SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

What is an open system? Interoperability rises as a security trend, but lacks an exact definition

What is an open system? Interoperability rises as a security trend, but lacks an exact definition
What is an open system? Interoperability rises as a security trend, but lacks an exact definition
What is an open system? Interoperability rises as a security trend, but lacks an exact definition
What is an open system? Interoperability rises as a security trend, but lacks an exact definition
Larry Anderson
Larry Anderson
Contact company
Contact ONVIF
icon Add as a preferred source Download PDF version
Related Links
  • ISONAS Global VP of Sales Robert Lydic highlights importance of IP open platforms for access control

Recently at a conference, one of my media colleagues asked an interesting, and basic, question: What exactly is an open system?

Many of us think we know what an open system is, but the ensuing discussion provided several different answers, many of them centred on what an open system is NOT (rather than what it is).

An open system does not limit a customer’s options. An open system provides maximum flexibility as a system evolves over time. In other words, an open system doesn’t lock you in, or limit your choices. If your technology roadmap takes a sharp left turn, an open system allows you to adapt, to incorporate new technologies introduced to the market, etc., without incurring a lot of extra expense.

In this regard, an open system lowers the level of “pain” for the end user customer. It “shouldn’t take a Ph.D. to make a change.” Augmenting or expanding a system should be easy and manageable within an existing environment without extra disruption or expense. One person at the conference said “open is smart, it’s current, and you can support change without a lot of pain.”

Standards for open systems: Important or not so important?

So far, no mention of the role of standards in open systems. Historically, I have understood that standards are the cornerstone of an open system. However, today’s “open systems” depend less on standards and more on integration tools such as application programming interfaces (APIs) and software development kits (SDKs). These tools, specific to each manufacturer, provide a means to integrate the manufacturer’s systems with other third-party systems. But that integration has to take place in order for the systems to work together. Typically, companies integrate with a variety of third-party manufacturers.

Which brings us to another aspect of whether a system is open: It’s not a yes or no answer. One might think that a system is either open or closed, but in fact, there are many degrees of openness, reflected by how many third party technologies are integrated and how easy the integrations are.

One might think that a system is either open or closed, but in fact, there are many degrees of openness, reflected by how many third party technologies are integrated and how easy the integrations are

But are systems that have to be integrated really open? Is the creation of standards that enable systems to be combined without being specifically integrated together beyond the realm of possibility? Organisations like ONVIF create profiles to implement simple integration, but end users and installers often say they want a deeper level of integration that goes beyond what ONVIF offers. So we’re back to the SDKs and the APIs.

‘Less-flexible’ open systems

Even in the case of open systems, an end user will likely commit to a specific platform, if not to a single manufacturer. While that platform may integrate well with a wide variety of third parties, there still may be limitations. In effect, they are “locked into” a platform, and getting out could cause the aforementioned pain and expense. We have heard mention in the market of some formerly “open” systems that have not kept up with the required integrations and therefore now are the equivalent of “closed.” Open systems may also have limitations in flexibility (which might be only a theoretical consideration if there are plenty of options available).

Ironically, even so-called “closed” systems – the more pleasant term is “end-to-end solutions” – often offer some level of openness. You might hear assurances such as “We provide an end-to-end solution, but our technology has also been integrated with X number of third party companies.” 

Unification – the latest buzzword in the security market

The short answer: Open may not be completely open, and closed may not be completely closed. Are we making sense yet?

Which brings us to a new buzz word we hear in the market today: Unification. As I understand it, unification is better than integration –  it’s deeper, richer, provides more functionality. Unification is a word often used by “end-to-end solution” manufacturers to describe how well their own systems work together. For example, a video system and an access control system from the same manufacturer are said to be “unified” in that they were developed together, side-by-side and hand-in-glove, and maximise each other’s highest levels of functionality. Feature for feature, they provide a deeper level of integration than is possible using standards, SDKs or APIs, the argument goes. But even unified systems may be claimed to be open – a video system can be integrated with another third-party access control system, for example (although presumably at a shallower level.)

What is an open system? Is there really any such thing in our market? To what extent is “open” a marketing term rather than a real description of technology? These are all interesting and timely questions as end users consider their technology roadmaps – today and in the future.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Security management
  • Security installation
  • Security access systems
  • ONVIF
  • Video surveillance
  • Related categories
  • Access control systems & kits
  • Intruder alarm system control panels & accessories
  • CCTV cameras
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
IDIS launches new AI PTZ cameras for enhanced security

IDIS launches new AI PTZ cameras for enhanced security

Everon & Alarm.com unify commercial security solutions

Everon & Alarm.com unify commercial security solutions

Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Security beat
About this page

Discover how open system interoperability is transforming the security industry, delivering innovative solutions & seamless integration.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec