Enterprise security and integrated systems

February 2008 Integrated Solutions

Smart building systems, open systems architecture and enterprise integration are regular phrases bandied around the corporate world to encapsulate the integration of various systems into a single interface.

There are a wide variety of offered solutions and most state that they will and can integrate legacy systems into one management system providing 'effective management', 'risk mitigation', 'energy savings', 'cost effectiveness', 'improved results' and many other claims. However, where are the pitfalls and what should you really be looking for when considering the hype and the badging of these technologies into one common interface?

A management system is a means of integrating and converging various sub-systems and technologies into one single platform. Three historical streams have been progressively converging into one common platform:

* Security management - combining cameras (IP and analogue), DVRs and NVRs with access control, security systems, fire and safety platforms.

* Building management - BMS - combining HVAC, electrical, lighting, UPS, lifts and escalators etc.

* Facilities management - combining maintenance, administration, assets, cleaning, etc.

Terms such as SCADA (supervisory control and data acquisition) or PLC ([programmable logic controllers) or RTU (remote terminal unit) or even HMI (human machine interface) are all really some form of management system interfacing to component platforms involved in one or more of the above. Therefore, how does one know and understand what the management system provides and why might it be different from the various competitors in the market place?

The first step must be to establish what is to be achieved. One client may require the integration of different CCTV platforms and some 12 different access control systems into one coordinated managed system. This is across more than 200 buildings. The solution is to either take a basic remote site interface that may be universally available, to utilise a 'standard protocol' or to approach each vendor company and ask for the relevant native drivers. The practical application of this route will be determined by the cost of the driver development and as we have seen with several suppliers the offered cost of the driver development amazingly outweighs the cost of a new replacement system.

It is sometimes difficult for the layperson and/or decision maker to understand what is being referred to in the above statements. Therefore, the following should simplify and provide direction in the questions before committing a large budget spend to a product or system that might significantly restrict choices in the future. In the case of the previous example with 200 buildings it could well be better for each CCTV system and access control to operate into their own management layer on site, with a remote transmission device for central control room management. However, should a user be looking for more than this and the integration of say lighting and electrical systems then the benefits of a full management system would come into play; this would all be price dependent upon consideration of what he needs to achieve.

Having decided to run with a management system the rule is to allow each separate device to perform its relevant functionality individually and to interface key triggers to the management system. This provides standalone control and an element of redundancy in case of a problem with any component. The central control management software interface will then manage each of these systems as an additional layer to confirm, display the event and provide a course of action. This control room interface often uses a variety of open system communication protocols such as IP, Modbus, BACnet, LonWorks, SNMP etc; these are standard protocols but you need to be aware that they are also developed into proprietary packages. The core to this issue is where we have seen the driver controlling the system device only able to operate the basic functionalities of the system. A simple example is the Modbus protocol which provides an open system standard, therefore using this protocol will provide a simple language to convey a standard instruction to the allocated receiving system. The critical point is to know that all of the required functionality for that system is contained within the open standard of the protocol or if there are hidden functions that have been made proprietary. For instance the open part of the protocol may allow simple controls but may prevent you from the advanced aspects of controlling the system thus reducing an expensive system to a limited capacity. The solution is to ensure that you have written confirmation of the full functionality of the system you require within the driver that you will be given. This is why your preference should be to create a native system driver from the original protocols to give you this full functionality with optional upgrades as and when they become available. This relies upon being able to source these protocols from companies that are all in competition with each other and herein lies the core problem as Company A will not necessarily be given the protocols from a best of breed product from Company B.

The scalability of a true open architecture management system should allow you to choose the levels of integration you require. Integration does not have to be an expensive choice; it is completely scalable and modular/granular so you therefore do not need to be locked into one single brand. In some cases initial use of your chosen management system will be for CCTV and access with perhaps fire and safety later, developing into greater integration as and when needs and budgets become available. The integration should be through whatever communication protocol you desire and should enable you to choose the best of breed products without being forced to go with an in-house range. In this way you can plan your integration and see the immediate return on investment according to the systems you want to integrate.

For more information contact Vision Catcher, 0861 VCATCH (822824), [email protected], www.visioncatcher.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Vumacam and NAVIC enhance SafeCity initiative
Integrated Solutions Security Services & Risk Management
Vumacam and NAVIC, two of South Africa's most respected surveillance technology and vehicle intelligence providers, are proud to announce an alliance that will greatly expand the coverage and impact of the SafeCity initiative across the country.

Read more...
Gallagher Security’s achieves SOC2 Type 2 recertification
Gallagher News & Events Integrated Solutions Infrastructure
Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the cloud-hosted services of its integrated security solution, Command Centre. The recertification was achieved on 21 December 2023.

Read more...
Integrated transportation security
Guardian Eye AI & Data Analytics Integrated Solutions Logistics (Industry)
HG Travel installs an AI-powered camera system integrated across 115 vehicles throughout a fleet comprising 160 vehicles of different sizes, along with predictive and self-monitoring tools to track tyre condition, fuel consumption and theft, and overall vehicle maintenance.

Read more...
Embracing next-generation surveillance for safer cities
Surveillance Integrated Solutions AI & Data Analytics
With the South African government highlighting the importance of building smart cities by integrating advanced technologies to make them more resilient and liveable, the role of next-generation network video and surveillance technologies cannot be ignored.

Read more...
Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

Read more...