Unification for better security, efficiency and flexibility

CCTV Handbook 2021 Integrated Solutions

Physical security is – or should be – at the core of any business operation. Providing a safe and secure environment for employees and visitors is essential. As such a baseline security system is necessary to shift focus from security and to production, sales, and ultimately, success.

Video surveillance, access control, intrusion detection, communications, licence plate recognition and analytics are all key components of a modern security solution. While video and video analytics provide

high-value applications for improved operations and customer experience, access control helps ensure the flow of people, while ALPR and communications helps eliminate bottlenecks caused by gates and human interaction.

When these systems work together cohesively through a unified platform, they not only secure a business, but yield actionable business intelligence. Combining and leveraging this intelligence with operational data helps improve a company’s efficiency. As such, in selecting a security product to protect a business, you are not only investing in a system that works now, but a solution that adapts and changes with the needs of your business.

Unified and not just integrated

Like the rest of the software industry, the security sector has worked to develop a variety of methods to bring separate physical security solutions together via integration. Unfortunately, integration is simply a combination of individual systems that are limited in their communication and interoperability. Additionally, integrating separate security functions like access control and video surveillance using software development kits (SDKs), application programming interface (API) programming or a Physical Security Information Management (PSIM) limits their potential and is often costly.

Simply put, in an integrated system, the data is not centralised. While it allows for some combinations of events from multiple systems in a single interface, operators will often need to alternate between systems to complete more advanced activities. For instance, when an organisation integrates access control with video from two different systems, the command centre presents its data either on a split-screen or two separate screens.

Theoretically, in an integrated system an operator could use video to compare the identity of a cardholder with a person at a door. However, if the person is denied access, understanding why would force an operator to use both systems separately. Switching between systems would require an operator to either use a toggle switch or move to another workstation. Consequently, this additional step takes up valuable time and can even lead to missed alarms or incidents in a different system.

Furthermore, dealing with maintenance and system configurations on integrated systems can be expensive and inefficient. Maintenance on such systems requires more time as the administrator must configure and ensure the synchronicity of the independent parts. Also, many required configurations are redundant, forcing the administrator to repeat the same tasks across all systems. Upgrades can also wreak havoc on such systems as new updates can potentially render a part of a security system incompatible with the others.

With products like PSIM, compatibility issues are not as expected. PSIM software offers a user-interface developed middleware product designed to patch the gaps between multiple distinct systems by offering access to all systems on one screen. Though it claims to increase control, situational awareness and management reporting, PSIM software does not have a built-in access control, intrusion, or video surveillance solution. This software is merely a superficial way of generating access to several different proprietary systems via one platform.

At its core, PSIM software is a solution based on integrating multiple systems together and compatibility issues can just as easily arise after upgrades or maintenance. Moreover, even with PSIM software, each individual system must be configured separately, doubling the time and effort required.

Although the integration of separate security systems is still common, with better alternatives available, the technology might soon be outdated. However, it is important to note that the integration of systems paves the way for unification. In fact, integration is the ecosystem’s path to unification. To properly unify your data in Genetec’s platform, integration is necessary to transfer outside data, enabling the flow of information.

Without the proper foundation, integrations are just connections.

Why unification?

Unification takes integrated systems to the next level by connecting and managing stand-alone components in a security system through comprehensive software solutions in a centralised and open architecture. Differing from integration, unification builds deeper connections across all independent systems than those connected through SDKs or APIs.

A unified platform goes beyond tagging or bookmarking video when an access control event occurs or offering the capability to unlock an access-controlled door from within the video surveillance user interface. The platform combines information from all available sensors to provide greater awareness to operators, showing video feeds when alerts are triggered by the access control system, but accumulates data from all related sensors in a single click, from anywhere in the system.

A unified solution is developed from the ground up to work together, purposefully intertwining functionality and offering a powerful user experience that includes built-in reporting and alarm management functionalities. The solution allows for the configuration and management of video cameras, access-controlled doors, print badges and even monitors intrusion panels, all within a single software platform. Unification empowers users to best employ all of their security systems and ensures a high level of functionality and efficiency.

A unified system is by nature highly flexible and can be expanded to meet customers’ changing needs. It is not an all or nothing solution as the platform allows them to build the security system piece by piece. For instance, a small business may choose to start with the VMS functions. As the business grows, the system empowers owners to strengthen their security, by adding access control, ALPR, analytics and other third-party applications in accordance with the business’ needs.

Take Security Center, manufactured by Genetec, for instance. The product offers the only unified platform built from the ground up and coded together for seamless interaction and workflow right out of the box. With a unified solution like Security Center, employees only learn and use one system, saving employers time and money.

Administrators save time configuring the system and all questions and support requests are done through one manufacturer – Genetec. When it comes to upgrades, which usually wreak havoc on integrated systems, Security Center upgrades apply to the entire solution, resulting in a seamless upgrade experience for administrators and end users. Furthermore, concerns about cybersecurity are lessened as companies can rely on one vendor as opposed to a variety of vendors and platforms. A unified solution like Security Center provides visibility into cybersecurity compliance across the entire system.

More than just security

A unified platform takes full advantage of industry advances in analytics and add-ons by facilitating the implementation of new security technology into an existing system. Additionally, these advancements are faster and easier to incorporate in a unified system and yield strategic and actionable business intelligence. With ease of access, these upgrades can be used to improve operations and increase returns on investments (ROI).

For example, a unified solution in an airport can feed comprehensive security data into associated analytics software that can present a better understanding of terminal usage and density, as well as traveller and visitor flow, allowing management to take action and eliminate unnecessary waiting times. Retail customer intelligence gathered by a unified system can engage in visitor counting, conversion rates, queue management, heat maps, directional analysis and face capture. This type of information

can provide retailers with intelligence that allows them to better understand consumers, make real-time informed decisions and increase both consumer engagement and in-store profitability.

Unification brings together all security system components seamlessly in a single software platform with one user interface in a way that can vastly improve physical security management. Plus, unification can open up a new world of collecting and using actionable business intelligence that can greatly enhance business operations.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
Surveillance to unjam the traffic
Integrated Solutions Transport (Industry)
Traffic is a challenge that affects urban areas across Africa. The city of Johannesburg, South Africa’s most populous city, experiences severe traffic resulting from a confluence of issues, including power outages, faulty traffic lights, and infrastructure theft.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...