Integrating Innovation

All too often, modern organizations are faced with an overwhelming variety of options to meet their safety, security, and operational needs. This is caused by an abundance of choice, and often amplified in complexity by the need to determine the best point from which to begin developing their own unique solution. For end-users, system integrators acting as trusted advisors and consultants help alleviate these challenges, though with the number of options within the market today, security providers may also face difficulty determining the best solution to offer their customers.
This article is designed as a starting point for both system integrator and end-user exploration and as a supplement to deeper research. It focuses on single vendor offerings holistically, including architectural considerations and a high-level overview of on-premises, cloud, and hybrid architectures. It addresses expansion into technologies like door solutions, network audio, wearable surveillance, and specialty devices, and reviews how single vendor solutions benefit both system integrators and end-users. It also includes use-case information on non-traditional augmentation of Video Management Systems (VMS). This article's aim is to create a foundation from which to begin the decision-making process on which systems and technologies to consider adopting.
Single Vendor Solution Benefits
Single vendor, or end-to-end (E2E) solutions, are suites of software and hardware offered under the brand umbrella of a single manufacturer. There are a wide variety of benefits associated with all single vendor solutions that ultimately provide increased efficiency for system integrators and cost savings for end-users; these include, interoperability of devices, a consistent programming and user interface, and a single point of contact for sales, engineering, education, and technical services support.
Consider the following scenario:
There is an issue with a customer’s system which has hardware from manufacturer A and software from manufacturer B, and both manufacturers technical service agents are pointing toward the other as the origin of the problem.
This situation benefits no one as the time spent rectifying this problem is eating into either the project’s bottom line or the customer’s wallet.
With a single vendor solution, these situations are generally avoided as all devices and their respective OS have been vetted to work with their own software. This means that deployment time is greatly reduced, system integrator knowledge applies to that manufacturer’s entire suite and across all products, and if technical issues present themselves, that manufacturer's technical support is familiar with the entire offering from end-to-end and can provide a holistic and faster resolution to an issue. It is valuable for both system integrators and end-users alike to understand and determine the level of technical services support provided by their chosen single vendor manufacturer.
Manufacturers may also offer courses and certifications in their respective products. A single vendor offering will be an easier lift for both system integrators when it comes to training technicians, as well as end-users when it comes to training operators. When choosing a solution, consider any courses that are offered in an official capacity or the ability of manufacturer’s representatives to provide customized and tailored training programs. When paired with a unified interface across all offered technologies, this lowers the educational burden holistically and ultimately improves deployment efficiency and lowers total cost of ownership.
These systems also provide simplicity in procurement. Manufacturer-specific design tools and a single point of contact for sales and engineering offer the ability to easily create a system design and determine a bill-of-materials. This allows for a single project registration for system integrators and an easier to understand and holistic bill of material for the end-user. Ultimately, these benefits help save time, increase the system integrator’s efficiency, and improve the end-users overall experience as a customer.
Open versus closed considerations
Another consideration to grapple with early on is the architectural nature of a system. Single vendor systems may be closed (proprietary) or open architecture, working only with that manufacturer's hardware or offering integration with other systems and hardware, respectively. In addition to technological openness, they may also have tightly controlled closed dealer networks or offer dealerships to any system integrator who can demonstrate basic competency. Each option provides specific benefits and challenges.
For technologically closed or proprietary systems, the integrations between devices are normally extremely tight and robust. However, keep in mind that by limiting the options to a single vendor alone, issues like supply chain, recalls, or new problems that cannot be solved by that specific vendor’s hardware can cause significant disruption. Open architecture systems provide system integrators and end-users the benefits of a single vendor solution while simultaneously offering down-the-road flexibility if required. Given that hardware and/or software is non-proprietary, if a customer matures out of what is offered by the single vendor option, many of the components of the system may be reused within a more advanced software, or the existing single vendor software may integrate with other non-uniform systems.
Both proprietary and open-architecture single vendor solutions may have an open or closed dealer network. Closed dealer networks provide well educated and well-versed system integrators who may have improved deployment and troubleshooting capabilities, as many times manufacturer specific training and certifications are required to become dealers. This provides an additional layer of benefits for system integrators because a closed network creates a buffer between dealers and prevents saturation of a market with uneducated resellers. Open dealer networks provide customer choice with the ability to request a new system integrator; however, many times open network dealers do not focus all their efforts on that single solution and may have limited time working on the offering or manufacturer’s certifications. End-customers should be acutely aware of the benefits and detriments associated with a technologically proprietary system and/or a closed dealer network.
