Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

Bob Beliles Exclusive Blog from ASIS – Day Three: Integration and Plug 'N Play

October 15, 2010

As typical with the last day of any tradeshow exhibition, the ASIS floor traffic was lighter, making it a bit easier to get from one booth to another. But with so many vendors, it would be impossible to visit every booth and have a quality conversation on what was new. Nonetheless, I saw a few more things that fell into common “buckets”, albeit not necessarily ones that you haven’t seen for yourself. However, they are noteworthy as they do make up a promising trend for security technology.
 
Integration of multiple security devices or applications continued to march on. What may seem as a minor evolutionary step might be a subtle or, in other cases, a not so subtle move by a company to enter new markets. For example, more video management system (VMS) software companies have integrated capabilities that are not considered as video management functions. Thus, they have jumped on the PSIM (physical security information) bandwagon. ONSSI has used PSIM in their product messaging for a while. Others simply observe that customers want a single interface and have begun to not just pass video to an access control partner, but actually have the ability to buzz a door open from inside their video GUIs. So clearly access control, PSIM, and VMS vendors are vying to be “THE” security interface to the security operator. It is interesting to note that the larger players don’t really play on the PSIM front, or have chosen to quietly partner with a PSIM vendor rather than providing their own offering. To be fair, it may be that this technology, while bringing many new capabilities, can enable a competitor and loosen the hold on their installed base. It would also be an excellent way to take market share from a competitor, if looked upon as an offensive strategy.
 
Integration has also extended to various hardware vendors. Mobotix has rolled out a POE door console that incorporates a keypad, VoIP speaker phone, and camera. While that might not be such a big deal, that keypad also hides contactless badge reading technology. Thus, it heralds Mobotix’s entry into the access control part of the market.
 
It’s well recognized that integrated products can make life easier for customers and dealers/installers; this is particularly true when deploying the technology. Plug ‘n play is essentially built-in to most of these products. But plug ‘n play is also evolving with more devices and products automatically discovering and registering with their respective control/management system head-ends. Since many of these systems use IP, these auto-discovery mechanisms must also navigate internal and external firewalls. IP camera vendors have definitely improved their capabilities in this area.
 
In some cases, the ability for the edge devices to call home to their head-end units is absolutely critical. It tends to be easier for them to call out to the head-end management server/device, located in a remote location or operated as a hosted service, versus head-end management piercing an organization’s internet firewall in an attempt to locate its related customer premises equipment (CPE). Thus, plug ‘n play is a key function for hosted services companies, such as some of those that I mentioned yesterday. After all, reducing complexity is part of their value proposition for end-users.
 
In an attempt to pull all three days worth of ASIS innovation hunting together, I would leave you with a few thoughts/technologies and capabilities to watch. They may not be earth-shattering, but they are worth mentioning, in any case. Comparing the companies that tend to occupy the edges of a tradeshow floor versus those in the middle is an excellent metaphor for technology innovation adoption and mainstream use. In security, you tend to find smaller companies using new technology or applying proven technology from other industries (such as IT) at the edge. As you move to the middle or center of the floor you find larger companies that don’t tend to be as nimble (there are exceptions, though). The technology found at the center is typically long proven and familiar, yet it also tends to be more complex to deploy and operate, less functional, and more costly in the long run. Ironically virtualization, hosted services, integration and plug and play have been proven in mission-critical business systems and applications countless times over. As an industry, while we may be risk-aversed, these “innovations” have demonstrated their value. Regardless of the perspective, the security industry and business will grow and improve with the adoption of these technologies.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Bob Beliles Exclusive Blog from ASIS – Day Two: Hosted Services More than Just Outsourcing

    See More
  • Bob Beliles Exclusive Blog from ASIS: Virtualization Means Less Gear, Less Complexity

    See More
  • Security Blog Download Exclusive: Violence on Campus Report from Secret Service, FBI, Education Dept.

    See More

Related Products

See More Products
  • Optimizing Social Media from a B2B Perspective

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Physical Security and Environmental Protection

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing