SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Body worn video cameras
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

What missing skills among security integrators can cause problems?

18 Aug 2023

What missing skills among security integrators can cause problems?
Larry Anderson
Larry Anderson
18 Aug 2023

Editor Introduction

As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers? 


Card image cap
Sean Foley Interface Systems LLC

Lack of network expertise is by far the biggest missing skill for many security integrators. Every modern security solution, by and large, is composed of critical applications that run on a network. This is true of everything from alarm signals to streaming surveillance video. An integrator that doesn't understand networks will struggle terribly, especially when it comes to interaction with the customer’s IT team (the nice folks who will determine whether and how the integrator’s application gets on their network). The ability to navigate firewalls, routing schemes, network capacity, and even PCI (Payment Card Industry) compliance rules is often the difference between a successful integration and an unhappy customer. When you add the cybersecurity component, this adds yet another skill set that is often in short supply.  

Card image cap
Adam Ring i-PRO

As physical security systems evolve, it is crucial for integrators to evolve their skill sets as well. The expertise required to properly set up and configure devices on a unique network is one of the more difficult skills to master. Many integrators add cameras to existing networks without consideration of what else is on the network, including switching, routing, PoE budget requirements, and available bandwidth. When something doesn’t work, it is easy to point back to the new device when frequently it is an issue within the network infrastructure. Cybersecurity knowledge is another skill set in short supply for some integrators. Threats and weaknesses evolve along with the tools to combat them, so learning must be continuous. An organisation’s IT staff represents an additional layer of stakeholders that must be consulted and satisfied with any network additions or modifications. Integrators must also know how to properly configure the advanced AI-based analytics present in many modern surveillance systems. 

Card image cap
Tom Reilly Commend USA

To be successful, security integrators need to have a proficient understanding of various security technologies, such as access control systems, video surveillance, and intrusion detection systems. Without this expertise, integrators may struggle with the proper installation, configuration, or integration of security systems, which can result in vulnerabilities and inefficiencies in the customer's security infrastructure. To bridge this gap, there has been an increase in security manufacturers providing training opportunities to enhance integrators' technical knowledge and ensure better customer outcomes. Additionally, security manufacturers are offering additional professional services in support of the security integrator and end user. In coordination with the security integrators, manufacturers can provide the appropriate level of service to ensure the designed solution meets the system's capabilities and satisfies the business use case. This collaboration allows integrators to leverage the manufacturer's expertise and resources, enhancing their ability to deliver comprehensive and effective security solutions to customers.  

Card image cap
Leo Levit ONVIF

One skill that is rapidly growing in importance is cybersecurity awareness. While it is important that the entire value chain from vendor to integrator to end user is involved in the cybersecurity of the system, in the end, it is more about the people than the technology. Systems integrators must be versed in cybersecurity best practices when configuring a system and particularly if end-user training is involved in terms of device management and policies. 

Card image cap
Daniel Reichman Ai-RGUS

One missing skill is knowledge of how to set up a program that monitors the health of the camera system. While there are many tools to perform advanced functions with cameras such as identifying objects in real-time or reading licence plates, the camera system needs to be functioning correctly. If a lens is blurry, the license plate reader will not be effective, and if its hard-drive malfunctions then there won’t be any evidence stored of the car that entered illegally. Knowledge of and utilisation of tools that monitor all aspects of a camera system benefits the end-user and the integrator. 

Card image cap
Scott Dunn Axis Communications

Security integrators should strive to be very detail-oriented and equipped with as much knowledge regarding systems and solutions as possible. It is not the customer’s job to understand the ins and outs of every device, and how it could impact existing infrastructure. Integrators should not only be prepared to educate customers upon request, but they should also raise potential issues before they become a reality. This includes every stage of the device’s lifecycle, including decommissioning. A customer might not understand the importance of proper disposal, so an integrator needs to ensure that they are always protected. In essence, as an integrator, you’re the expert on the subject matter and a comprehensive understanding of today’s new and existing technologies is paramount to success. 

