Integration software - Expert commentary

Simplifying multi-site security management with the Cloud

Cloud-based solutions with mobile credentials and capabilities are simplifying multi-site management Facility managers and security operations staff are often bombarded with calls from multiple tenants, across several sites — each with unique needs — but traditionally they had no insight or control on the spot. Now, cloud-based solutions with mobile credentials and capabilities are simplifying multi-site management — enablin...

Video management systems evolve beyond traditional physical security

Over the course of 2016, we witnessed a continuation of the prevalent trend towards more integrated and intelligent networked systems using Video Management Systems (VMS) as the central control platform.   One of the drivers behind this is open platform solutions that support more advanced physical devices such as IP cameras with on-board analytics, which continues to shift emphasis from the physical aspects of video and access control systems to the collection and correlation...

Impact of convergence of Internet of Things and physical security on VMS offerings

IPVideo Corporation, Bay Shore, New York, recently announced a new OEM agreement with Milestone Systems Inc., Beaverton, Oregon, in an effort to provide deeper and wider options in its portfolio of video management solutions. According to Steve Rice, Director of Business Development, the partnership will allow the company to reach a broader number of enterprise customers and provide them with distinct choices – and two completely different video management system (VMS) offerings. On the t...

Do’s and Don’ts of managing legacy systems – Migration better than rip-and-replace for enhancing security control system functionality

Systems may be reliable and performing as originally intended, but can also beoutdated in comparison to current technology offerings Let’s start by defining what a legacy system is in the context of a security control system. Legacy refers to an installed and operating security control system made up of numerous components, both hardware and software, that have been eclipsed by newer technologies. A shortage of parts and pieces may be creeping in, and it’s also li...

Next generation PSIM solutions widen scope for traditional command and control systems

 PSIM systems extend their value beyond emergencies by including routinemanagement tools, that provide value during daily operations, such as automatingmaintenance activities Physical Security Information Management (PSIM), an acronym termed to describe a family of software platforms that claim to replace traditional command and control (C&C) systems, primarily used to provide situation awareness in control and monitoring centres of Critical Facilities. Traditional C...

ISONAS Global VP of Sales Robert Lydic highlights importance of IP open platforms for access control

IP hardware is enabling customers to break free from proprietary security systems,to embrace the system integration available on open platforms Proprietary, closed systems are the bane of security. Yet they still exist. Robert (Rob) G. Lydic, Global Vice President of Sales for ISONAS, Boulder, Colorado, addresses the importance of open platforms in access control and what it means to systems integration in this exclusive Q&A. Trends in access control technology SourceSec...

Key and asset management are vital parts of security strategy, but more integration is needed

2015 has been a huge success for key and asset management company Traka. The manufacturer is predicting growth between 20 and 30 percent. It attributes a large part of its success to the extensive work completed in previous years in the U.S. markets, as the foundations set are now coming to fruition.   However, Traka has also encountered a real culture shift within the industry. Where previously key management systems and intelligent lockers for asset management were seen as a...

Integrator Preferred Technologies adopts value engineering and custom expertise to simplify end-user interface

System integration is about adding value, and value-engineering is the solution to address the challenges facing the customer and their facility Leading systems integrators continue to embrace new technology and add a range of services focusing on IT, connectivity and integration. The trend will continue for forward-thinking companies seeking to differentiate themselves from the competition and gain a loyal following of end-user customers.  Pref-Tech - History and backg...

Pure IP access control technology: 10 things you need to know

 IP is here and is continuing to proliferate in the security industry and its next major advancement is in pure IP access control IP technologies in the security industry are nearly ubiquitous today. End users and integrators have adopted and embraced IP cameras, building automation systems, wireless mesh networks, alarms, monitoring, and regularly view all of these technologies from the palm of their hand, on their smart phone. The technologies are easier to install, oft...

Wavestore’s Better Together partner programme supports VMS security solution installation

Wavestore’s Better Together programme is designed to offer benefits to security installers and integrators An independent video management system (VMS) offers an open platform that can support the “best-in-breed” components of security systems, according to James Smith, director of marketing at Wavestore. “We offer a truly open platform and are truly independent – what we do really well is bring disparate technologies together,” says Smith....

Honeywell, Twitter integration for situational awareness and emergency communications

Honeywell, Twitter integration brings security communication to its life safety products Honeywell, Northford, Conn., is leveraging the Twitter social media platform to bring higher levels of situational awareness and emergency communications to its life safety products. This move focuses to improve emergency response by monitoring various security, safety or building systems and providing information to identify potential threats. Gamewell-FCI’s Focal4 Now, Gamewe...

A pivotal year for security dealers: More changes in store for 2015

Suffice it to say 2014 was a pivotal year for the majority of alarm dealers and installers. Many have had to change their way of thinking and their method of doing business, while adapting to ever-changing technology. But those who continue to reinvent their go-to-market model prove that the integration business is the place to be – and there’s money to be made, albeit it not in simply installing boxes and hardware. In fact, that mind-set changed several years ago, and...

Simplifying management of large, geographically complex sites

Developers have made huge strides in the effectiveness, convenience, and reliability of the technologies used in video surveillance AxxonSoft 2014/2015 Review and Forecast:Video technology began with simple CCTV systems, but these systems have gradually become more sophisticated, offering both scene analytics and forensic post-analysis. The payoff is found in today's smart security systems. Video analytics are in use today in real-world conditions – on motorways, underg...

Security market trends in video: hype or happening?

There is convergence of both the video and access control technologies, and of the companies themselves Milestone Systems 2014/2015 Review and Forecast: Milestone Systems is always in touch with our vast ecosystem of partners around the globe as we support them in their customer projects and needs. We partake in hundreds of industry events, road shows, and meetings, also holding our own partner conferences in every region to ensure face time with our stakeholders. We do...

Biometrics market poised for rapid growth

2014 has been a year of significant growth for TDSi TDSi 2014/2015 Review and Forecast:In 2014 we saw continued growth at TDSI, largely through unprecedented interest in integrated IP security systems. Asian markets have continued to be very buoyant, although there have continued to be some flat spots geographically, such as Europe. Compared to other technology markets, security has grown very quickly since the recession, and TDSi has enjoyed double-digit growth. Manufa...

Improving security system installations with Acceptance Testing

Significant technological advancements have created endless possibilities in how security is not only deployed, but also leveraged by the end user – the customer. For example, customers can now view surveillance at eight different offices in eight different states from a single, central location. A security director can manage an enterprise-wide access control system, including revoking or granting access control privileges, for 10,000 global employees from a company’s...