Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Identity Management

Intelligent Intercom Systems Improve Remote Security

By Sue Marquette Poremba
Tall Building: Skyscraper Slide

Installation of intelligent intercoms should be whenever or wherever life, money or assets are at stake, where the communication cannot fail and must tie in with other high-end security devices, including security video, access control, fire alarms and other building management system for an interactive security system.

Intercom Phone

The beauty of an intelligent intercom system is that it can easily be expanded and interconnected, with both audio and video intercoms. 

Emergency Phone
Intercom systems that work with regular phones can enable special ring tones and forward calls from a call box to multiple phone numbers. 

Tall Building: Skyscraper Slide
Intercom Phone
Emergency Phone
August 4, 2011

Matt Marcon of MGM Communications in Glendale, Ariz., found that his customers needed a better intercom system. Marcon is a dealer who sells and installs communication systems for self-storage facilities, and he says the old-fashioned intercom systems – press a button and hope someone was there to respond – were hurting, not helping, his customers’ businesses.

So he reached out to Viking Electronics in Hudson, Wisc., and worked with them to come up with a system that would work best for Marcon’s clients. “Now we have a system that works with a regular phone,” Marcon says. “If someone is calling from the call box, the phone has a special ring tone.” Another special request from Marcon was to forward calls from the call box to multiple phone numbers.

“I had an application for an intercom system in mind, and Viking was intrigued by the idea,” says Marcon. It didn’t take long for the product he was looking for to be developed. Today, Marcon adds, some of the largest self-storage companies in the country are using the smarter intercom system.

The beauty of intelligent intercom systems is the flexibility they offer, says Don Springer of Viking Electronics. The makers of intelligent intercom systems understand that few people spend all of their time in one location, ready to respond to the buzz coming from the speaker box. Using a phone or digital IP rather than a speaker box also allows for crisper voice communications; there is less chance of misunderstanding the caller. Viking Electronics, for example, takes advantage of today’s cell phone society, programming its intercom system to work through a mobile device. This is especially helpful for security personnel, Springer explains, who are often walking around a property.

Barix of Oakdale, Minn., on the other hand, relies on digital IP for its intercom system. When Rodolfo Palau, director of IT with Inside SRL, an information technology commercial and industrial solution provider located in Rio Grande, Tierra del Fuego, Argentina, was looking for an intercom solution for a client’s growing plant, he searched for an IP-based solution to use an existing network infrastructure. He turned to Barix. “It has the great advantage of be scalable, especially on a 182,987 square foot  plant,” Palau says.

The old system at the plant depended on internal telephony, VHFs and available guards to handle intercom activities. It was inefficient and sometimes impossible to accomplish personnel department requirements, Palau explains. The upgrade intelligent system is a base station for the security guards with 16 audicom stations distributed on designed zones. They are connected to 180w audio amplificators.

“Now the intercom requirements are satisfied with possibilities of adding new zones on 2012 plant growing in adjacent site,” Palau adds. “The IP-based systems allow future remote locations for new external warehouses.”

Security is a growing market for the intercom industry, says Marcel van der Mejis, vice president of sales and marketing with Barix. Only a few years ago, he says, as the industry made the move from analog to digital, it expanded the possibility of communication capabilities and storage. The intelligent intercom systems of today are able to record video as well as audio, and they allow for two-way communications. At a back door at a factory, for example, a truck driver can establish communication with a factory employee while, at the same time, the employee can monitor the location of the truck driver. These advances in intercom systems have improved audio and video surveillance security.

Defining a product as “intelligent” implies that the product wholly exceeds expectations for standard function, according to Bradley Kamcheff, senior marketing specialist with Aiphone Corporation of Bellevue, Wash. For example, products deemed as smart phones are considered “smart,” or “intelligent” because they’re exceptionally more than just phones; they’re handheld web browsers, cameras, gaming devices, etc. They allow you to be more effective and efficient in your everyday than if you were using a “regular,” singly functioning phone that simply made and received calls.

Likewise, an intelligent intercom surpasses the basic function or purpose set out by any intercom system, integrating a wealth of functionalities to increase a user’s capabilities and efficiency. A traditional intercom is generally considered a hardwired device that allows for voice communication between two or more specific points. Therefore, an intelligent intercom expands greatly upon that basic communication to become a more expedient and valuable tool.

For instance, says Kamcheff, wireless or IP-based intercoms save installation time and cost, while including features that substantially enhance safety or workflow. These types of intercoms can include video signals that allow speakers to see whom they’re contacting, programming contacts at entrances to increase time-efficiency and safety and video recorders that allow users to not only see, but document their visitors. Intelligent intercoms can even advance beyond their device functionalities to be integrated with other security devices, such as security video, access control or paging systems.

The Lucky Eagle Casino and Hotel in Rochester, Wash., decided to switch to an intelligent intercom system. “The expansion our company has experienced in the last four years required us to migrate from our simple one door installation to a more robust Aiphone AX series install,” says Miguel Grijalva, deputy director of surveillance. “Our campus has expanded in size and traffic to include remote parking lot access, local parking ‘high roller’ parking lot access, data center access, and service entrance access at remote locations.”

The Lucky Eagle Casino and Hotel had always used Aiphone systems, but Grijalva and Security Manager James Elder decided it was time to move to an intercom system with more robust capabilities. Also, Grijalva adds, it was more cost effective to install the new intercom system at the door stations for two main reasons: “One, we can leverage our recently upgraded telecom infrastructure, and two, additional security video equipment does not have to be installed to provide verification. A security officer can facilitate authorized access from one location without having to dispatch personnel for each incident, thus ensuring visual verification and speed and efficiency in response.”

Grijalva says the casino’s system is configured such that the central exchange unit is housed in its main data center, with the door stations and the video master stations connected using its existing twisted pair infrastructure, managed through telecom punch blocks, and fiber optics at a remote parking lot. Using the door release relays on the central exchange unit, it was able to integrate the AX system into the existing enterprise class access control system, which allows an operator at the master station to release various doors and gates, in addition to those actuated by the door station. “The existing system has more options, configurability and scalability than our older method,” he says.

An intelligent intercom can be installed anywhere that point-to-point or mass communication is desired, featuring all additional options the specific intelligent intercom has to offer. Schools may install an intelligent intercom to streamline all their systems into one fluid solution, combining elements such as video entry security to verify visitors, classroom-to-office intercoms for internal communication, bell scheduling for class period changes and overhead paging for standard or emergency notifications. A commercial building could benefit from the security features of an intelligent intercom to keep employees and assets safe during normal business hours, and use the IP functions to maintain these responsibilities after hours.

In other words, according to Bennie Cooper, product development/systems engineer with Zenitel USA, installation of intelligent intercoms should be whenever or wherever life, money or assets are at stake, where the communication cannot fail and must tie in with other high-end security devices, including security video, access control, fire alarms and other building management system for an interactive security system.

Daniel Roff, IT Senior Engineering Analyst, Prairie Island Nuclear Generating Plant, uses Zenitel USA’s Stentofon system. “We needed a hardwired backup communication tool which could also be utilized to reduce radio traffic for routine business needs,” he says, “and the analog intercom was not expandable to meet our needs.” Roff says the new Stentofon Intercom his company installed is a digital IP-based system that is easily expanded in the future using COTS network hardware. “The event driven programmability allows for customizing the system to meet very specific requirements. The DSP feature works very well to reduce transmission of background noise from stations located in noisy environments,” he adds.

Intelligent intercom systems add an extra level of security, not just for the building and its occupants, but also for the security personnel themselves. For example, Springer says his systems can open doors and gates using phone controls. When asked about the risk of losing a phone or someone using a phone to open doors from outside the building, he says the system can be set up to take data only from an inside phone connection.

The systems aren’t cheap, van der Mejis, adds, and they may not be for everyone. If a company is small and local, with only one or two entrances, it would probably make sense to stay with a traditional intercom system. But for a company that is growing or has facilities in multiple locations, the beauty of the intelligent intercom system is that it can easily be expanded and interconnected, with both audio and video intercoms. Intelligent intercom systems can provide an on-going and ever-growing company-wide security solution.

KEYWORDS: security intercoms two-way communications

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sue Marquette Poremba is a contributing writer.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Using Intelligent Technology to Improve Security

    See More
  • Video Surveillance and Cybersecurity

    3 Steps to Improve Physical Security Systems' Cybersecurity

    See More
  • Intercom Works with Electronic Access Control, Analog Systems

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • SSCP.jpg

    SSCP Systems Security Certified Practitioner Practice Exams

See More Products

Events

View AllSubmit An Event
  • October 22, 2012

    Industrial Control Systems Cyber-Security Conference

    ICS Cyber-Security is the conference where industrial control systems users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions.
View AllSubmit An Event
×
Installation of intelligent intercoms should be whenever or wherever life, money or assets are at stake, where the communication cannot fail and must tie in with other high-end security devices, including security video, access control, fire alarms and other building management system for an interactive security system.
The beauty of an intelligent intercom system is that it can easily be expanded and interconnected, with both audio and video intercoms. 
Intercom systems that work with regular phones can enable special ring tones and forward calls from a call box to multiple phone numbers. 

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!