Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Vendor System Integrations Accelerate in the Security Industry

By Josh Sookman
April 23, 2013

 

With the shift from analog to digital and few managed systems to many, security operations teams are facing new challenges when it comes to managing vast amounts of real-time and archived information, and making sense of it all when important decisions need to be made quickly. Meet big data.

Historically, top systems integrators (SIs) dominated large-scale integration projects that combined multiple safety and security products. These SIs became masters of electronic data interchange between complex systems and could rollout very large integrated systems in just a few years and with a very sizeable check, of course.

Times are changing. Having spent three days on the show floor at the 2013 ISC West Conference, it was clear that integrations and convergence of safety and security technologies were a key theme, and I predict that we’ll see that trend grow sharply over the next three to five years.

For security operations management, there is a big shift to using integrated commercial-off-the-shelf (COTS) systems that are lower-cost, faster-to-implement and typically offer more flexibility in terms of vendor support and swapping. Two such examples are (1) physical security information management (PSIM) systems, truly offered by only a handful of companies today, which act as hubs to integrate a variety of systems from access control to video cameras to personal alarms triggered by mobile apps; and (2) groups/clusters of vendors who have pre-existing integrations that can be enabled for new end-users in just hours (not months or years) and provide the ability for both systems to access/interact with the other system’s data – often by use of an Application Programming Interface (API) provided by both vendors – without the need for additional custom work to be performed.

This all makes sense. When assessing a threat and managing an incident, events occur in real-time and data from a number of systems can all be important. If there is an active shooter on a campus for example, it would be helpful to pull up the closest camera, send/receive text and images from people nearby, control access and lockdown procedures and manage dispatched officers all from one central console. When this data can be visualized, consumed and acted-upon jointly, there is less chance of making a mistake when seconds count – lives might even be saved.

PSIM systems today are emerging as the gold standard for providing security dispatchers with the highest level of situational awareness. Frost & Sullivan, a market research firm, expects the market for PSIM systems to grow at a rate of 35 percent between now and 2021, at which time those vendors should be enjoying a $2.8 billion market for those services, according to the firm’s June 2012 report Global Physical Security Information Management Market: A Global Trend Changing the Way Security is Considered.

The lower-cost price points of non-PSIM COTS systems are also enabling smaller and medium-sized security operations teams to enjoy the benefits of an integrated system within their budget constraints. Increasingly, these end user buyers will look to vendors whose systems play nice with others they already use so as to further leverage existing investment and ensure interoperability of key data between those systems. Keep your eyes peeled for many more integration announcements to come throughout the balance of 2013, with a massive surge around the 2013 ASIS Annual Conference that runs September 24-27 this year in Chicago. 

KEYWORDS: big data Commercial off the shelf systems ISC West security system integration

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Josh Sookman is the Founder and VP of Business Development for Guardly, the leading provider of indoor positioning and mobile app-based crisis communications solutions to large enterprises. Josh is an active member of ASIS and SIA, and a contributing writer to several security industry publications. His volunteer work in youth entrepreneurship has included initiatives with Stanford, MIT, Intel, Verizon and several local technology incubators in Toronto, Canada, where he resides. Contact Josh and learn more at: https://www.guardly.com

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Emergence of Smartphones as a Key Platform for Security Industry

    See More
  • Smartphones Gain Ground, Mobile Cybersecurity Gains Importance

    See More
  • Whitepaper: Assessing Emergency Response Times on Campus

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing