Communications management within your security platform

Residential Estate Security Handbook 2019 Integrated Solutions, Residential Estate (Industry)

In the physical security industry, communications management systems, such as intercom solutions, are becoming an integral part of developing effective and comprehensive security strategies. This white paper highlights the importance of a standards-based approach to communications, explains the benefits of intercom integration with physical security systems, and outlines key features to look for in a security system when planning to unify communications with access control or video surveillance in a single security platform.

Traditionally, communications manage-ment systems were viewed as separate and independent solutions from access control systems (ACS), video surveillance, and intrusion when designing a security solution. That said, the focus in the industry over the past decade has been on allowing end users to integrate or, ideally, to unify these systems into a single security platform.

Currently, there is an increasing demand from end users to unify audio/voice communications together with access control and/or video within a single security platform for both live operations and investigations. Some of the more traditional approaches to integration include:

• Dedicated wiring between an intercom system and an ACS system where the push-to-talk (PTT) function of the intercom station triggers an input on an ACS module, which, in turn, triggers an event in the ACS monitoring interface.

• Dedicated wiring between an intercom system and a video system where the PTT function triggers an input on a video camera or IP encoder, which then triggers an event in the video monitoring interface or live video viewing, or

• Integration through a proprietary protocol that integrates the video or ACS system with the intercom system server using a proprietary software development kit (SDK) or application programming interface (API).

A more recent approach involves leveraging an industry-standard or open protocol like Session Initiated Protocol (SIP) to enable the integration. This approach avoids the use of proprietary intercom manufacturer protocols and allows end users to select, according to their needs, best-of-breed communications and intercom equipment that leverage such standards.

In addition to presenting an overview of intercom management systems, this white paper considers the benefits of intercom integration and explains the importance of a standards-based approach to communications, especially as it applies in the context of security. It also outlines key features to look for in a security system when an organisation is planning to unify communications with various security systems.

1. Overview of intercom systems

Intercom technology refers to a standalone voice communications system mounted permanently in buildings that functions separately from the telephone network. Generally used as a security or safety feature, intercom systems are typically composed of the following components:

• Master Station – the primary operator interface component that can control the entire intercom system. Also referred to as a desktop station, this unit can initiate calls to, and receive calls from, any and all other stations, deactivate or mute a specific station, and make announcements over the whole intercom infrastructure.

• Intercom Server – the hardware server that is the command and control centre of the intercom system. Also known as an intercom exchange server, it provides central administration of the intercoms and master stations in the system and links together devices during a call request through the application of routing and priority rules. Many intercom servers can communicate with both IP-based and analogue door stations. Some intercom servers offer interfaces to, or are integrated by, third-party systems.

• Intercom Terminals – usually fitted with a microphone and designed with a talk button and a power switch. Some terminals are also equipped with a keypad to allow for dialling specifically numbered intercom terminals. There are different types of intercom terminals:

o The door station, which can only initiate a call with a Master Station but not with any other station,

o The intercom station, which is capable of initiating and receiving party-line conversations, individual conversations and signalling, and which may be rack-mounted, wall-mounted or portable,

o The wall-mounted station, which is a fixed-position intercom station with built-in loudspeaker that may feature a flush-mounted microphone, handheld PPT microphone, or telephone-style handset.

Traditional intercom systems were composed almost entirely of analogue electronic components that were connected together to transmit voice signals. As technology evolved, intercom systems based on digital connections were introduced, offering users new features and interfacing options. Some digital intercom systems can carry both voice and video signals and are composed of dedicated proprietary door stations, a dedicated intercom server that controls the entire system and connects the operator with the individual stations, as well as separate cabling for all stations.

2. Intercom system trends

Two of the main trends driving the intercom industry include:

1. A move towards IP-based technology.

2. The need for greater systems integration with security systems.

IP-based technology

The first trend is a growing shift from analogue to IP-based technology. Through the use of an organisation’s existing IP network, communications systems, including intercom systems, can now be operated using far less cabling because of extended bandwidth and other IT advancements.

IP-ready intercom solutions have the capability to use the existing IP infrastructure for communications purposes, thereby significantly lowering the total cost of ownership (TCO) by reducing the amount of wiring required and eliminating the need for proprietary wiring. The shift to IP-based technology is also allowing organisations to take advantage of technological advancements in intercom hardware, including intercom or door stations with integrated video cameras and communications session recording.

Systems integration

Integration between communications and physical security systems, including ACS and video surveillance, is the second major trend. Rather than working with separate and independent intercom and physical security solutions, integration allows an organisation to manage its communications needs together with its access control and video surveillance systems from a single user application. Such systems integration significantly increases situational awareness and ensures that personnel have a clear picture of their security environment before deciding to act.

With doors, parking gates, and cameras linked to intercom devices, the effectiveness of a security team is enhanced in several ways:

• By using real-time video feeds to view a situation in order to effectively respond to and manage incoming calls, including emergency calls.

• By using video cameras and ACS information to validate the identity of a caller prior to allowing access, such as access requests when employees lose their cards or when visitors arrive on site.

• By enhancing investigations through the replay of recorded call sessions and associated video when reviewing historical events.

In addition, integration between communications and physical security systems also means that operators can initiate calls with other users and coordinate activities, such as when responding to a routine call or preparing a response to an emergency situation.

3. Three approaches to systems integration

Currently, there are three main approaches to integration:

1. Wired inputs and relays between intercom systems and the ACS or video surveillance system.

2. Using the intercom system manufacturer’s API.

3. Unification through standards-based communication (SIP).

Wired inputs and relays between intercom systems and ACS or video surveillance

The more traditional approach to integration between intercom and physical security systems is realised through wiring between systems. For example, if a user would like to trigger video viewing (streaming) or recording when a door station PTT button is pressed, dedicated wiring between a door station and video hardware must be installed. Using this method of integration, the PTT function at the door station triggers an input on an IP camera or IP video encoder, which then triggers an event in the video monitoring interface and starts live camera streaming or recording.

Using a manufacturer’s API

As networking technology has evolved and organisations have migrated to IP technology for all of their business needs, vendors have begun to look for more efficient approaches to integrating communications with physical security systems. Many intercom systems manufacturers have developed APIs or SDKs that security vendors can use to develop software-based connectivity between systems over an IP network.

This method of integration eliminates the need for wiring altogether because the intercom system and ACS or video system are connected using a software link over an organisation’s IP network. However, these APIs and SDKs are developed by individual vendors and are proprietary in nature; as a result, because they vary from vendor to vendor, each system would require a new integration for every vendor. Additionally, compatibility issues can arise when the software of either the intercom system or the physical security system is upgraded and the backward compatibility of the software integration is no longer supported.

Unification through standards-based communication (SIP)

SIP is a signalling communications protocol that functions by defining the messages that are sent between endpoints; messages that govern the establishment, termination, and other essential elements of a call. SIP can be used for creating, modifying, and terminating sessions consisting of one or several media streams and can be used for two-party (unicast) or multi-party (multicast) sessions.

Newer intercom solutions are now supporting industry-standard protocols and technologies for Voice over IP (VoIP), such as SIP, that allow an organisation to easily leverage their existing infrastructure, including its IP network, VoIP infrastructure, and SIP-based devices and apps, for all of their communications needs. In this approach to integration, the software link leverages non-proprietary communications protocols, making it possible for organisations to:

• Unify their communications and physical security systems in a single platform.

• Access a greater selection of standards-based intercom devices.

• Avoid the use of proprietary intercom manufacturer-specific protocols.

Used to control the delivery of voice communications and multimedia sessions over IP networks, communications protocols like SIP are at the heart of standards-based telecom technologies. In order to deliver real-time voice and video data, SIP uses the network instead of dedicated telephone lines or proprietary cabling. And, since SIP is widely supported, organisations can easily standardise their communications system and protect their investment in intercom and communication technology.

4. Benefits of unification using standards-based communications

Standardisation and interoperability are the two main benefits of unification using standards-based intercom technologies. While the network carries the information, SIP makes it possible for devices to communicate with each other, allowing for seamless communication between operators and intercom devices deployed throughout an organisation.

Industry-standard protocols are also essential for ensuring interoperability between different vendors, different devices within a communications system, and between communications and security systems. For example, standards-based intercom integration allows an organisation to use its existing network infrastructure and manage video surveillance and full-duplex communication through the video management system (VMS) without a dedicated intercom server. Because the intercom system uses an industry-standard protocol like SIP, an intercom unit could be made to behave just like any other camera on the network. In many cases, an integration may not even be required if both the intercom system and the physical security system are SIP-ready.

In addition, the level of interoperability offered by standards-based communications also:

• Helps to protect the long-term viability of an organisation’s investment in communications technologies since devices and systems that use industry-standard communication protocols are non-proprietary.

• Allows for integration with standards-based devices at a much deeper level, meaning that an organisation could upgrade to advanced voice management features independent of third-parties.

• Reduces an organisation’s TCO.

• Allows an organisation to select components from multiple vendors and makes it easy to incorporate those components into its existing system without any additional work.