System architecture
While assessing the viability of any single vendor offering, it’s important to simultaneously determine if the products and solutions offered are suitable for solving the identified problems. This is especially important for systems that will undergo growth as an organization expands and matures. This can be broken into two separate categories: how the system is accessed and/or the architecture on which it resides, and what hardware categories are supported. These two categories will be examined in this article and later in Part Two, respectively. It’s important for both system integrators and end-users to consider system flexibility, development, and market tenure when assessing these features, functions, and capabilities.
Architecturally, systems will come in three flavors: on-premises, cloud-based, and hybrid. For on-premises systems, software resides on physical servers that normally also store retained video. Cloud-based solutions have software residing off-site, normally hosted by the manufacturer, and may have recordings housed either on a customer site (on the surveillance cameras or other devices themselves) or off-site within the cloud. Finally, hybrid systems are a combination of both solutions deployed for a single customer that are accessible within a unified interface. All modern security systems will have both local and remote accessibility, with many featuring client software, web-access, and mobile apps. This architecture does not refer to how the system is accessed, but how information is routed and where video and data are stored. There are both benefits and challenges associated with on-premises and cloud solutions, though those won’t be covered here. The main point to consider is whether a solution being assessed has the required capabilities and options to combine on-premises and cloud-based options for maximized flexibility.
In addition to whether the system provides on-premises or cloud functionality, or a combination of both, it’s also important to understand the hardware offered across the board for single vendor solutions.
Door solutions
A traditional and widely adopted augmentation is the integration of electronic access control and/or intercom solutions within a video surveillance system, and there are a variety of benefits associated with tying these technologies together. Electronic access control provides traceability, convenience, and management capabilities that are not offered by traditional keyed systems, and video surveillance provides a layer of security when visual verification of who is accessing a facility is required. As an example, this type of system augmentation allows for camera call-up capabilities, which is when operators are presented with a video of someone simultaneously accessing a door with a credential. If individuals with access rights have their photo in the system, an operator may also opt to visually confirm that the person in the video matches the identity of the one in the picture. This prevents prolonged breaches should someone share their physical credential or PIN.
When paired with video analytics, incidents involving social engineering (such as when someone who is authorized to enter holds the door for someone else who is not authorized to enter) or tailgating may be captured, recorded on video, and initiate an alarm for either operators or system administrators. Generally, these systems are integrated when offered by a single vendor, though the degree to which they are truly unified may differ between offerings. Consider systems that have been developed in-house as opposed to acquired, or options that run within the same database structure to ensure maximum interoperability.
For certain entry points within a facility, it is beneficial to consider utilizing an intercom solution. Intercoms blend access control functionality with video surveillance by providing a way for parties to communicate between the secured and unsecured side of a facility’s perimeter. Many intercom units feature integrated video surveillance cameras that can be pulled into a system like a conventional camera; this means that video intercoms serve dual duty by providing live viewing during communications while simultaneously recording the interactions. In addition to cameras, intercom devices may also feature credential readers or PIN pads for use within an access control system. These all-in-one style intercoms save on installation costs and may sometimes only require a single data cable run with no other wiring necessary. When incorporated with a VMS, two-way communication at doors and the ability to provide remote entry may be facilitated from a computer or mobile app. These devices may also be incorporated into VoIP systems as an added layer of redundancy or to provide end-users architectural flexibility.
When determining which single vendor security solution to deploy, it is vital to understand the need for access control and intercom solutions, as well as the hardware options offered by that manufacturer.
Network audio
As one of the fastest growing network-based technologies, IP audio provides users flexibility, scalability, and ease of maintenance. Unlike conventional analog audio systems, network speakers generally do not require rack mounted audio hardware such as amplifiers, equalizers, or audio source input devices. These systems consist of intelligent network speakers or analog-to-IP conversion devices that are home run to a switch with network cable. This replicates how video surveillance systems are installed and provides a layer of familiarity for system integrators who are not experienced with traditional audio installations.
Like intercoms, IP audio systems may serve two purposes: First, these devices may be integrated with a video surveillance or access control solution to provide active alarming and notification in the event of a system trigger. Video surveillance systems alone are a passive deterrent, and when paired with an IP audio solution, become capable of active deterrence either using pre-recorded messages to be played during system alarm events or via direct live operator talk down. Likewise, end-users may consider utilizing IP audio for operational purposes like automated announcements, bell schedules, targeted advertisements, or to play background music. The dual nature of IP audio provides wider market coverage for system integrators implementing such systems and a significant return on investment for end-users.
