Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

In Enterprise Environments

February 1, 2005
Enterprise integration calls for a more sophisticated level, including more data in cardholder screens.
Depending on the end user’s perspective – building systems operations, IT or security – the definition of “enterprise” differs dramatically based on the applications it encompasses. In the security market, for example, there is a great deal of emphasis on how access control, video surveillance, intrusion and fire alarm systems can work together seamlessly and are being deployed today with a high degree of efficiency. Although a significant step in the right direction, a higher level of interaction between these systems and previously unrelated systems needs to be accomplished to achieve true enterprise-level performance.

It is important that “enterprise” be defined relative to the microcosm of the security industry. Its definition needs to be somewhat limited, incorporating just those event management systems most commonly deployed in large-scale facilities. They include: video surveillance, access control, intrusion alarm and fire alarm systems, as well as any primary building management systems (elevator alarms, HVAC, lighting, etc.). The key component in this definition is the ability to integrate the operations of these systems so that they truly function as one.

Enterprises want to track a diversity of events across a variety of buildings and locations.
There is a significant difference between interfacing and integrating systems. Interfacing is merely the ability to connect one system to another so that they interact with each other to perform a predetermined function. Let’s look at a relatively simple example: An access control system sends a signal to a video surveillance system to reposition dome cameras and begin recording in real time, while a series of doors lock and lights are turned on in the affected areas. This is easily accomplished with today’s software driven controllers, but most facilities do not even employ this level of systems interface.

Enterprise-level integration calls for a much higher level of sophistication or “intelligence.” With the relatively new ability to engage communications between systems with high level serial or TCP/IP connections, software-driven system controllers can share programmed commands on a single platform via multiplexed signals across the network. Once the controllers of previously unrelated systems are integrated on a single platform, these systems can function as a single entity and not as a series of systems simply reacting to external commands.

The most significant benefits of integrating security on the enterprise level include the ability to manage all of the systems from a centralized location, and potentially with a single shared database, or any location on the network. In addition, enterprise security systems allow for systems architecture to be distributed along several network nodes with the ability to share data between multiple systems. This is a critical concern for multi-tenant systems or companies with branches in different regional or global locations.

Continuous upgrading

Another significant benefit of operating security systems on the enterprise level is that they can be configured, operated and updated continuously given the nature of the system. Once the network connection is established on the designated open platform, the entire security system’s operational parameters can be changed and/or restored at a moment’s notice. Unlike traditional hardware-driven systems, truly integrated enterprise security systems are limited only by the processing capabilities of the control software.

Additionally, there are numerous systems already in place that can provide “data integration” to an enterprise level security system. Examples include point-of-sale systems, elevator/escalator systems, counting devices, ticketing/token machines, gaming and vending machines. By integrating shared data from these systems and providing a common interface capable of “mining” the database, specific events can be readily identified.

The question is: how can the security industry achieve true enterprise-level security systems operation? First, it is imperative to select a system that will serve as the platform for the application’s security and other event management needs. The key selection criterion in making this decision should be the ability to provide the open architecture necessary to integrate all of the technologies that will comprise each specific system, today and in the future.

Now that video systems have joined access control systems on a digital platform, access control systems are the logical choice for system control and integration given the scalability and virtually unlimited expansion capabilities these systems offer. The introduction of an access control system, with an embedded software development kit, new IP capabilities and database partitioning, exemplifies the versatile programming capabilities available to systems integrators for enterprise. End users need to have a secure network in place with sufficient bandwidth to handle the signal capacities required for true enterprise-level integration. Fiber optics may hold the key, given the virtual unlimited bandwidth they provide. With the progression of technology over the past 20 years, the migration to enterprise-level security systems may be a lot closer in our future than previously thought.

Data collectors play a security officer role at enterprises.

Sidebar: Enterprise Asset Tracking, Guard Tours

When Herold Amandi, director of public safety for the Mall of the Americas in Miami, Fla, wanted to make sure security officers were making their rounds, he decided to shop for a guard tour system. He picked a system from Miami-based ProxiGuard. The device holds 28,000 records in its 4Mb flash memory and is water and shock resistance.

Such data collectors come in all shapes, sizes and colors; some have bells, some have whistles, some read unique hexadecimal ID numbers, some read barcodes and some even read RFID tags. Most have a downloader and/or transfer station, a serial or USB interconnect cable and a software program.

From R.E.B. Software Technology of Deming, N.M., its guard tour software uses the Videx (Corvallis, Ore.) products and iButton technology from Maxim Dallas Semiconductor (Dallas). Included with the software: activity group reports as well as lists, exception, time management and missed hits.

One data collection unit for security officers at enterprises is the DuraTrax from Videx. It has a laser barcode scanner as well as touch memory reader.

From Digital Security Concepts of Kingston, Ontario, Canada, there is TourTrax. It is designed to exceed demanding needs for accurate, timely reports and documentation of security patrols. TourTrax is a comprehensive solution for any busy security department or agency.

Some security operations seek guard tour systems that can handle harsh environments. One example: the ProxiPen from Detex of New Braunfels, Texas. ProxiPen is a proximity reader with an integral read head and a user-replaceable battery. No matter if a checkpoint is wet, frosty, dirty or painted over, the device reads RFID tags, which are available in a variety of shapes and sizes. Detex software can create tours, produce evaluation reports as well as incident reporting and guard identification.

Beyond guard tour, there are key management systems for asset tracking by officers. Oxford, Conn.-based Morse Watchmans, for example, has KeyBank III key management system for high-volume key users. It features an updated storage system with individually illuminated Smart-Key locations, allowing for instant visual identification of checked-out keys and keys available for individual user checkout. Designed as a replacement system for manual key storage and tracking, KeyBank III key management system eliminates outdated key lock boxes, hand-written checkout logs and key identification tags.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-threats

    NSA releases guidance on encrypted DNS in enterprise environments

    See More
  • SEC1018-cyber-Feat-slide1_900px

    FireEye Report: A Majority of Attacks Successfully Infiltrate Enterprise Environments Without Detection

    See More
  • Integrated, Adaptive UTM++ for Enterprise Environments

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!