which were originally designed for process control, not security) to integrate some of the systems,” adds Brecher, “but these protocols have limitations, especially when there is video involved. So right now, video management systems have proprietary SDKs.

“Having said this, there may be a trend towards using the enhanced ONVIF protocol from the VMS in the future enabling the ‘head-end’ to talk to VMS systems using this protocol.”

When asked about the Cathexis management platform, Brecher adds, “We have integrated scores of third-party systems in the access control, fire, alarm, weighbridge, money counters, perimeter intrusion detection (PIDS), point-of-sale etc. We try to make the integration as simple and seamless as possible, and also to include functionality that can really enhance the operation of the site.”

From the Bosch perspective, Coetzee says the Bosch Building Integration System (BIS) is “a flexible, scalable security and safety management system that can be configured to handle an enormous spectrum of operational scenarios. It contains a huge range of applications and features which enable both the integration and coupling as well as the monitoring and control of all technical building systems.”

The BIS engines provide fire and intrusion detection, access control, video surveillance plus the monitoring of HVAC and other vital systems. The system is modular, meaning users can add or remove single elements or create new combinations as required. The Building Integration System works with tested open global IT standards such as OPC, SML, HTML and Windows – which makes it easy to integrate both third-party security and building management systems.

For more information contact Bosch Security Systems – South Africa & sub-Saharan Africa, +27 (0)11 651 9600, charles.coetzee@za.bosch.com, http://africa.boschsecurity.com. Cathexis Africa, +27(0)31 240 0800, sales@catafrica.co.za, www.cathexisvideo.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
ArxTech: Over 30 years of evolving security solutions for South Africa’s toughest challenges
Security Services & Risk Management Integrated Solutions
[Sponsored] For over 30 years, a Centurion-based company has helped shape how security technology is designed, deployed, and supported in South Africa. Originally known as CellSecure, it now operates as ArxTech.

Read more...
Cape Town estates gain access to advanced security technology at Securex
Securex South Africa News & Events Integrated Solutions
For the first time, estate and complex security decision-makers in the Western Cape will have direct access to the breadth of solutions and expertise these shows are synonymous with.

Read more...
Making drone security more accessible
Editor's Choice Integrated Solutions Residential Estate (Industry) AI & Data Analytics IoT & Automation
Michael Lever discusses advances in drone technology, focusing on cost reductions and the implementation of automated services, including beyond line of sight capabilities, for residential estates with SMART Security Solutions.

Read more...
Private fire services becoming the norm?
Technews Publishing SMART Security Solutions Editor's Choice
As the infrastructure and service delivery in many of South Africa’s major cities decline, with a few, limited exceptions, more of the work that should be done by the state has fallen to private companies.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.