• Makes it possible for an organisation to future-proof its communications system because these standards facilitate the seamless integration of the latest technologies, thereby ensuring that the communications system grows along with the needs of the organisation.

• Allows an organisation to unify its intercom system with other business systems, including the phone system, since all SIP-enabled communications devices are compatible with an organisation’s IP-PBX phone system.

• Leads to other new capabilities, such as being able to integrate SIP mobile apps into an organisation’s security communications strategy.

A unified security and communications system takes it one step further and would also allow an organisation to easily address any of the following security applications:

Emergency call management

By leveraging the unification of emergency call stations with the video surveillance system, an organisation can better manage emergency calls and more effectively secure a single building or ensure the safety of a town centre. A unified security and communication system would allow personnel to answer incoming emergency calls, view live video while responding, and take the right action to address situations as they arise with visual information on hand.

Employee lost card and other requests at the door

Unification would also streamline how operators respond to employee lost card requests. Because intercom call stations are linked to access-controlled doors and video cameras, operators can accept incoming calls, confirm caller identity through live video and their cardholder profile, and grant access quickly from a single unified security application.

Parking entrance control

Unification would also make it possible for an organisation that controls access to parking or to a car park entrance either through access control readers or license plate recognition cameras to exercise greater entrance control. With a unified system, security personnel can respond to incoming requests for assistance and then manually open parking gates from a single unified security application.

High-security environments

A unified approach further allows an organisation to add another layer of security to its operations by adding intercom communications within a high-security environment. Through intercom system integration, operators would be able to grant or deny access to highly secure rooms or areas by validating audio, video, and access control information at the same time.

5. Innovative forms of communication – user-to-user video calls

In the context of operator and security team communications, real-time user-to-user calling through the security platform itself can offer significant benefits within a comprehensive security strategy. By allowing operators to communicate with their colleagues both through voice and video over an IP network using a standard off-the-shelf USB headset, microphone, and webcam, an organisation will ultimately promote greater collaboration and more efficient communications when responding to security events or during day-to-day activities.

Other benefits include:

• Intuitive communication because it is embedded in the security system application.

• Operators do not have to learn how to use external third-party communications software in order to make user-to-user video calls.

• Reduced TCO through the use of inexpensive communications equipment.

6. What to look for in a security system when intercom integration is needed

A successful unification strategy is largely dependent on selecting both the right security platform and a standards-based intercom system. When looking to unify intercom with physical security systems, an organisation should choose a non-proprietary off-the-shelf integration over a custom solution because a non-proprietary solution would make it easier to expand and modify the system architecture in the future.

Developed ecosystem of partners: It is important to ensure that the security solutions manufacturer or vendor has a developed ecosystem of partners. Choosing a vendor with multiple intercom technology partners gives end users the freedom to choose the intercom solution that best meets their needs or to mix and match hardware from various intercom vendors. Settling on a security solution with a single integration limits the flexibility of an organisation in the long run.

User interface and overall system architecture: The user interface and overall architecture of the security system is also a key consideration. For a more efficient operator experience, organisations should look for security solutions that offer embedded intercom control and call management from the same user interface as the one used for access control and video surveillance activities.

It is also important to choose a system with an architecture that supports a standards-based approach to communications management. A security system with native SIP support would allow an organisation to reduce TCO by leveraging its IP network for communications and security, and avoid additional proprietary cabling altogether. Since SIP-enabled communications devices are compatible with many IP-based phone systems, choosing a SIP-ready security system may also allow for greater unification between an organisation’s business and security systems and may also provide access to newer capabilities, such as being able to integrate SIP mobile apps into an organisation’s security strategy.

Embedded SIP server support: A security solution with an embedded SIP server can also achieve much deeper integration with SIP-enabled intercom devices since it is highly likely that it can connect directly to SIP-enabled intercom and door stations, thereby avoiding the need for an intercom server. Ideal for smaller systems, this approach to intercom integration greatly reduces TCO because it eliminates the need for purchasing, installing, and maintaining intercom servers and also makes deployment easier with fewer components to install. In addition, a security system that supports a server-less approach to intercom integration also gives an organisation the ability to select components from multiple vendors.

Method of integration: It is also important to look at how intercom management is integrated with access control and video within the security system. Within a unified security system, intercom devices are likely part of the core architecture of the security system. This usually allows an organisation to easily associate call stations with doors, gate control devices, and cameras and to ensure that door-related and camera-related actions are readily available to operators.

Seamless and embedded call management: For security personnel and operators, a security system should also provide full call management capabilities, including viewing incoming calls, managing call queues, and running reports. Given that the access control and the video-related interface are unified with communications management, this feature would eliminate the need for external communications applications and would allow users to quickly manage calls with minimum interference while performing other security tasks. It is also important to find a security system that supports call reporting. Using this feature, an operator could quickly review historical call sessions automatically linked with audio and video.

Dynamic graphical user interface: The security system should also support communications management via dynamic graphical maps. Such a feature would support the addition of intercom objects within a map that would show the status of the intercom device and all associated actions, including answering a call, forwarding a call, and placing on hold. Being able to manage intercom devices through a map leads to greater oversight and situational awareness for an organisation.

7. Overview of Sipelia communications management from Genetec

Genetec offers Sipelia Communications Management as a module of its Security Center unified security platform that guarantees that users are working from a single application for all of their communications and physical security needs. Built on an open-standards approach to communications, Sipelia integrates with SIP-based intercom devices and servers, allowing organisations to enhance their security operations through full communications management.

Benefits of Sipelia Communications Management

Embedded and scalable SIP server: A further benefit of Sipelia’s use of SIP is that, in some situations, it avoids the need for a dedicated intercom exchange server. The embedded and scalable SIP server in Sipelia directly communicates with a variety of SIP-enabled edge devices from multiple vendors, including door and desktop intercom stations.

Evolving ecosystem of partners: With a growing ecosystem of partners, Sipelia supports some of the industry’s leading brands of intercom equipment, such as Zenitel (Stentophon), Commend, and Castel. And, since call management is embedded within Security Center, end users do not need to rely on third-party vendor applications for call management.

Dynamic graphical map interface: When Security Center’s mapping functionality (Plan Manager) is enabled, Sipelia functionalities can be accessed from an easy-to-use dynamic graphical map interface, allowing operators to view the real-time status of intercom devices and answer calls directly from a map.

User-to-user video call functionality: Rather than deploy third-party video call applications, the Security Center interface now includes user-to-user video call functionality to facilitate communications between users from the same interface used to monitor the Genetec access control and video systems. Users can now initiate live audio or video communications with one another using off-the-shelf headsets and microphone, and a webcam or standard security camera.

Sipelia Communications Management also allows an organisation to

• Seamlessly link intercom devices with doors and/or cameras.

o Linking intercom devices to one or more doors enhances efficiency because operators have quick access to door-related controls. And, since associations are defined in advance, operators do not have to look for associated doors and door-related actions when answering a call.

• Leverage cameras built into intercom devices with SIP video support in Sipelia.

o This provides another layer of visual information and guarantees that operators do not have to look for associated cameras and camera-related actions when answering a call.

• Receive visual notifications of incoming calls in the Security Center interface notification tray while personnel are operating the security system.

o Once an operator is visually notified of a call, the call window dialog is easily and directly accessible no matter what the operator is doing.

• Have instant access to all intercom devices, Security Center users, and ring groups with the Sipelia phone book feature.

o Users can search and access recipients, quickly place calls, and identify frequently contacted recipients.

• Be available for all calls, including for workstation to intercom station, workstation to workstation, and intercom to intercom calls, with no exchange server.

o In addition, Sipelia offers bidirectional call recording, logging, and playback that can also include any associated video linked to a call.

See more about Sipelia at www.genetec.com/sipelia; download the white paper at https://resources.genetec.com/en-whitepapers/sipelia-communications; or contact Genetec: Brent Cary, [email protected], www.genetec.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Vumacam and NAVIC enhance SafeCity initiative
Integrated Solutions Security Services & Risk Management
Vumacam and NAVIC, two of South Africa's most respected surveillance technology and vehicle intelligence providers, are proud to announce an alliance that will greatly expand the coverage and impact of the SafeCity initiative across the country.

Read more...
Gallagher Security’s achieves SOC2 Type 2 recertification
Gallagher News & Events Integrated Solutions Infrastructure
Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the cloud-hosted services of its integrated security solution, Command Centre. The recertification was achieved on 21 December 2023.

Read more...
Integrated transportation security
Guardian Eye AI & Data Analytics Integrated Solutions Logistics (Industry)
HG Travel installs an AI-powered camera system integrated across 115 vehicles throughout a fleet comprising 160 vehicles of different sizes, along with predictive and self-monitoring tools to track tyre condition, fuel consumption and theft, and overall vehicle maintenance.

Read more...
Embracing next-generation surveillance for safer cities
Surveillance Integrated Solutions AI & Data Analytics
With the South African government highlighting the importance of building smart cities by integrating advanced technologies to make them more resilient and liveable, the role of next-generation network video and surveillance technologies cannot be ignored.

Read more...