Integration not simple, but beneficial

April 2016 Editor's Choice, Integrated Solutions

Commercial environments are no longer looking for individual security solutions. Today they want a package that offers all the aspects of security they need. Part of the reason for this move is cost based – it’s supposedly cheaper and more convenient to get it all from one supplier. Another reason is the need for integrated solutions that talk to each other for easier management and improved security.

Well, that’s what we’re being told, but it seems that for every company looking at integration and expanding the scope of their security kit beyond simply raising an alarm or getting blurry images after the fact, there is another who follows the Twitter hashtag and simply #carryon as always.

In reality, however, there are benefits to integration and making better use of the data your security installations collect and many organisations are on track to exploit the new possibilities.

“We have found a definite upward trend towards the desire for integrated solutions. The end-users are becoming more educated with regards to integration and the benefits thereof,” says Gus Brecher, MD of Cathexis Africa.

Gus Brecher, Cathexis Africa.
Gus Brecher, Cathexis Africa.

“When one demonstrates how you can increase efficiency and effectiveness of a security solution control room environment by integration, it is easy to convince people of the benefits.

“The term integration includes the integration of old systems (where possible) and new systems. For example, we are busy with the University of the Western Cape project which includes integration with existing fire panels, alarm panels, DVRs and access control. All of these third-party devices being several years old.”

Bosch Security System’s Charles Coetzee also sees a move to integration, but notes it largely depends on the size and nature of the project and the legislative need. “For example, a company may purchase a stand-alone fire system instead of an integrated fire/voice evacuation system if the project is typically a warehouse environment rather than a hotel complex. Standalone systems are also more prevalent in projects requiring safety and security upgrades rather than a completely new installation. For the most part, new construction projects often require fully integrated safety and security systems.”

Charles Coetzee, Bosch Security Systems.
Charles Coetzee, Bosch Security Systems.

Coetzee also notes that due to rapidly changing technology and products, it can sometimes be difficult and expensive to integrate legacy multi-brand systems. “The market has come to understand this and therefore tenders for new installations often require fully integrated systems,with sufficient scalability to cater for new products and technologies.”

Standards, open or otherwise?

Depending on which article one may be reading at the time, integration may be a leading poster child for the adoption of open standards. If we believe the hype, any system developed on open standards will be able to integrate with other systems built on the same standards. Unfortunately, Brecher explains that there is no real ‘open’ standard right now that does the job completely.

However, Coetzee says that ultimately the customer is looking for a solution, not one that only works for now, but is certain to continue working in the future with new advances in products and technologies. “Open standards play a role in this as well as backward compatibility between systems.

“Most systems today are either an open source system or have a certain degree of integration capabilities, for example, LON Works, BACNet, MODBUS, OPC, ONVIF etc. These are predominantly the standard communication protocols for systems to be integrated with one another.”

A platform approach

When it comes to getting different applications to play together, an option is to make use of one of the management platforms available that claim to be able to integrate almost anything. However, as many people have found, just as the claim to integration and openness isn’t always on the level, a management platform’s ability to integrate almost anything can also be limited.

Many of large management platforms are able to offer integration to a multitude of vendors. However, Coetzee explains, this often tends to be somewhat rudimentary, resulting in the key features that make the field device best of breed being underutilised or in some cases completely neglected. “Using a management platform from a single vendor that also offers a full range of hardware solutions, which are designed and developed to work with one another, will in the majority of cases outperform a multi-vendor solution.”

“A lot of the PSIM/BMS systems may use OPC or BACNet protocols (which were originally designed for process control, not security) to integrate some of the systems,” adds Brecher, “but these protocols have limitations, especially when there is video involved. So right now, video management systems have proprietary SDKs.

“Having said this, there may be a trend towards using the enhanced ONVIF protocol from the VMS in the future enabling the ‘head-end’ to talk to VMS systems using this protocol.”

When asked about the Cathexis management platform, Brecher adds, “We have integrated scores of third-party systems in the access control, fire, alarm, weighbridge, money counters, perimeter intrusion detection (PIDS), point-of-sale etc. We try to make the integration as simple and seamless as possible, and also to include functionality that can really enhance the operation of the site.”

From the Bosch perspective, Coetzee says the Bosch Building Integration System (BIS) is “a flexible, scalable security and safety management system that can be configured to handle an enormous spectrum of operational scenarios. It contains a huge range of applications and features which enable both the integration and coupling as well as the monitoring and control of all technical building systems.”

The BIS engines provide fire and intrusion detection, access control, video surveillance plus the monitoring of HVAC and other vital systems. The system is modular, meaning users can add or remove single elements or create new combinations as required. The Building Integration System works with tested open global IT standards such as OPC, SML, HTML and Windows – which makes it easy to integrate both third-party security and building management systems.

For more information contact Bosch Security Systems – South Africa & sub-Saharan Africa, +27 (0)11 651 9600, charles.coetzee@za.bosch.com, http://africa.boschsecurity.com. Cathexis Africa, +27(0)31 240 0800, sales@catafrica.co.za, www.cathexisvideo.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.