The most important features of a management platform

September 2018 Editor's Choice, Surveillance, Access Control & Identity Management, Information Security, Integrated Solutions

There are bits of software all around the security industry that help one manage your security products, some focus on one product or brand, but it’s more common these days to find the better platforms allow users to manage a number of products from different brands.

Unfortunately, when looking for an application that will provide a single interface to effectively support you in managing and optimising your security installation, simply taking the free stuff offered with a product you buy will not make the grade. That’s not to say the free stuff is not useful, it is, but it will fall short when trying to integrate multiple products and solutions into the same management dashboard.

Hi-Tech Security Solutions decided to ask a number of industry players for their opinions on what makes for a good management platform. To avoid getting a long list of features, we asked our interviewees to give us the top three features they think are non-negotiable when it comes to selecting a management platform.

Gus Brecher
Gus Brecher

Gus Brecher, Cathexis Technologies

Is the system effective and efficient? For a system to be effective, it needs to reliably achieve the objectives outlined by the customer or their consultant. For optimal effectiveness, one needs to ensure that the system is capable of integrating with the required best-of-breed systems, like IP cameras, access control, fire and intrusion systems, fence monitoring systems, intercoms, gate controllers and the like, depending on the site requirements.

Some people confuse effectiveness with efficiency. But a solution can be effective without being efficient. In other words, one can achieve the ultimate goal in an inefficient way by utilising unnecessary resources or time to achieve the result. An efficient system will provide the effectiveness required with a minimum of resource, time or effort. It is therefore important that:

a.) Timeous and accurate information be provided to the operators relating to incidents to enable them to take immediate action, and

b.) The system provides the ability to easily recover video and associated data without having to move across multiple platforms to do this.

System integrity: There are several facets to this and one needs to consider:

a) The ongoing reliability of the software and/or hardware to ensure maximum up-time,

b) Security and encryption of data and video (video encryption, watermarking etc.) to ensure that the integrity of the information cannot be attacked in a court of law,

c) Security measures to prevent cyber-attacks via the various components of the system,

d) Compliance to PoPI requirements, and

e) Local support to ensure continuous current and future system optimisation.

Is the system open? With technology improving at an alarming rate, be sure to choose a solution that is open in its approach to technology. This openness allows for the various, integrated best-of-breed product manufacturers to improve their respective products and will allow you to upgrade individual components of the system without disrupting the core functionality. The ultimate result is a solution that provides an upgrade path to future technologies that could improve the overall effectiveness and efficiency of the solution.

Brent Cary
Brent Cary

Brent Cary, Genetec

Unified and efficient. While organisations look to incorporate video surveillance and access control systems that provide greater interoperability as part of their security strategy, the majority of security manufacturers have continued to provide disparate systems, with limited communication between systems.

With the recent advancements in software technologies, and the ongoing partnerships between security manufacturers, integration has become a popular substitute for traditional interfacing. However, even integration has its limits. The answer can be found in a single software platform that can manage access control, intercom, intrusion, and video devices, while offering a unified interface to monitor the entire system. Such a system goes above and beyond the basic functionalities of interfacing and integration, while offering end-users an efficient, flexible and cost-effective option to system unification not available with highly customised and expensive solutions like PSIMs.

With a unified system, only a single software platform needs to be upgraded and maintained unlike an integrated solution where multiple individual systems must be addressed. This greater convenience allows integrators to save time when upgrading the security system, and also enables them to coordinate with a single manufacturer should support be required. This also allows end-users to minimise system downtime during upgrades and ensures a quicker response time to address the requirements of their system.

Flexible and scalable. A single user interface for multiple security applications allows operators to easily and efficiently move from one security task to another within the same interface, thus avoiding complicated workflows and interface manipulations to reach the required window.

The user’s workflows are consistent between the video and access control tasks, so the user becomes more familiar with the system, experiences self-learning, and gains more confidence in their ability to use the system. More so, the total number of workflows to understand is reduced by having common core functions. For example, alarm management, event to action, reporting, investigation, and incident-related workflows are all the same regardless of whether it is for video, access control, or voice communications. As unified systems share a common user interface, switching from one application to another is seamless, and less time is required to train new operators on individual systems.

Reliable and secure. Cybersecurity can no longer be an afterthought, or something added on top of an existing product. We all need to be confident that our systems are secure from both a physical and a cyber perspective. To build this confidence, organisations should be working with companies and vendors that have a clear vision that includes baking cybersecurity into their products. Today’s solutions must allow us to take steps to maintain and improve network security, particularly as the IoT expands. These steps include authentication, authorisation and encryption.

Through the process of authentication, organisations can determine if an entity – user, server, or client app – is who it claims to be and then verify if and how that entity is allowed to access a system. Authorisation allows administrators within an organisation to restrict the scope of activity within their system by giving access rights to groups or individuals for resources, data or applications and by defining what users can do with these resources. And encryption protects an organisation’s information and data by using an algorithm to translate plaintext or readable text into ciphertext or unreadable text.

By protecting access and communication, we can all work towards ensuring that our systems and networks are secure as the world continues to embrace the IoT. This will allow us to mitigate the risks as we reap the benefits of increased connectivity.

