Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalAccess ManagementPhysical Security

Disparate systems: The importance of closing the gap

By Cody Dowd
office building windows

Image via Unsplash

January 12, 2024

Are you getting the most out of your security system? This is a question that many security leaders should be asking themselves. As growth in an organization occurs, so does the need to enhance its security measures to ensure its assets are protected. However, one of the biggest pitfalls organizations run into inadvertently is the inability to maintain a unified security system, and often end up with a less than desirable disparate security system. For larger corporations this typically comes with mergers or acquisitions.

To best describe the difference between the systems, let’s first look at what they are. The most common use of a disparate security system is a series of isolated or a single-purpose system that may work great independently, however, falls short when it comes to communicating with the overall system. For example, an organization may have both an access control system (ACS) and a video management system (VMS) that monitor designated points and log all pertinent information. However, if these two systems do not communicate effectively with one another, it can delay the response from security personnel who are actively monitoring the system. Another drawback to disparate systems is the inability to tap into and hardness of the new technology devices. One often limits the capability and capacity in which their system functions due to the lack of communication and integration among devices.

One of the drawbacks of using a disparate system is the consequential waste of time, money and other resources. Security personnel may be notified that unauthorized access occurred at one of their perimeter doors, however, they would still be required to manually search through the video surveillance footage to find details on the incident. Depending on how their corporate network infrastructure is set up, and the ease of use of the technology, this may take longer than desired.

In a unified security system, all components of the system communicate seamlessly or nearly seamlessly with one another. The ACS and VMS work in unison and help security personnel by providing all the desired information nearly instantaneously decreasing the response time to an incident. Using the previous example, the security personnel not only receive a notification of unauthorized access, but they also receive video associated with that incident. As technology continues to advance, artificial intelligence (AI) capabilities both at the camera and internal software can provide additional information to security personnel.

Having a unified security system allows security professionals the ability to leverage more built-in features and functions of cameras and software that ultimately enhance security capability. In addition to the above benefits, not only is the unauthorized access captured on the local camera, but AI can produce all video surveillance footage that captures the incident and deliver it to security personnel in a nice package.

How to unify a security system

As cliché as it may sound, the first step of moving from a disparate system is to identify that an organization has one. A thorough technology audit is necessary to understand where an organization is in their journey. A technology audit is an evaluation of the existing security system and its current design. Often, but not always, completed by a third party company and is a snapshot of where the organization sits with its current security system. Typical audits are conducted in phases such as pre-visitation, site-visit and reporting, or some variation of that.

Items such as platforms, current installed software and firmware versions, the overall infrastructure of the security system, policies/procedures and floorplans are provided and evaluated for efficiency. Once the assessors understand at a high level what is currently in place, a site visit is conducted. A site visit allows the assessor to get eyes on and helps them identify gaps or questions that may arise from evaluating the data given in the pre-visit phase. Things like daily operations, staff, standard operating procedures (SOPs), post-orders and existing/future infrastructure plans are identified. Once complete, an evaluation is conducted, and a comprehensive report can be written that outlines where the organization stands, and a plan to move forward is created.

The reports that are produced from audits like these typically outline steps that an organization needs to take to move from a disparate system(s) to a unified system. Security directors typically have their plates fairly full with daily tasks and understandably aren’t able to keep up with the ever-changing world of new security technologies. Relationships and agreements between VMS manufacturers and other security-related equipment are changing frequently. Systems that pair or complement one another today may and likely will change in the future. Understanding those relationships is critical and can save organizations a significant amount of time and resources when properly chosen. A technology audit report, if properly done, can deliver the price breakdown of transitioning from one system to another and helps create a bigger selling point for senior management when it comes to budgeting. Additionally, it can identify what best alternatives available based on evaluated installed hardware/software.

Organizational budgets are often predictable, and the longer a company has been in business the easier it is to forecast budgets for future projects. However, even the largest most stable corporations encounter unforeseen budgetary constraints which can often impact security. This can often lead to organizations making smaller, incremental changes to their security systems rather than having a long-term goal. The long-term goal for a security director is to ensure that their security system communicates efficiently and provides them with the necessary tools to protect their assets without causing strain on the everyday business.

Disparate systems can formulate easily and often the outcome of normal ongoing business operations and changes over time. Creating a system that allows for growth and adaptability in uncertain circumstances is the ultimate goal. While security professionals strive to be proactive, in truth it is simply reactive in nature. A unified security system allows for security professionals to have as much information related to an ‘exception activity’ as possible which will shorten the time of that reaction and help deliver desired results.

KEYWORDS: access control security leaders security measures security systems video management system (VMS)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Cody Dowd, CPD, is a security services project manager for Calibre Engineering and a former U.S. Army Special Forces leader.  

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Closing the cyber skills gap requires a culture of continuous learning

    See More
  • School bus drives down street

    Closing the gap between student safety and security in K-12 school transportation

    See More
  • empty meeting room with glass windows

    Closing the gap between physical and cybersecurity

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • The Complete Guide to Physical Security

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing