Integration: doing it right

June 2013 News & Events

System integrators are called in to do complex projects that require a high level of skills and experience. But how many integrators are able to retain the required skills? More importantly for the integrators, how do integrators today retain their customers when there is a guy with a bakkie and a screwdriver willing to do it for next to nothing?

Mike Smiles
Mike Smiles

Continuing our focus on how integrators are dealing with the realities of operating in South Africa today, Hi-Tech Security Solutions asked Mike Smiles, MD of Masc Solutions for his take on the situation.

Hi-Tech Security Solutions: How difficult is it for SIs today to obtain good technical skills that they can put to work immediately?

Smiles: There is a serious shortage of technically competent individuals and most new entrants to the market have a very basic level of product knowledge and very little understanding of what system integration actually entails.

Hi-Tech Security Solutions: Are IP-related skills more available than ‘traditional’ security skills?

Smiles: The number of people who have basic IP-related skills far exceeds those with genuine IP security capabilities, however, the general IP products being installed do not require a high degree of technical knowledge because virtually all installations utilise similar topology, therefore there is a great degree of repetition which is not the case with IT security.

Hi-Tech Security Solutions: What do you do to get the skills you require? Train? Ask distributors for assistance? Hope for the best?

Smiles: We invest large sums of money ensuring our technical support staff are certified to work with the software and hardware products we offer and support, these product skills are also enhanced by generic software certification provided by the various Microsoft certification courses that are readily available. Sadly, most security companies are dependent on the support provided by the product distributors, however, in most instances the distributor does not possess the implementation skills needed for genuine system integration and will always attempt to force the installer to use products from their range, even when these are clearly not suitable for the application.

Hi-Tech Security Solutions: Once you have skills, how do you retain them and prevent poaching and job hopping?

Smiles: Retaining skilled individuals requires companies to respect the individuals and ensure they are given opportunities for personal upliftment and financial compensation for their technical abilities and loyalty. It also requires support for these individuals who more often than not are expected to install, commission and maintain complex systems without any support from senior management within the organisation.

Hi-Tech Security Solutions: From the customer perspective, how do you ensure customer loyalty when there is always someone willing to do it cheaper? What do you do/offer clients to keep them coming back?

Smiles: Customer loyalty is achieved through the provision of best-of-breed systems and excellent on-going support. Sadly, there are far too many 'integrated' systems being sold that never meet the client’s expectations because of poor installation practices and product selection. In addition, failure to engage with the client to enable them to understand the role they need to play in the continual management and administration of the system often results in total under-utilisation of the system after installation.

Hi-Tech Security Solutions: Do you have limited liability clauses in your contracts as part of your SLA? How do you differentiate between normal maintenance/warranty work and work you charge for (because, for example, someone working for the client decided to move the cameras or change the software configuration)?

Smiles: Our standard SLA defines the extent of the work covered by the agreement and clearly differentiates between preventative maintenance and hardware/software changes. Where security systems use the clients network infrastructure, this becomes more complicated because there is a split responsibility and most integrators and many clients do not understand how to manage this process

Hi-Tech Security Solutions: How does an integrator ensure the standard of work is maintained when they are under consistent price pressure?

Smiles: If integrated security systems are installed using defined quality controlled standards and best-of-breed products, very little preventative maintenance is required as in most instances it is the mechanical portions of the project, electromechanical locks, vehicle barriers, turnstiles etc that require the greatest attention. Sadly, the lack of product skills and installation standards deployed by the vast majority of systems integrators often results in most systems being extremely unreliable and therefore requiring constant attention.

Hi-Tech Security Solutions: What is the one greatest challenge you as a systems integrator face in your day-to-day operations?

Smiles: The majority of new integrated security systems are being specified by electrical consultants who have a total lack of product awareness relating to our industry. The continual habit of 'cutting and pasting' specifications from one project to the next or simply including a generic, but product specific A&E specification as issued by one of the many security product suppliers/distributors is by far the greatest challenge.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Gallagher Security’s Integrate Roadshow
Gallagher News & Events
Gallagher Security recently teamed up with nine technology partners to showcase the latest integrated security capabilities at the Integrate Roadshow in Durban, bringing together about 60 attendees, including end users, channel partners, consultants, and other industry professionals.

Read more...
Ransomware impersonates employees and self-spreads
News & Events
Following a recent incident, the Kaspersky Global Emergency Response team is shedding light on an attack where adversaries crafted their own variant of encryption malware equipped with self-propagation capabilities.

Read more...
Level of RDP abuse unprecedented
Sophos News & Events
Cybercriminals abused Remote Desktop Protocol (RDP) in 90% of attacks handled by Sophos Incident Response in 2023, Sophos’ newest Active Adversary Report finds. External remote services were the number-one way attackers’ initially breached networks.

Read more...
Hexagon rebrands Qognify
News & Events
Hexagon’s Safety, Infrastructure & Geospatial division announced that Qognify has officially adopted the Hexagon corporate identity and fully integrated into the division as the physical security business unit.

Read more...
Five efficiency strategies for your security installation business
Securex South Africa News & Events
A recent conversation with one Securex South Africa 2024 exhibitor, led to the event organisers being able to share some advice on helping security installers make their businesses more efficient.

Read more...
Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...