Armand Steffens
Armand Steffens

Armand Steffens, Milestone Systems

Partner community. No business will be successful unless it is at least adequate, and preferably superb, in product development, sales, and customer engagement – not to mention finance, planning, marketing and recruiting. Too many VMS producers are trying to do all these things themselves, when they should be doubling up on what they are best at and leveraging the rest. It is a new mindset. Instead of obsessing about which ‘me-too’ product to supply, software producers could make their first priority finding complementary and compatible partners.

One partner might see the opportunity to sell a solution. Another partner might know a better way to distribute a product. A third partner might provide the vertical expertise to get the customer a perfectly tailored solution. By leveraging partners and developing a partner ecosystem, a company will tend to have more unique offerings and the ability to execute faster in an ever-changing world.

All this additional partner horsepower is still no guarantee a company will succeed, but partnerships will also give a company a feedback channel. Many stand-alone companies plod along, never quite failing, but never getting better either. Partners are less likely to tolerate business limbo. They will be quick to utilise great products and less wedded to the concept if it doesn’t work out. Because the partners are in close contact with the market, they are the first responders to changing or developing needs. This is why a company should listen very closely to their partners: They are the feet on the street and the ears to the beat.

True open platform. Producing software takes time, and producing great software takes even longer. This means low agility. The partners might identify great opportunities, but before the closed platform software producer can react, the opportunities might be gone – or worse, be grabbed by competitors. The slow reaction capabilities of closed platform providers will frustrate partners, and may lead to the worst of all complications in a partnership: distrust.

When the products are based on an open platform, however, they are adaptable. Then the partners have the ability to change the solution through the open software architecture. Not by changing the basic code (that would be open source), but by add-on modules and intrinsic scripting abilities. Open platform means that the partner easily can extend and enhance the software into a total integrated solution to fulfil customer’s needs with a minimum of effort.

There are some important things to note here. The ways to extend and enhance the software have to be easy and well documented, and the partners must have access to training and knowledge sharing.

Community approach with customer focus. The Milestone partner ecosystem is a fundamental part of our mindset and daily operations. It is one of the major reasons for getting the company to the position it is in today. Today our partners are delivering optimal solutions to our mutual customers, building a better and open business world with video as a business enhancer.

Jayne Nel
Jayne Nel

Jayne Nel, VantageMDT

Integration. The primary capability of today’s advanced management platforms is the ability to integrate multiple disparate systems into a single, centralised interface. The architecture of these systems is flexible enough to cover multiple physical locations while supporting and bridging the gap between a vast range of integrated solutions – with the ability to grow, expand and adapt.

The platform must have an open architecture that provides a means of integration that is simple, maintainable, cost-efficient and scalable. The flexibility to integrate seamlessly with virtually any solution from different manufacturers, including legacy systems, saves organisations money while streamlining operations and providing more complete information for incident response.

Further increasing effectiveness, leading management platforms standardise functionality across different classes of systems, eliminating costly bespoke solutions, and delivering a consistent user experience. For example, regardless of manufacturer, every access control or video surveillance integration should perform the same when integrated with a management platform. This ensures security personnel can follow established response procedures no matter what system they happen to be connected to. Consider the impact of introducing an operator to an unfamiliar system or user interface during a high-pressure situation. There is tremendous value in providing an operator with a familiar user interface in any situation to optimise the potential for calm, standardised response.

Incident response and resolution. Effective incident response relies on good standard operating procedures (SOPs) that direct an operator’s actions based on the nature of an event, its location and other criteria. These are sometimes overly complicated, requiring security staff to consult separate documents to identify the appropriate response and then follow a long list of time consuming manual steps to resolve the issue.

To ensure the most efficient, consistent and effective response, operators need a set of simple steps to follow. Simplicity is the key, and today’s PSIMs utilise automation to speed response and reduce the potential for human error or overreaction by automatically performing formerly manual processes based on SOPs.

With automated log-in to Active Directory, identification of an incident’s location (GPS), pinpointing the nearest camera and other actions, a 30-step manual response can often be reduced to five or six steps. This ensures that operators are directed to perform the critical tasks that require human intervention such as determining whether a person seen on video is a potential threat, what he or she looked like and other factors used for identification, situational assessment and proper response.

With automation, organisations can keep complex processes in place while presenting operators and security officers with simple, streamlined actions to make them more effective at responding to incidents, even those they’ve never experienced before.

Intelligent reporting and insights. In addition to situational awareness, PSIMs can also analyse the data they capture to provide deep insights and intelligence about security, business and overall organisational operations, both in real time and over extended periods of time. Armed with this information, organisations can better prepare for events and identify any changes that can improve response and staff adherence to SOPs. These solutions can provide in-depth views into specific incidents as well for post-event analysis that can further improve security and operations.

David Heenan, ISDS

Define your strategy. Before making any decisions in respect of a VMS, a view needs to be taken on your video surveillance security strategy. My personal view is that video security technology needs to be layered to allow for new technologies and requirements to be integrated as they develop.

Starting with the installation of a CCTV solution and then a VMS to manage the video feed from multiple cameras, one then needs to layer intelligent software to meet specific needs as they arise – these may be pro-active alerting, operator efficiency, post event analysis, business intelligence, etc.

Equally important in selecting your VMS is to consider the track record, longevity, global install base and industry and peer review of the product. There have been many instances over the years of new VMS solutions with massive marketing campaigns at launch, but little skill to support them, particularly in markets outside of the country of development.

Organisational impact. Impact on your organisation’s IT security and cybersecurity architecture is another critical consideration. Select a VMS that:

a) Offers a tiered system architecture, which makes it possible to separate the camera network and the core server/client network,

b) Has tiered administration and user rights, enforced on the server side, combined with the use of standard IT security procedures, and

c) Runs on IT platforms such as Windows that are well supported in terms of administration and monitoring and already provided for in your security policies. Do not create additional, unnecessary, complexity in your security architecture or support capability.

The return on your investment over a long period of time is a high priority for all organisations. When calculating your ROI on a management platform, look at total cost of your security solution and the cost impact on your entire IT install. A VMS is generally a very small cost in the overall security solution, but selecting the wrong VMS can make a huge difference in overall IT costs. A proven track record will provide a lot of comfort in respect of impact on your entire IT install. Do your homework on the longevity of VMS solutions at other clients – longevity has a big positive impact on your ultimate return on investment.

Interoperability and integration. With the rapid pace of development in the AI field as well as on the cameras themselves, your VMS has to be able to assimilate and integrate with the best technology in the industry as it develops. One does not want to be restricted to proprietary technology or products. The VMS is the single most important tool in the management of video and must support best of breed software analytics and as many hardware brands as possible. Open access platforms which encourage user friendly and cost-effective integration with third-party software simply have to be a priority in your decision making.

Dean Sichelschmidt, Arteco

Flexibility and ease of use. Flexible and user-friendly management software is the key in order to satisfy everyone’s needs, from system administrators to operators and end users. A flexible licensing model gives you the freedom to add new technologies as they are developed, allowing you to continually update and improve your solution.

Another key factor nowadays is security in mobility. We do believe it is now mandatory to offer mobile apps for Android and iOS devices. Our mobile application, available for free, allows for multi-site management, access to live and recorded video, PTZ control, push notifications and evidence sharing via third-party apps.

Integration and interoperability. For a typical VMS, many components beyond cameras are required, such as network routers, switches, wiring, servers, backup power supplies and many other systems. Having a VMS with a real open platform is very important. The possibility to integrate with the best video analysis and security solutions means unlimited possibilities and to have a ready solution for future innovations.

Total support. Customer care is very important. Having a prepared, reactive and always up-to-date global support team is fundamental in today’s security market. We see that helping customers solve their issues, even non-related to our VMS, is one of our most appreciated and recognised value. At every stage, from project management to pre- and post-sales, attention to customers is our primary commitment.

For more information, contact:

• Arteco, +27 81 443 8583, [email protected],

• Cathexis Africa, +27 31 240 0800, [email protected],

• Genetec, +27 82 854 1278, [email protected],

• Milestone Systems, +27 82 377 0415, [email protected],

• ISDS, +27 11 326 2227, [email protected],

• VantageMDT, +27 72 948 2017, [email protected],


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Local manufacturing is still on the rise
Hissco Editor's Choice News & Events Security Services & Risk Management
HISSCO International, Africa's largest manufacturer of security X-ray products, has recently secured a multi-continental contract to supply over 55 baggage X-ray screening systems in 10 countries.

NEC XON shares lessons learned from ransomware attacks
NEC XON Editor's Choice Information Security
NEC XON has handled many ransomware attacks. We've distilled key insights and listed them in this article to better equip companies and individuals for scenarios like this, which many will say are an inevitable reality in today’s environment.

Gallagher Security launches Augmented Reality Training in Australia
Gallagher Training & Education Access Control & Identity Management
Gallagher Security has announced the latest addition to its innovative suite of training solutions, Augmented Reality Training, demonstrating its continued commitment to innovation and improving access to security training opportunities.

Fluss launches the next wave of IoT solutions
IoT & Automation Access Control & Identity Management News & Events
Fluss has announced its newest IoT product; Fluss+ continues to allow users to manage access from anywhere globally and brings with it all the advantages of Wi-Fi connectivity.

The future of digital identity in South Africa
Editor's Choice Access Control & Identity Management
When it comes to accessing essential services, such as national medical care, grants and the ability to vote in elections to shape national policy, a valid identity document is critical.

Do you need a virtual CIO?
Editor's Choice News & Events Infrastructure
If you have a CIO, rest assured that your competitors have noticed and will come knocking on their door sooner or later. A Virtual CIO service is a compelling solution for businesses navigating tough economic conditions.

Storage Selection Guide 2024
Storage Selection Guide Surveillance
The Storage Selection Guide 2024 includes a range of video storage and management options for small, medium and large surveillance operations.

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

From the editor's desk: AI and events
Technews Publishing News & Events
      Welcome to the 2024 edition of the SMART Surveillance Handbook. Reading through this issue will demonstrate that AI has undoubtedly made its mark on the surveillance industry. Like ‘traditional’ video ...