Security solutions for the mid-size company

November 2005 Integrated Solutions

Third-generation solutions allow for expansion and integrated remote control of smaller sites.

Designing and deploying an integrated security system for mid-size companies is often like fitting a square peg in a round hole. Traditional integrated security systems were either designed for smaller, single-building installations or larger, multilocation corporate campuses. The systems were either hard-wired, single-facility systems or high-end, expensive client-server-based systems.

But the maturation of IP-based security systems is revolutionising the options mid-size companies have for installing and scaling their security systems as business expansion and acquisitions dictate, while containing operating costs at the same time. These new systems are based on 3G - third-generation - system architectures borrowed from the IT world.

Three keys to design

This paradigm shift in security offerings with today's IP-based security systems is made possible by incorporating three key elements into the design of products: application scalability, geographic independence and web-based architecture. These elements directly address the costs to install, administer and maintain a fully integrated system.

Application scalability, simply put, is the integration of a broad mix of security management applications into a single system. Common applications include video, visitor management, access control; alarm monitoring, intercom and temperature monitoring. Applications can be added at any time to meet the specific needs of the site.

Geographic independence is the ability to expand the product from a single system to a global network of systems regardless of where the components are located. This is especially important for businesses that grow by acquisition or that are expanding offices in remote locations. A critical feature for these customers is a system that allows the management of a mixed card population, avoiding the need to re-issue access credentials.

The third element of the product design is a Web-based architecture. Web-based architecture allows an application to use a common Web browser to deliver an easily understood and rich user interface. This means that not only are systems easier to learn because they behave like common Internet websites, but their use often does not require the installation of special software - the web browser is already there.

Some newer systems take these elements one step further by providing a solid-state implementation, meaning that they have no moving parts and thus have MTBF (mean time between failures) far in excess of systems that require traditional PC servers. Network-based solid-state systems that require more memory than conveniently fits can use network attached storage, available these days for very reasonable prices.

Scalability and complexity

As expected, when a business grows and the scale of a security system increases, the price and size of the system will also increase. These new 3G systems allow mid-sized businesses to expand their integrated security platform at their own pace, without having to 'over-buy' up front to enable future expansion.

In the scalability and complexity matrix (Figure 1) you can see that there are many security systems available to meet the differing levels of complexity and scalability. However, two significant problems are evident when looking at today's offerings.

Figure 1
Figure 1

First, as a mid-sized company grows and moves up either axis, or both axes, it is forced to switch security systems. Second, in many cases, there is no simple solution available to meet the company's specific mix of scale and complexity. For instance, if a company grows by adding a number of small sales offices, it would have to buy a high-end system in order to acquire the features to integrate these individually simple small sites under one access control management system. Today's evolved 3G systems use communication over the Internet to drive down the cost of integrating multiple sites.

Mid-size company market drivers

Mid-sized companies will recognise the largest set of benefits of 3G IP-based systems. Mid-sized businesses differ greatly, though most tend to have annual revenues of between $20 million and $1 billion and employ between 100 and 1000 people. These businesses tend to go through the most changes via growth and divestitures.

Let us think about that. The security needs of a 100-person business and a 500-person business are very different. The infrastructure requirements of a $10 million company vs a $1 billion company are worlds apart. Due to their differences, these types of businesses have the greatest need for the flexibility and scalability that is inherent in IP-based systems. While statistically diverse, mid-sized companies have some common security needs that are driving today's security market.

Most commonly, mid-sized companies need to incorporate disparate facilities and sites into the enterprise security structure. Many mid-sized companies maintain small, dispersed facilities that do not have integrated security protection and are thus lacking the convenience and cost advantages of an integrated security system. These companies are looking to extend the enterprise security umbrella to include these locations to help manage liability and threat levels and to facilitate audit and control. However, the economics of small, integrated systems prevent their installation in multiple facilities.

A second market driver is greater management control over security. A substantial number of mid-sized companies are using smaller systems but require integration features that exceed those that are provided by low- to mid-priced security products.

Along with this increased control is the need to integrate new technologies, such as VoIP, into the physical security function. Mid-sized companies are increasing IT spending at a rapid pace; however, for the most part they are not actually increasing IT or security staff. Instead, they are looking for solutions that tightly integrate IT functions and that capitalise on their IT infrastructure to keep operating costs at a minimum.

The third market driver is, of course, cost. Many mid-sized companies have very specific high-end security requirements, but lack the budgets to implement top-shelf systems with their high installation and ongoing cost requirements. These companies are looking for systems that can reduce installation, maintenance and operation costs. IP-based systems offer lower total cost of ownership by sharing resources with IT yet integrating existing physical infrastructure such as readers and monitoring points.

Guidelines for purchasing security as a solution

The combination of these market drivers and the new technologies these emerging 3G systems require has transitioned the security purchase from a product purchase to a solution purchase. The following are a few of the key questions that mid-market companies should ask when selecting a 3G security solution.

* Does the vendor's applications roadmap align with your long-term goals?

* Is the integration of applications built into a product or pieced together from acquisitions?

* Can the dealer/integrator work with security, operations and IT in order to understand IT needs and installation requirements?

* Does the system provide security and authentication technology to safely connect remote sites over public Internet connections without requiring additional expensive IT equipment?

* Does the vendor's product support the standards your IT department will require (TCP/IP, XML, ODBC)?

* Do monitoring workstations only require a standard web browser (no application client software installation)?

* Is the security system hardware completely solid-state with no moving parts which lower MTBF?

The interaction of the security solution with existing and planned IT infrastructure is an increasingly important criterion that must be considered when purchasing a security solution. It is critical that security plans are aligned with IT expansion. One of the simplest ways to ensure that the solution will interact smoothly with IT systems is to select a vendor who has a history in both physical security and IT development. This IT integration requires a close consideration of both vendors and product attributes, to ensure that a solution will fit into a company's long-term IT planning.

Today's solutions offer mid-sized companies the opportunity to achieve the high level of security that they require, whether it be the tight integration of security applications, centralised management of multiple sites, tying together security with IT systems, or any number of customised configurations. With 3G systems, companies of all shapes and sizes no longer need to shop for the product that is closest to their needs. Instead they can select a security solution that meets their current and future needs.

The way forward

To address the above problems and many more, S2 Security Corporation, headquartered in Wellesley, Massachusetts, has developed the (3G) S2 NetBox.

The S2 NetBox is the first physical security management system to integrate access control, alarm monitoring, video, intercom and temperature monitoring applications in a small-form factor network appliance. The S2 NetBox utilises a new system architecture that moves advanced physical security capabilities to the network edge, eliminating the need for a separate PC-based server. This architecture makes it possible to deploy systems that scale from single facilities to multisite organisations - all over an IP network. See Figure 2.

Figure 2. S2 Security Corporations typical 3G solution (S2 NetBox)
Figure 2. S2 Security Corporations typical 3G solution (S2 NetBox)

Unlike other integrated security systems, the S2 NetBox uses existing LAN, WAN, and Internet connectivity in place of proprietary wiring. Users interact with the S2 NetBox through a web browser, making it unnecessary to install or maintain software on any PC server or client - a feature we call 'zero-footprint software install'. The network connectivity and browser-based user interface (See Figure 2) of NetBox make the system completely independent of geography, enabling users and system integrators to perform monitoring, control and maintenance from any computer at any location with a network connection. Because the browser interface looks and operates like a website, users become proficient with little training. And of course, as it was designed from the ground up as a network appliance it incorporates all of the data security techniques, such as SSL, SHA-1 MAC encoding, etc, required to make it a good and secure network citizen.

For more information contact Phil Mailes, S2 Security Corporation, 0944 1483 852181, [email protected], www.s2sys.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Cape Town estates gain access to advanced security technology at Securex
Securex South Africa News & Events Integrated Solutions
For the first time, estate and complex security decision-makers in the Western Cape will have direct access to the breadth of solutions and expertise these shows are synonymous with.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Making drone security more accessible
Editor's Choice Integrated Solutions Residential Estate (Industry) AI & Data Analytics IoT & Automation
Michael Lever discusses advances in drone technology, focusing on cost reductions and the implementation of automated services, including beyond line of sight capabilities, for residential estates with SMART Security Solutions.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
SMART Estate Security Conference KZN 2025
Arteco Global Africa OneSpace Technologies SMART Security Solutions Technews Publishing Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
May 2025 saw the SMART Security Solutions team heading off to Durban for our annual Estate Security Conference, once again hosted at the Mount Edgecombe Country Club.

Read more...
Community-centric security architecture
Regal Security Distributors SA Integrated Solutions Residential Estate (Industry)
Securing any large area, whether it is a commercial park or a residential estate, is as much about protecting and monitoring the internal environment as it is about protecting the perimeter.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Layered security for complex spaces
Regal Security Distributors SA Integrated Solutions Industrial (Industry) Commercial (Industry)
The positive impact of loss prevention and risk management on the bottom line is far more than just a number; it means that assets are physically secure, insurance premiums remain low, and people are protected.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.