classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Bringing different systems into a cohesive solution
June 2018, Retail (Industry), Integrated Solutions

Modern commercial environments no longer have the luxury of treating systems such as security and building management as isolated entities. As the demand for more integrated packages has grown, technologies have had to evolve to meet these needs and system integrators have had to expand their capabilities in order to provide more holistic solutions.

Hi-Tech Security Solutions spoke to G4S Secure Solutions (SA)’s Tim Timmins and MJ Oosthuizen, BMS System Consultancy’s Peet Geldenhuis, and Sukema’s Kevin Buret to examine what systems are being integrated together, and what end users should look for when choosing a system integrator (SI) to work with.

Make it user friendly

Tim Timmins
Tim Timmins

“Whatever software you are going to use, whether it is standard off-the-shelf or a customised package, you want to make it as simple as possible for an operator to use as a management tool,” Timmins begins. “From the system integrator’s point of view, this means you’re only training the end user on one software package, instead of separate systems for things like fire suppression, CCTV and access control. Ideally you want to simplify it to a single management tool through which you collate all this information as an integrated solution back to one software package.”

MJ Oosthuizen
MJ Oosthuizen

Oosthuizen adds that there is usually more than one party a solution must be tailored for. On the one hand, there is the security company or security manager on site, but depending on the situation, other users may need to be involved. In an business estate environment, for example, the head of security or risk manager might want to be alerted when a security breach occurs, and the way they are presented with information needs to be different to how it is presented to the control room.

“The manager may want to receive an alert indicating where an alarm was triggered by a fence or camera on their mobile device, and control how the relevant security company or service provider responds accordingly. It is important for a system integrator to consider how end users at different levels and with different roles require different information in different formats, and be able to tailor systems that allow all users to interpret the information that’s relevant to them,” Oosthuizen says.

Open or proprietary

Oosthuizen and Timmins are both proponents of using open platforms that can integrate all relevant systems. “If you choose more open platforms, using systems that have a proven track record of being able to talk to each other, it is much more cost effective and easier to do, with a lot less support involved,” says Timmins. “Typically you will find that video management systems (VMS) will support several thousand specific cameras, via direct integration over and above ONVIF integration. Open platforms are definitely, definitely the way to go.”

What is more, says Oosthuizen, having a solution that can integrate systems from different vendors spreads the risk faced by the end user. “In today’s global economy, the possibility cannot be ignored that a particular vendor will go out of business,” he states. “If you have a proprietary solution from that vendor that you’ve been locked into, you end up having to replace everything.

“To make their own jobs easier, integrators will often tell their clients not to worry about integration options or capability because everything comes from the same manufacturer. Not only does this end up locking the client into a proprietary solution, it also means they aren’t able to, for example, add a camera from another manufacturer that might come out in the future that has a particular feature they want to make use of.”

Oosthuizen also emphasises that a forward-thinking solution should be designed from the inside out. “Particularly for complex environments such as an office park or estate, instead of designing from the perimeter inwards, it is advisable to start with a strategy for how future-proof you want to make the site. This approach means that you first put the correct infrastructure in place, then look at the head-end system, and only then drill down to the sensor level (fence, intrusion, alarm, fire, etc.) that can actually plug into it,” Oosthuizen says.

Kevin Buret
Kevin Buret

Open platforms are all well and good, but not so open that they leave the back door open. “Every single edge device or endpoint is a hackable area – the Internet of Things (IoT) has made it a very dangerous game,” Buret cautions. “Too many customers have invested too much, over too long, into all the technology to expect them to want to strip out and replace with a single brand. Brand is irrelevant since technology is so similar these days – as long as it does the job and as long as we can pull it into an open platform such as a DSIM (digital security information management).

“Nowadays it’s all about the information that can be harvested from endpoints, and this goes beyond security, merging with the likes of building management and HR systems. When we talk DSIM we’re talking full bidirectional control. Being able to bring disparate systems into a single unified platform and control those systems with no limitation – that is true integration.”

Geldenhuis adds to this by saying that “many big companies have formed dedicated digitalisation divisions to look at all these different platforms and the IoT world we’re now faced with. Personalisation is a key trend in modern technology, so a DSIM allows a client to set up dashboards the way they want them and understand them. We have well and truly moved past the days of PSIM (physical security information management) and into the era of DSIM.”

Management platforms and IT infrastructure

When it comes to management platforms, Timmins’ recommendation is to choose one with a proven track record that is internationally recognised and best-of-breed. “The decision depends on how far you want to go with respect to integration. Important factors include what open protocols the platform complies with, licensing considerations, and support – ideally you want there to be not just one but a base of multiple local approved, certified installers,” he says.

Nowadays the effectiveness of a solution is intimately tied to the quality of the IT infrastructure it runs on, and an SI must be prepared and proactive in engaging with a client’s IT department to overcome any conflicts of interest. “It is important to get the buy-in of the IT department for its complete cooperation,” says Timmins. “Bandwidth and quality of service should be discussed in detail with the client’s IT department or support company upfront. In principle, there is no reason why it should be a problem for the security and building management systems to run on the same network as other IT systems, provided it can be managed using the likes of managed Ethernet switches.”

It is also important to clarify the division of responsibilities, according to Oosthuizen. “Let’s say you as an integrator have a 12 hour service level agreement (SLA) with the client and a switch fails. If their IT support company has, say, a 48 hour SLA, who takes the responsibility when 12 cameras are down and nobody can get into the access gate because the switch failed? Questions such as this should be ironed out between the SI and the client right at the outset,” he says.

Choosing the right SI

When there is so much to think about, what suggestions are there for partnering with an SI that meets one’s particular needs? According to Geldenhuis, a lot of players claim they can integrate anything and everything, but this is not always the case. “Such claims are not quite true as some vendors will not supply source code or interface software, or they provide limited interfacing but not down to the I/O level,” he says. “Most CCTV manufacturers are quite happy to share their interfaces, but this is usually not the case with access control systems, which is fair enough since you don’t want those systems to be too open.

“Today, cybersecurity rings are the most vital aspect to set up properly. Whoever writes that software must ensure it has no back doors, and we have found that the majority of smaller companies that do interfaces leave a back door open. Even when they write neat interfaces, the problem is they’re not always properly documented and supported. Continuity and migration paths are extremely important in today’s marketplace.”

“Systems such as security and BMS are all IP-based now, so it is important to have a good knowledge of software platforms to the point of being able to integrate deeply at the database level,” Buret states. “To this end, Sukema has database specialists, analysts and a full software development team, which is something very few other companies can boast.”

In Timmins’ opinion, it starts with looking at an SI’s track record and its ability to provide financial support. “Some integrators might have technical skills but are they going to be able to manage the cash flow? Do they just have one or two people on the electronics side or do they have a host of teams, commissioning engineers and project managers?” he poses.

Oosthuizen adds that it is important to consider what products from different vendors the SI has had training on and deployed in previous projects. “A good system integrator should be able to look beyond features and benefits and consider an holistic approach,” he says “They must be able to not just listen to what the client’s immediate requirements are, but do a proper risk assessment and investigation of what they require today, tomorrow and next year.”

For more information contact:

• BMS System Consultancy, +27 (0)11 432 6431, peet@bmssc.co.za

• G4S Secure Solutions (SA), +27 (0)10 001 4500, ess@za.g4s.com, www.g4s.co.za

• Sukema, 0861 116 103, info@sukema.co.za, www.sukema.co.za


Credit(s)
Supplied By: Technews Publishing
Tel: +27 11 543 5804
Fax: +27 11 787 8052
Email: vivienne@technews.co.za
www: www.technews.co.za
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Cybersecurity is not hype
    June 2018, Technews Publishing, News
    Regular readers of Hi-Tech Security Solutions will know that we have upped the amount of content we have about cybersecurity, whether it is aimed at the physical security market or not. This is not some ...
  • Residential Estate Security Conference
    June 2018, Technews Publishing, Calendar of Events
    Residential Estate Security Conference    14 August 2018 Indaba Hotel, Fourways, Johannesburg Following sold-out events in Durban in March 2018, Hi-Tech Security Solutions in cooperation with Rob Anderson, ...
  • PoPI and the role of biometrics
    June 2018, Technews Publishing, Access Control & Identity Management
    Not only is the visitor book dead, but careless capturing and storing of personal visitor information will soon land you in hot water.
  • Guarding your time with WFM solutions
    June 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Asset Management, EAS, RFID, Integrated Solutions, IT infrastructure
    Workforce management solutions ease some of the burden of out-of-sight-out-of-pocket costs for companies by instituting simple or complex checks to ensure that schedules are followed to the letter.
  • Simplicity, standards and predictability
    June 2018, Technews Publishing, This Week's Editor's Pick, Integrated Solutions
    In today’s world of technology, global communications and the IoT, we have almost endless options when it comes to building management.
  • Intelligence and compliance ­depend on data governance
    June 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management
    The growth of data in all its forms caused data governance to become increasingly complex, to the point where it is a skill in itself.
  • Data governance and security
    June 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management
    Data governance has become a key issue for all businesses, and as with all things data-related these days, security is a key component of data governance.
  • Afribiz Invest partners with RSS Security Services
    June 2018, News, Security Services & Risk Management, Retail (Industry)
    New security company RSS Commercial will give South African businesses and government departments fresh options, including the ability to maximise cost efficiency.
  • SA fraud statistics confirm higher levels of crime
    June 2018, This Week's Editor's Pick, News, Security Services & Risk Management, Retail (Industry)
    Once believed to be the domain of government, high level economic crime has become more common in the corporate arena with exposure of the wrongdoing of many reputable companies.
  • Integrated visitor management
    June 2018, Powell Tronics, Access Control & Identity Management, Integrated Solutions
    The effective integration of various products delivers seamless visitor management when the customer selects the right products and the right service provider.
  • Logical SAP access via biometrics
    June 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Linx/AS Africa recently held a conference in Johannesburg to highlight the company’s success in controlling logical access to SAP systems via biometrics, meeting compliance and governance demands.
  • The story behind an SA-made home automation solution
    June 2018, Technews Publishing, This Week's Editor's Pick, Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management
    The Sentian i3 is a ‘brain’ for home security, and comprises hardware, embedded software, a cloud service and user app. It can connect to existing alarm systems and off-the-shelf CCTV cameras.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.