Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Middleware’s Value in Converged Networks

By Cynthia Freschi
January 1, 2008


To say that the advances in security and surveillance technology over the past number of years have been truly revolutionary does not fully do justice to the innovative and ground breaking improvements that have emerged. Some recent examples include video tape recorders replaced by network video recorders and servers; cables and wires replaced by wireless transmission and Ethernet; large black and white tube cameras replaced by compact digital color CCD cameras; and standalone systems replaced by complex integrated solutions.

These technology improvements have resulted in a growing trend of a more active and intelligent surveillance methodology that is affecting the way the concept of security systems design and implementation is approached. For instance, POS (point of sale) data is combined with video surveillance images to provide a visual record of activity to accompany sales transactions. Visitor management data is combined with HR databases or linked to federal government databases to help ensure a more comprehensive, secure and smoother visitor log in procedure that can be implemented in seconds. Access control systems are combined with biometrics, video surveillance, RFID and time and attendance systems to produce a robust security management system. Visual intelligence that is wirelessly managed and delivered to any mobile or location-based device via any proprietary, cellular, Mesh, or WiFi network to give security personnel, regardless of their location, the ability to monitor live or recorded images on-demand. And the list goes on.

A Common Platform

What all of these advanced integrated applications have in common, and what has become the basis for the trend of active and intelligent surveillance methodology, is the use of some form of a common collection platform, often referred to as a front-end or middleware. The name is adopted from the computer world where middleware sits in the middle, between the OS (operating system) and the application. An early example of middleware usage is in ATMs where the software manages auditing transactions, balances accounts and verifies identities with access control. In physical security and surveillance, middleware allows various applications – such as analog and digital visual surveillance, access control, time and attendance, POS, LPR (license plate recognition), fire and alarm, time and attendance, and with guard/virtual guard functionality – to be seamlessly connected in order to control the entire system and further to be able to share and manipulate the data from one software platform or control and command center, which can be also referred to as a dashboard.

The move to digital opened the door, if not actually precipitated the need for middleware. If we had the capability to transmit video, audio and data across a network as well as to combine the various systems, then we also had the need to manage and control from a single common software interface. As a result, proprietary systems are quickly becoming artifacts of the analog world and middleware has gained strategic value in converged network environments by helping organizations attain new levels of control and efficiency gains in security procedures thus allowing for truly agnostic system integration.

The Role of Middleware

As an example, middleware can link video in the database to related alarms or events generated from other systems such as access control, fire alarm, intrusion detection, etc. The software recognizes that the different events are related and organizes the data to be viewed as a single occurrence. In addition to the monitoring, the software also allows centralized management, administration and reporting along with customized dashboards or intelligent video walls.

In moving forward with the security convergence model supported by middleware, it is expected that applications hosted on wireless devices and accessing real-time search engines and databases will garner the most development. This makes sense when you consider that laptop computers are outselling desktops and even the most inexpensive cell phones include cameras, while smart-phones feature e-mail, word processing, television, movies and music functionality. In short, the market is pushing the technology, security included, to a wireless future.

Middleware products are available from a variety of vendors and the solutions offered include those for wired and wireless applications. These software driven solutions allow security professionals, law enforcement personnel, first responders and central stations or quality controllers to remotely access, monitor and control security systems from virtually any manufacturer using any computer or hand-held device such as a cellular phone, PDA or tablet. Additionally, they offer full telemetry, enabling control over internal functions such as PTZ control, DVR/NVR set-up and programming, and access control with advanced notification features – including the ability to send bookmarks with specific information related to alarm events.

It is said that software will revolutionize the security industry and middleware will be the true convergence tool.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Cynthia Freschi is president of North American Video, with fully staffed offices located in five states. Her firm is an SDM Magazine Top Systems Integrator.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • IP Video Surveillance: An Investment in the Future

    See More
  • Mobile Applications Gaining Ground in Security

    See More
  • Going ‘Green’ in the Security Industry

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing