Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementIdentity ManagementPhysical SecurityVideo Surveillance

12 questions to ask before selecting an IP intercom solution

By Dan Rothrock
intercom
November 10, 2020

Keeping your employees and visitors safe and protected is a key priority in enterprise risk management, both from external influences as well as onsite.

IP intercom solutions have emerged as a “must have” security solution for new and established facilities to protect people, assets, and property. A key component of an IP intercom solution, however, is its ability to provide intelligible communications to allow your security team to see beyond video and to protect employees and visitors from seen and unseen threats.

What are 12 questions that you should ask before selecting an IP intercom solution?

  1. Does the IP intercom solution allow you to hear clearly? While video surveillance may show a scene and access control can either keep someone out or invite them into a facility, an intelligent communications solution can detect voices, high noise levels, breaking glass, or other sounds that are not within direct view of a camera. In some environments, background noise must be mitigated through active noise reduction software, so that someone speaking in that area can be clearly heard and understood. A clear voice and sound clarify the intent behind the images that are captured on camera and increases situational awareness.

 

  1. Does it allow you to interact clearly and quickly? Clear voice intelligibility – the ability to understand what is being said – is critical to the success of any intercom system. To obtain that clarity, an IP intercom solution should employ a microphone that can withstand interference and can cover a wide range of frequencies for consistent performance. The amplifier should be energy efficient and provide enough power to overcome loud environments, while the speaker volume itself should automatically adjust to an audible level to overcome ambient noise levels.  

 

  1. Does the IP intercom deliver high-definition video? As important as intelligibility is with an intercom solution is a video quality that can capture all movements. Look for a wide-angle lens and strong low-light performance to deliver excellent image quality, day or night. A wide Field of View will capture more of the area around the intercom station, and a 30-per-second frame rate provides a natural look for any movement caught on the camera. 

 

  1. Does it integrate with my other existing security and communications technology?  As today’s security technology becomes increasingly intelligent, interoperability between platforms becomes more important than ever. Any IP intercom you choose should utilize industry standards such as SIP, ONVIF, and standard APIs, to integrate seamlessly into your other systems, including Access Control, Video, and VoIP-based phone systems. Look for feature-rich integrations from manufacturers who have well-established business partnerships and are committed to maintaining and improving their integrations over time. Interoperability is the key to deploying a security solution that can consolidate information from a variety of sensors, process that data to identify and react to common security challenges and take advantage of future innovation.

 

  1. How does an integrated IP intercom solution benefit my security officer? Today’s interactive enterprise security systems need crystal clear voice, access control, and video surveillance working together to mitigate security risks. Working with an integrated IP intercom platform, the officer can manage all communications through their access control workstation interface – answering and placing calls, managing a call queue, viewing associated video, and locating callers on a map. Specific events, whether common or critical, can automatically trigger pre-recorded messages, such as social distancing instructions or emergency lock-down announcements. The result is better situational awareness, enabling a more informed, faster response by an officer who can easily see, hear, speak to, and manage any situation or threat that emerges.

 

  1. Does it allow for post-event analysis? Data can make a difference in your risk mitigation strategy. Voice adds interactivity between the security officer and the person in front of the camera, and that data, which goes beyond video surveillance images, can be shared between security, police, emergency services and more. Your team is now providing first responders with actionable data for a more effective response to the incident and a strategy to mitigate future incidents.

 

  1. Does it have a robust design? Look for an IP intercom station that is well protected from potential damage and destruction, with a solid aluminum, die-cast frame to defend it from tampering. A UV-resistant speaker design will provide an open flow of audio, as well.

 

  1. Is it touchless? We increasingly live in a touchless world, as contactless access has been amplified by the COVID-19 pandemic. Therefore, your intercom solution should include a touchless sensor, as an accessory, for users to activate intercom calls by gesture recognition, for example, with the swipe of a hand.  

 

  1. How does it perform in remote locations? A solution that provides realistic voice with a speaker volume that automatically adjusts itself will allow your security teams to talk and listen to the individual that’s seen on the camera, no matter where the location or how remote. Humans instinctively respond to real-time voice and audio, no matter where they are.

 

  1. Is it cybersecure? Any intercom solution should meet IT requirements for mission-critical systems and provide defense from cyber threats and attacks. Look for an intercom vendor that has implemented IEEE 802.1X network access control, and who stays on top of the latest vulnerabilities with regular software upgrades to ensure their systems provide secure, reliable communication.

 

  1. How does an integrated IP intercom solution benefit my organization? In addition to enabling more efficient response by security personnel, an integrated security solution enhances business optimization by streamlining daily operational needs. By automating common security tasks, the workload on security staff can be reduced, and critical alarms more easily identified in a busy workflow. Intercom device status is monitored so that outages are immediately identified, preventing any liability from devices that don’t work when a critical call is placed. Communication events are logged and archived alongside all other security alarms, so that reports can be run to investigate an incident or analyze usage, making it easy to calculate the system’s ROI. Further protect your investment by choosing a manufacturer known for high-quality construction that is built to last and strong technology partnerships that ensure integrations are reliable over time.

 

  1. Overall, does the solution allow me to hear and be understood, anywhere and anytime? It’s worth repeating – it is critical that any IP intercom solution provides intelligibility, in any environment, no matter how noisy or unpredictable. In coming years, voice will be used in a variety of ways, from confirming our identity to controlling our technology through voice commands and can only be effective if the audio is crystal clear, in every situation. By investing in the best possible audio quality, you’ll be equipped with a powerful tool that can adapt to future innovations and provide value for many years to come.

 

The IP intercom system that you select should provide intelligible communication, which will ultimately help you to reduce vulnerabilities, improve response time, and provide a virtual presence for all locations.

 

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: intercom public safety risk management visitor management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dan rothrock photo

Dan Rothrock is the President of Zenitel Americas, where he leverages more than 40 years in audio and 30 years with Zenitel, to drive innovation in the applications of intelligible and interoperable IP audio. Dan’s diverse background in leading the industry in the use of audio applications and integration comes from a unique perspective of understanding each piece of the value chain.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • ransomware

    Important Questions to Answer Before Paying a Ransomware Demand

    See More
  • cloud-sec-freepik1170x658v98.jpg

    Key questions to ask when building a cloud security strategy

    See More
  • cybersecurity-resilience-fp1170v1.jpg

    5 questions CISOs should ask when evaluating cyber resiliency

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!