When considering a single vendor solution, review the need for security or operational audio solutions. At that point, if necessary, determine the type of speaker required. Some manufacturers offer a wider range of speaker options than others, and this includes conversion devices in the event there are existing analog speakers present and a phased approach is required for replacement.
Wearable surveillance
The market has only recently adopted the use of wearable surveillance as it relates to integration into a VMS. Wearables, also known as body cameras, are not a new concept, and different verticals are beginning to utilize them under certain circumstances and situations. The first use-case that may come to mind is law enforcement, and while wearables, in-car video, and general surveillance cameras may be tied into a single vendor software offering, this is not the most unique use case. Today, many healthcare facilities and providers opt for the use of wearables; similarly, maintenance personnel or individuals operating in areas that require surveillance that are difficult to mount traditional cameras may also be seen leveraging this technology. Not only do these devices provide point-of-view video on what is occurring, but built-in technology like Wi-Fi and cellular capabilities, accelerometers, and even GPS permit use cases like live monitoring from a central station of both audio and video, video recording triggers in the event of a slip-and-fall for safety purposes, and general location data of incidents, respectively.
Wearables are not for every user of a surveillance system; however, when combined within the same solution, provide an additional perspective when utilized in conjunction and time-synced with other conventional surveillance devices. When exploring wearables, consider two major points: First, determine the architecture for storing the video; is it located in the cloud and based on a subscription or is it stored on an NVR with other surveillance video and data? Finally, understand all of the different types of wearables offered, ranging from very aggressive looking to milder, their accessories, and the warranty offered by each respective manufacturer.
Specialty & modular
Specialty devices and modular cameras are often used under very specific and unique circumstances and include devices such as small form-factor cameras with the ability to utilize multiple sensors simultaneously, thermal devices for both object and temperature detection, explosion protected devices, and radar. It’s important to review the entire breadth of a manufacturer’s portfolio in the event one of these technologies is required. There are many use cases that incorporate multiple technologies, though one of the most compelling instances is with radar.
For large areas where object classification, speed, and/or trajectory are required, and where there may be zero to very low light, radar is a fantastic option. Many times, schools will utilize radar devices for protecting turf sports fields from after-hours vandalism or general unauthorized use. Radars can detect people within specific zones, and when triggered, can initiate a pre-recorded message from an IP speaker to warn the individuals who may not realize they are somewhere that they are not authorized to be. The major drawback with radar, even though its field of view can be pulled into a surveillance system, is that there is no way to verify alarms. In these instances, it’s necessary to pair the radar with a surveillance camera, optimally, a pan-tilt-zoom (PTZ) capable one with integrated IR illumination. In the instance of a radar violation the camera can auto track on the alarming objects which provides video verification to an operator receiving the alarm and records identifying information about the individual in the scene. This combination may be deployed with a single vendor given that the manufacturer offers this entire suite of security hardware and software capabilities.
Like the other technological use cases, it’s vitally important to understand the problem to be solved and explore all the different ways to achieve a solution in the most effective and long-term budget friendly way possible. Communication with multiple manufacturers and solution providers is key to understanding all the single vendor options available today.
Final thoughts
The option for highly integrated, flexible, single vendor solutions presents an opportunity for organizations facing the complexities of selecting and managing a security solution. Choosing an end-to-end solution not only streamlines procurement and deployment, but also enhances the overall efficiency and reliability of the solution. The choice between open and closed architectures, coupled with the flexibility to incorporate both traditional and non-traditional system augmentations, such as door control, IP audio, wearables, or specialty devices ensures that both system integrators and end-users can tailor solutions to meet their needs.
The education and support offered by single vendors consolidate the learning curve, allowing both system integrators and end-users to maximize the value of their investments with fewer disruptions and a clearer path to resolution when issues arise. The benefits of reduced complexity, enhanced interoperability, and a unified point of contact for service and support form a compelling case for organizations to consider single vendor solutions as an approach to meeting their safety and security needs.
Ultimately, the decision to adopt a single vendor solution should be guided by an understanding of the organization's current and future needs, the technological flexibility offered, and the level of support provided by the vendor. By making an informed choice, organizations can ensure that their investment not only solves their immediate security and operational challenges, but also positions them for success as they grow and as their needs evolve. This strategic approach allows system integrators and end-users alike to navigate the available options with confidence, leading to improved security, optimal efficiency, and a lower overall total cost of ownership.
Please sign in
If you are a registered user on AVIXA Xchange, please sign in