Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

PSASpecialReport: Understanding Networking is Future-crucial

By Dave Engebretson
May 7, 2006


Do you know how to connect an IP camera to a network in minutes? If not, others do.

With the emergence of IT networking-enabled products, the playing field for security systems integrators has dramatically shifted. Integrators are faced with new ways of installing security systems and end-users are experiencing new ways those systems can be used.

For instance, integrators will reduce labor costs and bid more competitively simply by using the existing networks rather than installing cable. The real trick is learning how to take advantage of those existing networks.

When it comes to products, the IT industry is light years ahead of the security industry because the latter work across vendor platforms and product lines – a huge advantage for integrators. Unfortunately, in the security industry, a keypad from one manufacturer won’t connect to another manufacturer’s alarm panel.

That’s why every course I teach is product-independent. I bring in networked devices from 14 different manufacturers to the class and demonstrate how they all seamlessly work together. I teach students about IP addresses and how to handle firewalls and switches. When we’re finished, my students are ready to install network-enabled products, regardless of manufacturer.

Two areas that seem to present the greatest potential are video and intercom systems. Traditionally, security video has meant a CCTV camera hooked up to a DVR, which is viewed and recorded on a 24/7 basis. While this type of installation will always have a place, one of the strongest markets existing today is “occasional video.” This is a perfect application for end-users who may not necessarily need to view and record everything, but would rather connect occasionally. Some examples are water levels on a dam or gauges in a factory.

Intercom systems present another potentially large market for security integrators. As networked technologies, these products connect a standard intercom box to the Internet, which allows end-users to answer the intercom from their laptop anywhere in the world. If they have an electric strike on their door, they can even let someone in and disarm their alarm system. The networking of intercoms, cameras and alarm transmitters opens a vast array of possibilities.

Not a Member?

The times they are a changin’.

It used to be that only PSA members could attend the annual conference and take advantage of the vast resources the largest electronic security cooperative in the industry offers. That no longer holds true. The times have changed. Even if you’re not a member, there’s no reason now that you can’t benefit from the extensive training, networking, experience and so much more.

In addition to PSA-TEC, where non-member security integrators have the opportunity to attend the same in-depth training classes as members, PSA is launching a series of new Limited Liability Companies (LLC) that will provide a diversity of services. The creation of the independent LLCs is part of PSA’s strategic business plan and is intended to provide greater flexibility to meet the changing marketplace, as well as offer new opportunities to members and non-members.

More information of PSA Security Network at www.psasecurity.com.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dave Engebretson is president of Slayton Solutions, author and a technical editor for SDM Magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • finance security freepik

    Why cybersecurity frameworks are crucial for the future of open banking

    See More
  • cameras surveillance

    Cloud-based solutions playing crucial role in current and future of commercial security space

    See More
  • PSASpecialReport: “Professional” Is Word for Training

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing