Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

Building an Integrated Security System for the SMB

They’re Not Just Components; They’re a Security System

By John Nemerofsky
October 22, 2015

The security system in a typical small to medium business (SMB) will likely include surveillance cameras, a recorder, access control software with cards and card readers, and intrusion sensors with an alarm panel. Then depending upon needs, a business might add video and/or audio intercoms, a visitor management system, mass notification, vehicle tracking, biometric devices, fire alarms, and sound and communication.

That’s a lot of components. Unfortunately, that’s often how systems are viewed – as disparate pieces of equipment, each serving its own specific purpose. In reality, they should be viewed, and function, as one integrated system. And with increasing frequency, security is even being integrated with building automation systems such as HVAC, lighting and water.

Here’s an example of how this integration can all come together. If the fire alarm system detects a fire, the building automation system signals the HVAC system to stop delivering fresh air to the area and pressurizes the path of egress, clearing it of smoke. The access control system unlocks doors along the route, activates lights to show the exit path and train surveillance cameras on the fire to provide first responders a live feed. The emergency notification system provides constant updates, via text messages or voice over speakers, to keep employees, customers and/or visitors informed.

Integrated Solutions

By seeing individual tools, not integrated solutions, many facility managers or business owners are missing out on the opportunity to provide even more control, convenience, cost savings and efficiency to the organization. And in the case above, integration may even save lives.

Common for many years in the IT industry, open standards are the driving force behind this integration. The security industry had been slow to adopt open architecture, but most leading equipment manufacturers now support one or both of two standards-setting organizations – ONVIF and PSIA. Open architecture lets SMBs choose among vendors, selecting security equipment based on performance, features and price. And now they can choose partial systems upgrades without fear of making investments in existing – or legacy –  systems obsolete.

Security now relies heavily on computer networks and software. The benefits are huge. Wireless cameras can be placed virtually anywhere on the network without the added expense of cabling. The same is true of access card readers. Video can be stored in a cloud environment, making it available from any Web browser. Apps for smartphones and tablets allow remote control of systems.

Increasingly powerful computer networks can better handle the demands of transmitting large video streams. Improved compression technology has also helped to manage bandwidth concerns. Also, encoders can now take analog data and digitize it as part of an IP (Internet Protocol) solution allowing SMBs to migrate to (Internet Protocol) IP-based technology at their own pace.

Operating over single business networks also makes it easier to to add peripheral systems such as parking and gate control and visitor management systems.

Single-Point Control

Another advance from the computerization of security is a solution known as physical security information management software. PSIM collects and combines information from the various components into one integrated, intelligent system. SMBs can identify security policies and procedures and prescribe different responses to events around a perimeter, in the main lobby, a warehouse or cash transaction areas.

PSIM software offers full security management capabilities, unlike video management or access control systems that offer only limited levels of integration while typically requiring the inclusion of the manufacturer’s products that may not integrate with competitive systems due to proprietary protocols. 

SMBs face tremendous pressure to protect the people and assets they oversee. And most often they are supposed to do so with tight security budgets. That’s all the more reason to wring as much out of each component through a complete and integrated solution.

The days of separate, standalone security systems are numbered. Integration has delivered system solutions that offer more efficient protection.

Find the Right Partner

There are many benefits, but before rushing into an integration project be sure to retain the services of a proven, experienced systems integrator capable of comfortably working with both the security and the related IT requirements.  Also look to the integrator to provide any necessary training and system maintenance to keep the system at peak operation for years to come.

KEYWORDS: security convergence security system integration security technology Small to Medium Business (SMB) security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John nemerofsky 500

John Nemerofsky is chief operating officer for Kent, Ohio-based Sage Integration. His experience includes serving as president of SST, where John grew the company to $140 million in yearly sales with offices throughout the US and Canada. In 2009, John became the Senior Vice President of Stanley Security Systems. During his tenure at Stanley, John oversaw wide-scope projects that included several turnaround initiatives, operational changes, sales and market expansions, and customer acquisitions. He managed an $800M P&L and a team of 13 managers with a dotted line to more than 500 team members. In 2017, John took his management experience to an entrepreneurial endeavor as President of CGL Technologies. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Thinking Out of the Box for Stronger Security

    See More
  • Regulatory Changes Top C-Suites’ List of Enterprise Risks for 2017

    Selling Security to the C-suite

    See More
  • Access card reader, ominous

    OSDP: The future of access control

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing