Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Business of Interoperability

By David Bunzel
November 10, 2009

To say that convergence has been a buzzword in the physical security industry for years may be an understatement. But the reality of convergence is here. There is the convergence of IT and physical security departments within an organization and the convergence of processes like enterprise risk management under the chief security officer’s purview.
     
Of course, most of the buzz has been dedicated to IP-enabled physical security products and although there is talk about technology convergence becoming a reality, today different manufacturers’ products will not work with one another without in-depth integration and custom software.
     
IP technology holds great promises for security practitioners such as scalability and flexibility, lower total cost of ownership, access to real-time information, and from a video perspective, higher resolution images and the ability to view video remotely from any network connection.
     
But the proprietary nature of IP systems has been a barrier to widespread adoption. Thankfully, efforts are underway to change this fact and move toward true convergence.
Currently, there are a number of technological standards in various stages of development. The Security Industry Association has been working on the Open Systems Interoperability and Performance Standard framework for a number of years. More recently, we have seen the emergence of the Physical Security Interoperability Alliance and the Open Network Video Interface Forum. ONVIF is focusing on developing standards for video surveillance while PSIA is working to promote the interoperability of IP-enabled security devices across all segments of the security industry including video, access control, analytics and software. 
     
What PSIA, ONVIF and SIA are working towards will solve many of the issues security practitioners face with proprietary solutions. How will this specifically benefit you and your security program?


Lower Cost of Ownership

Interoperability will reduce integration costs as your integrator will not have to spend time consolidating disparate technologies. Systems can be expanded, modified and changed without the need for custom software development and in-depth integrations.
     
Systems will also be able to accept new and innovative technologies without the need for custom software applications and gateways, which often do not support each and every feature that a product might have on its own.


Finding ROI

The adoption of standards will also provide a higher return on investment as you will be able to leverage existing technologies, regardless of brand, as you build your security solution. As you add layered technologies over time, the overall system will continue to support legacy products, further supporting early investments.  
     
Also, as future technology is developed, it can be immediately deployed in real-world applications rather than waiting for manufacturers to develop custom interfaces.


More Useful Information

Interoperable products will enable you to have access to more critical data. Systems are inherently more intelligent, as they share information seamlessly from system to system and offer a higher level of protection to your company and its assets. Access to more information will also enable you and your security department to operate in a proactive manner rather than purely being reactive. Additional access to critical data will also make your staff more efficient as they are able to anticipate potential breaches and respond in a planned, effective manner.


Best Solution Sets

Standards for IP-enabled devices will allow you to choose a best-in-class solution, regardless of brand. Without the limits of proprietary protocols, security practitioners will be able to build a multifaceted security solution to protect your organization, its employees, and assets. 
     
We still have a long way to go, but there is a lot of excellent technology being developed. Standards groups continue to ramp-up their efforts. For example, manufacturers including IQinVision, Milestone, HikVision and Arecont Vision are moving forward with implementations of PSIA’s 1.0 Media Device specification, and end users are starting to demand these solutions.
Your input in this process is critical as these standards are being developed because these initiatives greatly affect how you will be able to use IP-based security products in the future. Associations like PSIA are working to support the industry by providing better solutions for the entire industry. We encourage you to be part of the process.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dave Bunzel is executive director of the Physical Security Interoperability Alliance, a global consortium of vendors and integrators focused on promoting interoperability of IP-enabled devices in the physical security industry. Participating companies include Adesta LLC, Arecont Vision, Assa Abloy, Cisco Systems, GE Security, Genetec, Honeywell, IQinVision, Johnson Controls, March Networks, Milestone Systems, NICE Systems, ObjectVideo, OnSSI, Pelco, SCCG, Stanley Security, Texas Instruments, Tyco and VidSys. For more information, visit www.psialliance.org.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Cloud icon

Google Cloud Service Exploited in New Phishing Campaign

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Webinar Review: Colorado School District Takes Interoperability to the Radio Waves

    See More
  • The Physical Security Interoperability Alliance Names Dave Fowler Chairman

    See More
  • Pelco Joins Cisco Technology Developer Program, Completes Interoperability Testing

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing