The state of integration

August 2011 Perimeter Security, Alarms & Intruder Detection

Bernard Senekal starts a series of articles on integration and PSIM.

That word again?!

(in·te·gra·tion) – Combining parts so that they work together or form a whole.

By now most of you want to turn the page and I, for one do not blame you. I do however want to offer you this. Would you be interested in a solution that provides a honest and true approach to integration of physical electronic security equipment, allows you to leverage from existing spend in your enterprise and crosses all boundaries not caring which vendor or sub system you want to integrate too? Rather providing a truly agnostic approach to integrating the various technologies and solutions from multiple vendors presenting absolute value from your systems for the first time?

Over the next few months I will present you as reader with a view on what I believe to be true integrated systems. Ability that allows the voice of the end user to be heard, truly enhances operational efficiency, seriously proves reduction of costs and adds value to the spend that many organisations have made on several vendor-based systems over the years and will be making going forward. By no means are we stating that a purpose built subsystem (for example CCTV or fire) should be replaced by this technology, rather that the value of these systems talking together and across various vendors enhances the ability and other areas of an organisation positively.

We have all heard vendors claim that they are open, integrate to anything and that open standards like ONVIF (which by the way is not a standard yet, it s a work in progress with a very lengthy road ahead and pertains to video over IP only) are everything the industry hopes for. The key word here of course is hope because that is exactly what the status of integration in the South African market is based on today. When you actually contact certain vendors and ask them to talk to opposition vendors as far as integration, the reluctance to do so far outweighs the willingness.

Why? Because every vendor wants to rule the world and believes that in certain cases they have a full line-up of products that cater for the every need of an end user. Wrong! I state for the record that in no case does a single vendor have best of breed technologies in all areas of security and/or building management. You get best of breed in fire, video management systems, thermal cameras, megapixel and HD cameras, access control, analytics, intruder, perimeter, building management, video walls, and the list goes on.

No single vendor provides best-of-breed technology across all systems. To further complicate the case of the vendor, one year Vendor-A will have the best-of-breed in, say fire, and another year Vendor-B surpasses that mark with better technology and features. In all fairness this leaves the end user with a dilemma because the investment he made yesterday is not the investment he should be making tomorrow, thus the rip-and-replace culture was born. In the economic climate we live in today (and for the best part of tomorrow) organisations cannot afford to rip-and-replace, they need to find ways to create value and standard policy across all systems without having to replace those they invested in the day before. So how do we do this?

They say to understand where you are going you need to understand where you are coming from, so as a case in point I refer to the IT industry to sketch a picture that depicts the evolution that we in security are only now beginning to understand.

The IT world

If you were a banking environment, many years ago you would turn to a vendor to supply some mainframes and terminals and then appoint a dedicated team of the most creative Cobol programmers to write bespoke pieces of software to suit your needs. The dependence on these programmers and the hardware vendors were key to the success of the operations of the organisation. Times changed and vendors started developing more intelligent software packages that would be installed in client-server type environments where big software companies and some hardware companies benefitted from developing dependencies on their unique brand of solutions to gain market share.

But end users felt

1. Limited in what could be achieved by the features made available by these vendors, and

2. Entirely dependent on vendors dictating to them how they can and cannot operate based on the limited features available from these vendors for their specific business needs.

Some clever person then came around and stated that surely one bank looks pretty much like another, the same way that one distribution centre and retail operation looks similar to another. So why not create software that allows addressing functionality for these industries as 80% out of the box and 20% customisable? Finally, the call of the end user was answered and in IT today we have distributed intelligent systems architectures with everyone integrating to everyone else, or if you do not then you are out of business in no time.

And in security?

The sad reality is that security is only now starting to wake up to this demand from end users and many security strongholds today are still vendor driven and of the old-school approach. Security is integrating into the environment of IT faster than anticipated, specifically in South Africa where we find the so called tipping point (adoption of new and best-of-breed technologies) is faster than other areas of the world. It is reality that any good security consultant and end user managing a security portfolio for an organisation can no longer afford to be bound to the rules of yesterday.

So how do we present a solution to the challenge? In the next article I will focus on how this is solved through the introduction of software, that like in IT, present out of the box solutions to industry with customisable features to meet the requirements of the end user and the operational challenges they face daily. In short the acronym is PSIM or physical security information management. Creating software-based platforms that talk to many vendors and across all sub-systems in order to interconnect process, procedure and policy management across the enterprise.

For more information contact Sentronics, +27 (0)11 312 4147,  michelle@sentronics.co.za www.sentronics.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Exhibitions across the security spectrum
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
HomeSec Expo has become the security industry’s premier trade event. Visitors will experience a live showcase of how different aspects of the security spectrum come together under one roof.

Read more...
A clear vision for a safer, smarter future
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
With its authoritative lineup of sponsors and exhibitors, HomeSec Expo 2026 embodies an authoritative, yet pragmatic vision, for the security industry. It is a vision that recognises both the urgency of current threats and the excitement of technological innovation.

Read more...
South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
VM2 vibration detection monitor
Stafix Security Centres Products & Solutions Perimeter Security, Alarms & Intruder Detection
The JVA VM2 is a perimeter intrusion detection system designed to monitor one or two zones of microphonic (acoustic) cable to detect a perimeter breach through the noise and vibrations created by unauthorised access or vandalism.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Adding AI analytics to security monitoring
News & Events Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) AI & Data Analytics
SEON has announced its latest integration with Refraime, an AI-powered video analytics platform designed to elevate CCTV surveillance through real-time object detection and intelligent alerting.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.