Card image cap
Ian Compton Arcules

Lack of knowledge and expertise in cloud technologies can present significant challenges for systems integrators and their customers. One potential problem is limited scalability and flexibility. Cloud-based solutions offer unparalleled scalability, allowing systems to easily accommodate changing storage and processing requirements. Integrators who lack cloud expertise may struggle to design and implement systems that can seamlessly scale according to customer needs. This can result in limitations in terms of storage capacity, computational power, and the ability to adapt to evolving business demands. Cloud technologies often provide cost-saving opportunities through pay-as-you-go models, resource optimisation, and reduced infrastructure maintenance. Integrators who are unfamiliar with cloud solutions may miss out on these potential savings for their customers. They may fail to assess the most cost-effective cloud services or overlook opportunities for infrastructure consolidation, leading to higher costs and inefficient resource utilisation. To overcome these challenges, systems integrators should invest in developing their expertise in cloud technologies.  

Card image cap
John Davies TDSi

Customers predominantly want solutions to their problems and are not that concerned about what the technology is that will address this for them. It is all too easy for some security integrators to become obsessed with the specific technology and to lose sight of the fact that these systems must address actual problems/needs to remain relevant. It is essential that all integrators have a broader understanding of their customer’s business issues and always aim to use technology to improve the security, health and safety, buildings management, and the general running of facilities to benefit end users. Successful integrators add tangible value and in turn thrive in the market, rather than just surviving. I would add that in my experience many security integrators fully understand this and do an amazing job. In fact, in many cases, these professionals that work on the front lines of security are driving innovation and finding new ways to support end users. 

Card image cap
Ray May Parker Group, Inc.

In the control room space, integrators are pivotal in design and setup, bringing together varied technological components for a seamless operation. AV-over-IP, a method for transmitting audio-visual data over a network via standard network protocols, is a crucial part of modern control room setups. The flexibility of AV-over-IP allows for long-distance signal distribution without degradation, facilitating remote monitoring and control. It also ensures efficient use of existing infrastructure by sending audio, video, and control signals over a single network cable. Integrators, in implementing AV-over-IP technology in control rooms, play roles across system design, network management, installation and configuration, training, and maintenance. A strong understanding of network management is required, covering aspects like bandwidth management, Quality of Service (QoS), and network security. Their role extends to ongoing system maintenance, troubleshooting, upgrades, and overall performance. Through AV-over-IP, integrators can create flexible, scalable, and efficient control room environments, but this requires the requisite technical knowledge and skills for proper implementation and management. 

Card image cap
Greg Skarvelis Intellicene

In the realm of modern security systems, a strong IT infrastructure and expertise in networking technologies are crucial. Integrators who lack a comprehensive understanding of IP networks, protocols, and network troubleshooting may encounter issues with compatibility or experience subpar system performance. It is imperative for integrators to possess a solid foundation in IT and networking concepts to seamlessly integrate security systems with existing infrastructures. Another area that presents difficulties is the integration of security systems with third-party systems like access control or video analytics. Integrators must have expertise in system integration protocols, application programming interfaces (APIs), and interoperability standards to ensure effective collaboration between different systems. Without this knowledge, integrators may struggle to deliver fully integrated solutions, resulting in reduced efficiency and functionality for customers. Fortunately, advancements are being made to simplify integration, as software and hardware vendors work to ensure that their platforms seamlessly integrate with other systems without requiring complex integration methods.  

Card image cap
Tariq Mahmood Verint Systems

A strong understanding of regulatory compliance is crucial. For example, security integrators working in the financial services market must be well-versed in the specific regulations governing video surveillance. This includes knowledge of privacy laws, data protection regulations, and any industry-specific guidelines. Failure to comply with these regulations can result in legal and reputational consequences for the bank, as well as potential breaches of customer privacy. Security integrators should possess in-depth knowledge of video surveillance technologies, including camera types, resolutions, storage capabilities, and network infrastructure requirements. Without this expertise, integrators may struggle to design and implement a surveillance system that meets a customer’s specific security needs, compromising the effectiveness of monitoring and investigation efforts. Most importantly, effective integration and interoperability skills are necessary. Video surveillance systems often need to interface with other security systems, such as access control or alarm systems, to provide a comprehensive security infrastructure.  

Card image cap
James Downey BFT Automation UK Ltd

A gap in skills can often arise when an installer has not been formally trained in how to use the products they rely on, especially when working with a solution that’s new to them or when faced with a particularly challenging installation. An example is fitting an automated security gate to work with accessories such as safety edges, induction loops, and photocells, which can become time-consuming and technically demanding, but there are simple measures installers can take to make the whole process far easier and therefore less disruptive for customers. That level of knowledge can’t always be learned purely from an instruction manual. There’s often no substitute for face-to-face training, where either an individual or a team of security installers can ask questions and practice using a product in action. 

Card image cap
Robert Wall Edge360

With the ongoing digitalisation and increasing interconnectedness of security systems, a deficiency in cybersecurity and IT knowledge could leave clients susceptible to various threats. For example, many security systems integrators might not have a deep understanding of containerised solutions. While containerisation has been gaining popularity in the software development and IT fields, its adoption in the security industry may not be as widespread. Containerisation requires specific technical knowledge related to Docker, Kubernetes, and other container platforms. It also requires understanding how to create, deploy, manage, and secure containers in various environments. If an integrator lacks these skills, it could lead to implementation issues, security vulnerabilities, or other problems. With this in mind, it is crucial for integrators to invest in training and skill development in this area and keep pace with the latest advancements in technology to serve their clients effectively. 


Editor Summary

Increasingly, network expertise and knowledge of the IT infrastructure are critical skills for integrators, who also need a broad knowledge of a variety of equipment and systems. Integrators can also benefit from a wider understanding of a customer’s business and issues such as regulatory compliance. Cybersecurity knowledge is essential, as is knowledge of technologies such as the cloud, AV-over-IP, and containerised solutions. Keeping up to date in a range of skill sets is a perpetual challenge for integrators. It is also the source of their continuing value to their customers.

  • Related links
  • Axis Communications Access control software
  • Axis Communications CCTV software
  • Axis Communications Audio, video or keypad entry
  • Axis Communications Digital video recorders (DVRs)
  • TDSi CCTV software
  • TDSi Access control software
  • Verint CCTV software
  • Verint Digital video recorders (DVRs)
  • Axis Communications IP cameras
  • Axis Communications Access control readers
  • i-PRO IP cameras
  • TDSi Access control readers
  • TDSi IP cameras
  • Verint IP cameras
  • Axis Communications Network video recorders (NVRs)
  • TDSi Access control cards/ tags/ fobs
  • TDSi Network video recorders (NVRs)
  • Verint Network video recorders (NVRs)
  • Networkable Access control readers
  • IP54 Audio, video or keypad entry
  • Card Access control cards/ tags/ fobs
  • Biometric Access control software
  • Event Network video recorders (NVRs)
  • Audio Only Audio, video or keypad entry
  • Access Control Software Access control software
  • Real Time Network video recorders (NVRs)
  • Network IP cameras
  • Card Swipe Access control readers
  • Standalone Access control readers
  • Detection Software CCTV software
  • Tag Access control cards/ tags/ fobs
  • Standalone / Networkable Access control readers
  • Smart Card Access control cards/ tags/ fobs
  • IP Surveillance Software CCTV software
  • Infrared Access control readers
  • Real Time / Timelapse / Event Network video recorders (NVRs)
  • Magnetic Stripe Access control readers
  • Management Software CCTV software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • RFID Access control readers
  • Door Monitoring Option Access control software
  • Version Upgrade Access control software
  • Visitor Management tool Access control software
  • Related categories
  • Digital video recorders (DVRs)
  • CCTV software
  • Audio, video or keypad entry
  • Access control software
  • Access control readers
  • IP cameras
  • Network video recorders (NVRs)
  • Access control cards/ tags/ fobs
Related white papers
Unlocking wide-angle camera dewarping

Unlocking wide-angle camera dewarping

Download
Cloud video and smart cities

Cloud video and smart cities

Download
Making sense of today’s security camera options

Making sense of today’s security camera options

Download
Related articles
SOURCE Tactical Gear women's ballistic vests win

SOURCE Tactical Gear women's ballistic vests win

Roc Technologies & City of London: Future-proof networking

Roc Technologies & City of London: Future-proof networking

Pimloc's Secure Redact enhances video privacy

Pimloc's Secure Redact enhances video privacy

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Body worn video cameras
  4. News
  5. Round table discussions
About this page

"Discover the crucial skills security integrators must possess for smooth operation. Explore how skill deficiencies can pose issues for physical security customers in our expert roundtable discussion."

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec