Download PDF version Contact company

It is the end of the line for analogue phone systems, which can leave alarm companies hanging out to dry, trying to figure out if they need to replace costly alarm panels. With the impending shutdown of the analogue telephone network, alarm monitoring companies nationwide need to come up with a game plan.

It is more important than ever for security companies to equip themselves with the knowledge of what new technology solutions are available in the marketplace, in order to help offset the costs of transitioning away from analogue.

Technology transformation

With the biggest transformation facing alarm companies being technological advances in communications, everyone can agree that the traditional analogue telephone network is on its way to a complete shutdown.

Whenever a major technology, especially one with a long history of regulation, approaches the end of its life, being prepared and ready for the transition is the key to success. With any technological disruption comes major change, but alarm companies need to be able to adapt quickly to survive and thrive in the ever-changing world of technology.

In the past, traditional phone lines used circuit switching technology delivered over a copper line to send the alarm and data communication signals to the alarm monitoring company. Over the last couple of decades, technology-specific services have been migrating to packet switching over the public Internet, in the form of Voice over Internet Protocol (VoIP).

Voice over Internet Protocol (VoIP)

VoIP is a telecommunication service that takes analogue audio signals and converts them into digital data

VoIP is a telecommunication service that takes analogue audio signals and converts them into digital data that can be transmitted over standard internet connections. While this transition has provided the opportunity for tremendous cost savings and more reliable connections, VoIP protocols have been designed with voice service in mind.

This means that traditional alarm panel and modem protocols are seen as no longer compatible with these technological improvements. These changes are sweeping across an array of industries including security installers, fire monitoring, field medical monitoring, and alarm monitoring. As the analogue network is growing closer to becoming obsolete, alarm companies are facing a myriad of challenges. The ever more rapid advancement and adaptation of new technologies has left a gap in legacy communication systems.

Ethernet-based VoIP systems

E1/T1 and analogue POTS lines are increasingly being replaced by Ethernet-based VoIP systems, leaving alarm companies left with modem-based technology that can no longer work within the new infrastructure.

With most telephony connections moving to VoIP, it can be costly for alarm companies to replace existing modems and alarm panels. Most are looking for a simple solution to help make a seamless transition without having to change their entire infrastructure.

Replacing existing analogue infrastructure

Time is of the essence for alarm companies nationwide that rely heavily on equipment and endpoint devices that use modems to communicate. In most cases, these modems cannot be replaced due to the high costs associated with replacing the existing infrastructure.

With new requirements for fire alarm control panels, the pressure is on them now more than ever to react quickly and find a cost-effective solution. With limited options out there, one company has done their due diligence and launched a revolutionary solution that offers a clear path forward for the industry.

Voice, video, and fax and data communications

VOCAL Technologies has been leading the way, since 1986, in the design of software and hardware solutions

VOCAL Technologies has been leading the way, since 1986, in the design of software and hardware solutions, under licence for voice, video, and facsimile and data communications. The company develops and applies advanced technologies for superior voice, video, fax and data communications.

With a broad range of innovative design solutions that yield the highest quality communications at a lowest cost and an insight into the technical challenges of the telecommunications industry, it was natural for them to develop a unique solution, in order to help navigate companies through the VoIP revolution.

As the security industry continues to evolve and face many challenges with the move from analogue to VoIP phone lines, VOCAL Technologies knew it was the right time to develop a combined software and hardware solution. Their goal was to throw out a lifeline to help alarm companies transition easier and more efficiently.

VOCAL SIP Analogue Modem Server

With cloud-based modems now a firm reality, the VOCAL SIP Analogue Modem Server, or SAMS, is a unique IP-based software solution for inter-operating with legacy modems, without the need for modem banks with E1/T1 connections.

This Virtual Modem Server allows a business to deploy a server in the Cloud, which can work with the modern VoIP phone network infrastructure based on SIP and RTP, instead of using T1/E1 lines to connect to the PSTN.

Virtual Modem server

The Virtual Modem server contains true soft modems and not just an AT command set on a TCP socket pretending to be a modem. This allows the server to connect to true voice band modems deployed on the PSTN, and thus, does not require installation of additional equipment on the far end of the security system.

Alarm monitoring centres are not left out of these significant advancements in communication infrastructure. Supporting industry standard alarm protocols, including Ademco Contact-ID, Sonitrol, DC-03/FSK, Pulse, and SIA-2000, the modem server can also act as a virtual replacement for physical alarm receiver equipment.

Modem over IP (MoIP) solution

SAMS provides a true Modem over IP (MoIP) solution and can support a broad range of remote endpoints

SAMS provides a true Modem over IP (MoIP) solution and can support a broad range of remote endpoints. Bringing in expertise from numerous industrial market sectors, such as Utility Metering, Point of Sale (PoS) payment processing, SCADA, Out of Band management, among others. SAMS is a perfect choice for alarm companies.

Even when traditional ISDN and POTS lines remain available, Alarm Receiver and Remote Access Server (RAS) equipment like the AS5350 has reached end of life and these vital business systems are left in a state where failure is imminent and quick repair or replacement are no longer options. This can happen with servers interacting with alarm systems and security panels.

M2M applications rely on data modems

Countless M2M applications rely on data modems to accomplish their task and VOCAL has launched a few solutions to allow these applications to adapt to the changing infrastructure.

VOCAL servers come in a variety of configurations, which cover the full range of ITU V-series modems, as well as many other industry standard modulations. This allows it to fit easily into existing systems and flexibly meet the needs of already deployed infrastructure and applications. VOCAL continues to customise all solutions for customers and can meet specific system requirements, when necessary.

IP switchover

When it comes to end-of-life modem products, VOCAL’s SAMS software is a great replacement solution for Cisco’s Access Servers (2500 series, AS5350), Cisco PVDM Digital Modem Modules (PVDM2-12DM, PVDM2-24DM, PVDM2-36DM), modem server banks, alarm receivers, and groups of individual hardware modems.

VOCAL is helping alarm companies that are currently using ISDN for PSTN access to their modem servers as SIP-based VoIP will be the replacement for ISDN. The cost savings brought on by switching from expensive ISDN and analogue lines to VoIP has made the IP switchover a desirable transition instead of a painful requirement.

Integration with SIP infrastructure

Integrating the modem infrastructure and the SIP infrastructure has become more and more necessary

Integrating the modem infrastructure and the SIP infrastructure has become more and more necessary. Ideally, running modems on the cloud server, connected to a SIP infrastructure would be the best scenario.

Using a Cloud Modem Server, such as VOCAL’s SIP Analogue Modem Server (SAMS), allows alarm companies to get the benefits of the SIP infrastructure, without having to replace the legacy pieces of their alarm panels which can be costly.

Remote modems

The server can run in the data centre, where all of the company’s other network facing services reside, which can save money and facilitate changing business models that are moving away from physically located hardware and into remote virtual working environments. As the controlling application, the SAMS server is seen the same way as any other modem.

The remote modems can call the SAMS server from the PSTN (or be called) as they always have. The SAMS server behaves as a bank of modems connected to ISDN would, all while running on off the shelf hardware or any standard virtualised environment.

Analogue Modem Adapter (AMA)

In addition to their software solution, VOCAL also introduced an Analogue Modem Adapter (AMA) to the marketplace, which is a device that enables analogue modems and alarm panels to securely transmit data over digital networks.

The AMA connects legacy alarm, POS, voice, fax and other analogue devices to IP networks including mobile, radio, and satellite networks. This is a great option for alarm companies that have analogue and modem-based equipment but no longer have phone lines available and want a secure connection.

Open line of communication

An AMA provides a modular phone jack and an Ethernet port where an analogue device, such as a Digital Alarm Communicator Transmitter (DACT), can be connected to the modular jack to transmit directly over IP network.

This eliminates the need for telephone landline connections. An AMA supports telephony features such as dial tone, device power, ringing and standard telephone signaling to communicate with the local modem.

Combines with SAMS server installation

VOCAL’s AMA software is part of a fully integrated and highly configurable VoIP software solution

Combined with a SAMS server installation, VOCAL’s AMA creates a novel approach to bypassing the data and alarm protocol issues that are introduced by last mile IP connections and line emulation devices utilised in VoIP infrastructure.

VOCAL’s AMA software is part of a fully integrated and highly configurable VoIP software solution with a network stack, SIP stack, secure communications, and full-featured telephony software with a comprehensive data modem software library.

Making the VoIP transition

VOCAL continues to work with alarm companies nationwide to help make the VoIP transition a smooth one with a combined hardware and software solution that is second to none. It is important for alarm companies to research the options available to them and continue educating themselves as the end of the line grows closer for analogue phone systems.

In the past, the security industry has always been on the forefront of adopting new technologies and with VOCAL on their team, the paradigm shift to VoIP can take place seamlessly. By bringing together a combined software and hardware solution, VOCAL has taken a technical disruption and turned it into a graceful transition for alarm companies that will keep the lines of communication open now and well into the future.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

How has security industry training changed in the last year?
How has security industry training changed in the last year?

In-person training sessions were mostly canceled during the worst of the COVID-19 pandemic. However, the need for training continued, and in some cases increased, as the security industry sought to adapt to the changing business climate of a global emergency. So how well did we as an industry adjust? We asked this week’s Expert Panel Roundtable: How has security industry training changed in the last year?

Physical access control: Critical steps to ensure a smarter future
Physical access control: Critical steps to ensure a smarter future

Steven Kenny, Axis Communications, looks at the benefits of physical access control systems within smart environments, and how knowledge gaps and dated methods can inhibit adoption. Physical security is becoming more dynamic and more interconnected, as it evolves. Today’s modern access control solutions are about so much more than simply opening doors, with digitalisation bringing multiple business benefits, which would simply not be possible using traditional models. Digital transformation While the digital transformation of processes and systems was already well underway, across many industries and sectors, it is the transformation of physical security from a standalone, isolated circuit, to a network-enabled, intelligent security solution that brings many benefits to the smart environment. Yet, with more organisations now looking to bring their physical security provision up to date, there are many considerations that must be addressed to maximise the potential of access control and video surveillance. Not least of which is that connecting physical security devices to a network presents risk, so it is increasingly important for IT teams to play a role in helping to facilitate the secure integration of physical and network technologies, as these two worlds increasingly converge. Improved access control in smart environments These urban constructs are capable of reducing waste, driving efficiencies and optimising resources The smart city offers significant benefits, reflected in the US$ 189 billion that is anticipated to be spent on smart city initiatives globally by 2023. These urban constructs are capable of reducing waste, driving efficiencies, optimising resources and increasing citizen engagement. Technology, which is increasingly being incorporated to protect access points within the smart environment, can take many forms. These range from simple card readers to two factor authentication systems, using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. Frictionless access control During the COVID-19 pandemic, frictionless access control has provided an effective ‘hands free’ means of accessing premises, using methods such as QR code readers and facial recognition as credentials to prove identity. Frictionless access control brings health and safety into the equation, as well as the security of entrances and exits, minimising the risk of infection, by removing the need to touch shared surfaces. Such systems can be customised and scaled to meet precise requirements. Yet, an increasing integration with open technologies and platforms requires collaboration between the worlds of physical security and IT, in order to be successful. Barriers to adoption Traditional suppliers and installers of physical security systems have built up a strong business model around their expertise, service and knowledge. Network connectivity and the IoT (Internet of Things) present a constantly shifting landscape, requiring the traditional physical security vendor to learn the language of IT, of open platforms, IP connectivity and software integration, in order to adapt to market changes and remain relevant. Many are now beginning to realise that connected network-enabled solutions are here to stay Those who cannot adapt, and are simply not ready for this changing market, risk being left behind, as the physical security landscape continues to shift and demand continues to increase. With end users and buyers looking for smarter, more integrated and business-focused solutions from their suppliers, it is clear that only those who are prepared will succeed in this space. Time will not stand still, and many are now beginning to realise that connected network-enabled solutions are here to stay, particularly within smart constructs which rely on such technology by their very nature. The importance of cyber hygiene Connecting any device to a network has a degree of risk, and it is, therefore, imperative that any provider not only understands modern connected technologies, but also the steps necessary to protect corporate networks. Cameras, access control systems and IP audio devices, which have been left unprotected, can potentially become backdoors into a network and used as access points by hackers. These vulnerabilities can be further compromised by the proliferation of connected devices within the Internet of Things (IoT). While the connection of devices to a network brings many advantages, there is greater potential for these devices to be used against the very business or industry they have been employed to protect when vulnerabilities are exploited. Cyber security considerations Cyber security considerations should, therefore, be a key factor in the development and deployment of new security systems. Access control technologies should be manufactured according to recognised cyber security principles, incident reporting and best practices. It is important to acknowledge that the cyber integrity of a system is only as strong as its weakest link and that any potential source of cyber exposure will ultimately impact negatively on a device’s ability to provide the necessary high levels of physical security. The future of access control There is a natural dispensation towards purchasing low-cost solutions There is a natural dispensation towards purchasing low-cost solutions that are perceived as offering the same value as their more expensive equivalents. While some have taken the decision to implement such solutions, in an attempt to unlock the required benefits, while saving their bottom line, the limited lifespan of these technologies puts a heavier cost and reputational burden onto organisations by their association. The future of access control, and of physical security as a whole, will, therefore, be dependent on the willingness of suppliers to implement new designs and new ways of thinking, based around high-quality products, and to influence the installers and others in their supply chains to embrace this new world. Cyber security key to keeping businesses safe In addition, cyber security considerations are absolutely vital for keeping businesses safe. The integration of cyber secure technologies from trusted providers will provide peace of mind around the safety or corporate networks, and integrity of the deployed technologies. As we move forward, access control systems will become data collection points and door controllers will become intelligent I/O devices. QR codes for visitor management and biometric face recognition for frictionless access control will increasingly be managed at the edge, as analytics in a camera or sensor. The future of access control presents an exciting and challenging time for those ready to accept it, to secure it and to help shape it, offering a true opportunity to innovate for a smarter, safer world.

Wire-free, mobile first and data rich? The future of access control is within almost anyone’s reach
Wire-free, mobile first and data rich? The future of access control is within almost anyone’s reach

The 2020s will be a wireless decade in access control, says Russell Wagstaff from ASSA ABLOY Opening Solutions EMEA. He examines the trends data, and looks beyond mobile keys to brand new security roles for the smartphone. The benefits of wire-free electronic access control are well rehearsed. They are also more relevant than ever. A wireless solution gives facility managers deeper, more flexible control over who should have access, where and when, because installing, operating and integrating them is easier and less expensive than wiring more doors. Battery powered locks Many procurement teams are now aware of these cost advantages, but perhaps not their scale. Research for an ASSA ABLOY Opening Solutions (AAOS) benchmarking exercise found installation stage to be the largest contributor to cost reduction. Comparing a typical installation of battery-powered Aperio locks versus wired locks at the same scale, the research projected an 80% saving in installers’ labour costs for customers who go cable-free. Battery powered locks all consume much less energy than traditional wired locks Operating costs are also lower for wireless: Battery powered locks all consume much less energy than traditional wired locks, which normally work via magnets connected permanently to electricity. Wireless locks only ‘wake up’ when presented with a credential for which they must make an access decision. AAOS estimated a 70% saving in energy use over a comparable lock’s lifetime. Find out more about wireless access control at ASSA ABLOY's upcoming 29th June webinar Deploying wireless locks In short, every time a business chooses a wireless lock rather than a wired door, they benefit from both installation and operating cost savings. A recent report from IFSEC Global, AAOS and Omdia reveals the extent to which the advantages of wireless are cutting through. Responses to a large survey of security professionals — end-users, installers, integrators and consultants serving large corporations and small- to medium-sized organisations in education, healthcare, industrial, commercial, infrastructure, retail, banking and other sectors — suggest almost four locations in ten (38%) have now deployed wireless locks as a part or the whole of their access solution. The corresponding data point from AAOS’s 2014 Report was 23%. Electronic access control Electronic access control is less dependent than ever on cabling Without doubt, electronic access control is less dependent than ever on cabling: Even after a year when many investments have been deferred or curtailed, the data reveals fast-growing adoption of wireless locks, technologies and systems. Is mobile access control — based on digital credentials or ‘virtual keys’ stored on a smartphone — an ideal security technology for this wire-free future? In fact, the same report finds mobile access is growing fast right now. Among those surveyed, 26% of end-users already offer mobile compatibility; 39% plan to roll out mobile access within two years. Before the mid-2020s, around two-thirds of access systems will employ the smartphone in some way. The smartphone is also convenient for gathering system insights Driving rapid adoption What is driving such rapid adoption? The convenience benefits for everyday users are obvious — witness the mobile boom in banking and payments, travel or event ticketing, transport, food delivery and countless more areas of modern life. Access control is a natural fit. If you have your phone, you are already carrying your keys: What could be easier? IBM forecasts that 1.87 billion people globally will be mobile workers by 2022 Less often discussed are the ways mobile management makes life easier for facility and security managers, too. Among those polled for the new Wireless Access Control Report, almost half (47%) agreed that ‘Mobile was more flexible than physical credentials, and 36% believe that mobile credentials make it easier to upgrade employee access rights at any time.’ IBM forecasts that 1.87 billion people globally will be mobile workers by 2022. Workers in every impacted sector require solutions which can get the job done from anywhere: Access management via smartphone offers this. Site management device The smartphone is also convenient for gathering system insights. For example, one new reporting and analytics tool for CLIQ key-based access control systems uses an app to collect, visualise and evaluate access data. Security system data could contribute to business success. The app’s clear, visual layout helps managers to instantly spot relevant trends, anomalies or patterns. It’s simple to export, to share insights across the business. Reinvented for learning — not just as a ‘key’ or site management device — the phone will help businesses make smarter, data-informed decisions. The smartphone will also play a major role in security — and everything else — for an exciting new generation of smart buildings. These buildings will derive their intelligence from interoperability. Over 90% of the report’s survey respondents highlighted the importance of integration across building functions including access control, CCTV, alarm and visitor management systems. Genuinely seamless integration They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term Yet in practice, stumbling blocks remain on the road to deeper, genuinely seamless integration. More than a quarter of those polled felt held back by a lack of solutions developed to open standards. ‘Open standards are key for the momentum behind the shift towards system integration,’ notes the Report. As well as being more flexible, open solutions are better futureproofed. Shared standards ensure investments can be made today with confidence that hardware and firmware may be built on seamlessly in the future. They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term. Open solutions and mobile management are critical to achieving the goals which end-users in every vertical are chasing: scalability, flexibility, sustainability, cost-efficiency and convenience.