Bringing different systems into a cohesive solution

June 2018 Retail (Industry), Integrated Solutions

Modern commercial environments no longer have the luxury of treating systems such as security and building management as isolated entities. As the demand for more integrated packages has grown, technologies have had to evolve to meet these needs and system integrators have had to expand their capabilities in order to provide more holistic solutions.

Hi-Tech Security Solutions spoke to G4S Secure Solutions (SA)’s Tim Timmins and MJ Oosthuizen, BMS System Consultancy’s Peet Geldenhuis, and Sukema’s Kevin Buret to examine what systems are being integrated together, and what end users should look for when choosing a system integrator (SI) to work with.

Make it user friendly

Tim Timmins
Tim Timmins

“Whatever software you are going to use, whether it is standard off-the-shelf or a customised package, you want to make it as simple as possible for an operator to use as a management tool,” Timmins begins. “From the system integrator’s point of view, this means you’re only training the end user on one software package, instead of separate systems for things like fire suppression, CCTV and access control. Ideally you want to simplify it to a single management tool through which you collate all this information as an integrated solution back to one software package.”

MJ Oosthuizen
MJ Oosthuizen

Oosthuizen adds that there is usually more than one party a solution must be tailored for. On the one hand, there is the security company or security manager on site, but depending on the situation, other users may need to be involved. In an business estate environment, for example, the head of security or risk manager might want to be alerted when a security breach occurs, and the way they are presented with information needs to be different to how it is presented to the control room.

“The manager may want to receive an alert indicating where an alarm was triggered by a fence or camera on their mobile device, and control how the relevant security company or service provider responds accordingly. It is important for a system integrator to consider how end users at different levels and with different roles require different information in different formats, and be able to tailor systems that allow all users to interpret the information that’s relevant to them,” Oosthuizen says.

Open or proprietary

Oosthuizen and Timmins are both proponents of using open platforms that can integrate all relevant systems. “If you choose more open platforms, using systems that have a proven track record of being able to talk to each other, it is much more cost effective and easier to do, with a lot less support involved,” says Timmins. “Typically you will find that video management systems (VMS) will support several thousand specific cameras, via direct integration over and above ONVIF integration. Open platforms are definitely, definitely the way to go.”

What is more, says Oosthuizen, having a solution that can integrate systems from different vendors spreads the risk faced by the end user. “In today’s global economy, the possibility cannot be ignored that a particular vendor will go out of business,” he states. “If you have a proprietary solution from that vendor that you’ve been locked into, you end up having to replace everything.

“To make their own jobs easier, integrators will often tell their clients not to worry about integration options or capability because everything comes from the same manufacturer. Not only does this end up locking the client into a proprietary solution, it also means they aren’t able to, for example, add a camera from another manufacturer that might come out in the future that has a particular feature they want to make use of.”

Oosthuizen also emphasises that a forward-thinking solution should be designed from the inside out. “Particularly for complex environments such as an office park or estate, instead of designing from the perimeter inwards, it is advisable to start with a strategy for how future-proof you want to make the site. This approach means that you first put the correct infrastructure in place, then look at the head-end system, and only then drill down to the sensor level (fence, intrusion, alarm, fire, etc.) that can actually plug into it,” Oosthuizen says.

Kevin Buret
Kevin Buret

Open platforms are all well and good, but not so open that they leave the back door open. “Every single edge device or endpoint is a hackable area – the Internet of Things (IoT) has made it a very dangerous game,” Buret cautions. “Too many customers have invested too much, over too long, into all the technology to expect them to want to strip out and replace with a single brand. Brand is irrelevant since technology is so similar these days – as long as it does the job and as long as we can pull it into an open platform such as a DSIM (digital security information management).

“Nowadays it’s all about the information that can be harvested from endpoints, and this goes beyond security, merging with the likes of building management and HR systems. When we talk DSIM we’re talking full bidirectional control. Being able to bring disparate systems into a single unified platform and control those systems with no limitation – that is true integration.”

Geldenhuis adds to this by saying that “many big companies have formed dedicated digitalisation divisions to look at all these different platforms and the IoT world we’re now faced with. Personalisation is a key trend in modern technology, so a DSIM allows a client to set up dashboards the way they want them and understand them. We have well and truly moved past the days of PSIM (physical security information management) and into the era of DSIM.”

Management platforms and IT infrastructure

When it comes to management platforms, Timmins’ recommendation is to choose one with a proven track record that is internationally recognised and best-of-breed. “The decision depends on how far you want to go with respect to integration. Important factors include what open protocols the platform complies with, licensing considerations, and support – ideally you want there to be not just one but a base of multiple local approved, certified installers,” he says.

Nowadays the effectiveness of a solution is intimately tied to the quality of the IT infrastructure it runs on, and an SI must be prepared and proactive in engaging with a client’s IT department to overcome any conflicts of interest. “It is important to get the buy-in of the IT department for its complete cooperation,” says Timmins. “Bandwidth and quality of service should be discussed in detail with the client’s IT department or support company upfront. In principle, there is no reason why it should be a problem for the security and building management systems to run on the same network as other IT systems, provided it can be managed using the likes of managed Ethernet switches.”

It is also important to clarify the division of responsibilities, according to Oosthuizen. “Let’s say you as an integrator have a 12 hour service level agreement (SLA) with the client and a switch fails. If their IT support company has, say, a 48 hour SLA, who takes the responsibility when 12 cameras are down and nobody can get into the access gate because the switch failed? Questions such as this should be ironed out between the SI and the client right at the outset,” he says.

Choosing the right SI

When there is so much to think about, what suggestions are there for partnering with an SI that meets one’s particular needs? According to Geldenhuis, a lot of players claim they can integrate anything and everything, but this is not always the case. “Such claims are not quite true as some vendors will not supply source code or interface software, or they provide limited interfacing but not down to the I/O level,” he says. “Most CCTV manufacturers are quite happy to share their interfaces, but this is usually not the case with access control systems, which is fair enough since you don’t want those systems to be too open.

“Today, cybersecurity rings are the most vital aspect to set up properly. Whoever writes that software must ensure it has no back doors, and we have found that the majority of smaller companies that do interfaces leave a back door open. Even when they write neat interfaces, the problem is they’re not always properly documented and supported. Continuity and migration paths are extremely important in today’s marketplace.”

“Systems such as security and BMS are all IP-based now, so it is important to have a good knowledge of software platforms to the point of being able to integrate deeply at the database level,” Buret states. “To this end, Sukema has database specialists, analysts and a full software development team, which is something very few other companies can boast.”

In Timmins’ opinion, it starts with looking at an SI’s track record and its ability to provide financial support. “Some integrators might have technical skills but are they going to be able to manage the cash flow? Do they just have one or two people on the electronics side or do they have a host of teams, commissioning engineers and project managers?” he poses.

Oosthuizen adds that it is important to consider what products from different vendors the SI has had training on and deployed in previous projects. “A good system integrator should be able to look beyond features and benefits and consider an holistic approach,” he says “They must be able to not just listen to what the client’s immediate requirements are, but do a proper risk assessment and investigation of what they require today, tomorrow and next year.”

For more information contact:

• BMS System Consultancy, +27 (0)11 432 6431, [email protected]

• G4S Secure Solutions (SA), +27 (0)10 001 4500, [email protected], www.g4s.co.za

• Sukema, 0861 116 103, [email protected], www.sukema.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Amendments to the Private Security Industry Regulations
Technews Publishing Agriculture (Industry) News & Events Associations
SANSEA, SASA, National Security Forum, CEO, TAPSOSA, and LASA oppose recently published Amendments to the Private Security Industry Regulations regarding firearms.

Read more...
Local is a lekker challenge
Secutel Technologies Technews Publishing AI & Data Analytics
There are a number of companies focused on producing solutions locally, primarily in the software arena, but we still have hardware producers churning out products, many doing business locally and internationally.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
From the editor's desk: What’s a trillion between friends?
Technews Publishing News & Events
Back in the bad old days of 2015, some (who didn’t want to take the blame for coming up with that number) estimated the amount of money lost to corruption by the South African government to be around ...

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
From the editor's desk: Interesting times
Technews Publishing News & Events
We certainly live in interesting times. From delaying the budget speech because the ANC doesn’t see any reason why VAT shouldn’t be increased by 2%, to crime fighters being set up and prosecuted in ...

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
AI for retail risk management
Surveillance Retail (Industry) AI & Data Analytics
As businesses face mounting challenges in a volatile economic environment, Ares-i remains an essential tool for proactively identifying, assessing, and mitigating risks that threaten operational stability and customer satisfaction.

Read more...