Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Team Integration

By Bill Zalud
January 20, 2003


The company found itself with an illogical security system. Several years ago, Xilinx, the leader in complete programmable logic solutions and based in San Jose, Calif., operated three campus locations, each with a different access control system. The many employees who traveled between the sites had to carry three different badges.

When the company’s first internal security manager took over in 1997, he realized changes were in order.

“Not only was the arrangement a tremendous inconvenience for our employees, I had a difficult time understanding and managing three different systems,” says Ron Pennington, security manager for Xilinx. “I knew there was a better way to provide the high level of security that the company needed and I wanted to find it.”

Outsource Expertise

But rather than tackling the job internally, Pennington heeded the corporate philosophy that included researching outsourced services whenever possible. The national system integrator Xilinx had been using was not performing up to Pennington’s satisfaction, so he sought a firm near his offices in San Jose. The search led to San Jose-based RFI Communications & Security Systems.

In hiring RFI, Pennington got more than he bargained for. And the continuing relationship between end user and system integrator underscores the critical nature of the evolving electronic security arena and the need to emphasize systems integration within complex and far-flung facilities.

To keep up with tech change and to better handle enterprise businesses, integrators are changing, too, often in ways that combine strengths and locations of separate integration firms.

For example, along with its own expertise, RFI brought with it the backing of 13 other local system integrators located across the United States and Canada that have affiliated in an organization called SecurityNet.

Founded in 1993, SecurityNet is a network of independent system integrators, offering clients a single responsible source for meeting all electronic security needs in commercial, industrial, educational, government, financial and public sector facilities. Check a sidebar article in this cover story for more information on systems integrators and SecurityNet.

“When we first brought RFI on the job, we didn’t know about SecurityNet,” Pennington says. “But it turned out that this organization meshed very well with our plans.”

Xilinx had multi-building campus facilities in San Jose, Longmont, Colo. and Dublin, Ireland. Other offices in California, Maryland, Iowa, Texas and New Mexico were being opened. Currently, about 2,500 people are employed in those facilities, performing a host of engineering, testing, administrative and sales duties.

The first thing RFI did for Xilinx was to survey its security systems and then generate a company standard for current and future installations.

“We wrote a plan that could be handed to each facility manager and it included everything from the acceptable head-end access system down to the door locks,” says Brad Wilson, president of RFI and current SecurityNet president. “And then I asked my SecurityNet partners to join us to help make it happen.”

Joining RFI in the Xilinx project was Kansas City, KS.-based Cam-Dex Security; Security Control Systems from Houston; and Burnsville, Minn.-based VTI Security Integrators.

The new security plan, prepared by RFI, settled on a Casi-Rusco Picture Perfect access system, which was already in place at Xilinx’s San Jose headquarters. The system gave Xilinx the flexibility it needed to restrict access to areas such as inventory cages, test floors, accounting and engineering and hazardous materials storage.

Access Controls

Employee access badges are made using the Picture Perfect’s Access Vision system. Those badges can be created at the three campus sites with the capacity to be added soon at an office in Albuquerque, N.M. Smaller locations— most with fewer than 20 employees— send a digital image to the corporate Security Operations Center in San Jose, where the badges are printed. Pennington estimates his department makes more than 2,000 badges annually.

Security Cameras

The overall security plan also called for a mix of Pelco and Sony fixed and dome surveillance cameras to monitor sensitive areas such a building entries and perimeters. Robot Intellex digital video recorders were chosen to capture and archive CCTV images.

Critical Systems

Other devices incorporated into the plan include glass break detectors, local electronic door sounders, request-to-exit devices, motion detectors and environmental control monitors. Those monitors allow for moisture detection and temperature in the company’s main data center. The electrical supply and emergency generators are also closely monitored.

“That is a very critical thing in maintaining a network and allowing for an orderly shutdown in an emergency situation,” Pennington says.

All of these systems are integrated and monitored at a new San Jose Security Operations Center (SOC), designed by RFI. From there, two or three Xilinx security officers monitor the systems 24 hours a day. Security personnel are also stationed around the clock in Longmont and Albuquerque. Personnel in those two offices may order a response to a local alarm situation or officers in the San Jose SOC may take action. Pennington says the company’s long-term plan is the have the operations centers in San Jose, Longmont and Dublin work together as hubs on a master server.

High Tech Monitoring Center

The SOC is a marvel of technology. Dominating the center are two 42-inch plasma monitors by NEC. Cameleon camera control software from 360 Surveillance allows Xilinx security officers to move their mouse from one plasma screen to the next to choose a scene to view. The officers can also view camera input on 15 rack-mounted Sony 14-inch color monitors. Fiber optics cable is used to link the access control, intrusion, fire, CCTV and radio communications systems. RFI designed the room with plenty of space to move about freely and easily access the equipment for service.

While many of the initial complexities have been unraveled, the corporate security plan is far from being finished. It is an ongoing process that takes into account Xilinx’s domestic expansion plans, as well as those for Europe and in the Asia/Pacific region. Pennington wants to expand the existing security system. When that time comes, SecurityNet will handle U.S. installations. RFI will work directly with European and Asian system integrators and provide them with the RFI drawings to assure that all work is completed to the SecurityNet standards.

According to John Krumme, president of Cam-Dex Security, the SecurityNet model has worked exactly as planned.

Coordinating Service

”Our part of this project (Iowa) went flawlessly,” he says. “We knew what RFI’s expectation was for this site. With their drawings, it was a smooth install. The Xilinx people knew we represented RFI. But they also knew if there was a local service issue that came up they didn’t have to wait for someone to come from California to resolve it. They knew we could be there right away for them.”

From his point of view, Pennington says the SecurityNet experience was a good one for Xilinx.

“When I started here, we had a patchwork quilt of a security system,” Pennington says. It was cumbersome. We knew we had to fix it. Since then, we’ve made great strides. To a large degree it is the result of the great participation we’ve had from RFI and SecurityNet.”

Of course, that is the aim for any systems integration. “From the beginning, we knew that by sharing common experiences and common problems that we could improve the service we provided our major accounts as they opened offices in other regions of the country,” says Ray Dean, president of PEI Systems in Long Island City, N.Y. “But for this to work, we knew all members (of Security Net) had to share the same dedication to service that we practiced in our own businesses.”

Bill Savage, president of Houston-based Security Control Systems, is one of two of the original members of the group, which was founded in 1993.

“We started with seven members, whose total combined annual revenue was near $20 million,” Savage says. “Today, our 14 members have revenue of $200 million. We are of different sizes and represent different geographical areas, but we all hold the same high, customer-based operational standards.”

Over the years, the make-up of SecurityNet has changed as new members have been added and some have left —most commonly after being purchased by a national integrator. But the spirit of cooperation between the members continues to grow stronger.

“Each company is strengthened by the relationship with SecurityNet as SecurityNet is strengthened by each company,” says Brad Wilson, the group’s current president and president of San Jose, Calif.-based RFI Communications & Security Systems. “Members can share experiences and business strategies without hesitation. This environment is extremely valuable for validation or tactical planning.”

SecurityNet members meet on a quarterly basis to share information that can range from installation solutions to human resources, insurance and marketing issues. Additionally, the organization’s TechNet group of engineers meets to bench test new products, stay on top of new ideas in system design and installation and other related issues.

“Our major endeavor over the last several years has been to develop a set of tools we can bring to a customer,” Savage says. “Those tools are the standards we use internally for how we install systems and the best practices we learned through the interaction of our individual companies.”

While establishing standards, the group also recognizes that not all customers will have the same needs, Savage says. So SecurityNet has developed a number of different methodologies that a customer can select from with the advice and counsel of a member company.

“Many customers approaching a SecurityNet member may not need the full resources of the organization. But they still benefit by taking advantage of the local service, plus the standard of practice, drawing standards, installation standards and backup and support received from SecurityNet.”

Jack Morris, president of Burnsville, Minn.-based VTI Security Integrators, says SecurityNet customers get the structure of a large national system integrator without losing the entrepreneurial spirit of the individual companies.

“Using a national company, customers run the risk of dealing with a branch manager who has no personal investment in the project, unlike dealing with SecurityNet and its members,” he says.

Both customers and equipment manufacturers benefit from working with SecurityNet members. Because of its size and base of well-known customers, SecurityNet can keep job costs lower by wielding significant buying power with equipment manufacturers, says John Krumme, president of Cam-Dex Security from Kansas City, Kan. Also, the group has more influence in getting customized equipment to meet its customers’ specific needs.

And, according to Wilson, manufacturers enjoy the ease of working with SecurityNet and its members.

“They (manufacturers) want to maintain their reputation among end users and know that SecurityNet with its capabilities is much more likely to get things done right the first time and with much less need for technical support,” he says.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • global-enews

    4 Best Practices for Global Integration

    See More
  • Lifeline Speedlane Vision_SFX Images_2880 x 1620px

    The future of AI integration with secured entrances

    See More
  • Salesforce_William MacMillan.jpeg

    Former CIA CISO William MacMillan joins Salesforce security team

    See More

Related Products

See More Products
  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing