Donated fire system plays critical role in fire tech training

Silent Knight and Delaware life safety company team up to ensure technical college has latest real-world fire equipment
by: Tess Nacelewicz, Security Systems News – Monday, August 25, 2014

DOVER, Del.—The recent donation of a Farenhyt fire alarm and ECS system and the free installation that local company Advantech provided to Delaware Technical Community College’s Fire Protection Engineering Technology program benefits not only the college but also the industry, according to Advantech.

Eric Schaeffer, president of Advantech, a life safety and integration firm based here, said it’s imperative that future fire protection employees get the experience that working with the latest in real-world equipment will provide.

“When we look at trying to hire people out of a school with no or little field experience, having that knowledge is important, so it certainly helps us and our industry,” Schaeffer told Security Systems News. “It’s the largest college in the state and they put out a lot of people in the work force every year.”

Silent Knight by Honeywell donated a Farenhyt alarm and emergency communications system to the community college’s professional fire education training lab, the company said in August. The Farenhyt IFP-1000ECS fire alarm and emergency communication system was installed free-of-charge by Advantech.

The donations will allow students receive hands-on training in fire system design, maintenance and programming, a news release said. Also, the new system ties into various suppression systems so the college can train students on suppression technologies as well.

Schaeffer told SSN that cross training is essential. “In the fire alarm industry,” he said, “there’s always been that lack of understanding from the sprinkler guys to the alarm guys, ‘Exactly what do you do and how does what I do [fit in]?’ … [Having] that level of understanding helps troubleshooting skills tremendously.”

Schaeffer said Advantech, a 15-year-old company with 42 employees, donated labor, professional services and additional equipment to the college. That’s partly because the college, which has four campuses throughout the state, is one of Advantech’s largest customers. Also, Advantech hires many of its technicians from the college and Schaeffer considers Delaware Tech’s training lab an “awesome facility.” He said, “I’ve not seen anything like it anywhere.”

Delaware Tech’s program stands out as one of the few engineering technology programs in the country that specifically focuses on fire protection, according to the news release.

Schaeffer said that the installation was initially scheduled to take two days, but it took about two weeks on site and another two months to answer all the college’s questions and finalize the installation. “But the finished project is awesome,” he said.

The additional time was needed because the company’s technicians came up with solutions that made the project even better, he said. “We have some pretty talented technical people and we assigned a few of them to it, and from the original scope to what the finished product was, it changed a fair amount and provided additional functionality,” Schaeffer said.

For example, he said, lead technician John Gampp came up with the idea of making “a custom panel to control the different [nine sprinkler] risers [in the lab]. … We also put lights above each riser so when the active riser was on, the light would light up above the active riser so students in the classroom could quickly understand [which riser the lesson was on that day].”

Advantech this year became a member of Security-Net, a provider of security integration services.

Read the original article at Security Systems News.

Integrator Roundtable: The benefits and challenges of selling hosted, managed security services

Industry execs offer their opinions on how the technology has evolved and the increasing tech savviness of end users
By Joel Griffin – August 6, 2014

Hosted and managed security services, be it access control or video surveillance, have been around for a number of years. Although there are differences between managed offerings (systems operated and maintained by a third-party provider) and hosted services (leased infrastructure controlled by the customer), they both offer tremendous advantages to end users and security integrators.

One of the primary benefits of either a managed or hosted access control or video platform is that it enables end users to reduce the footprint of their security infrastructure, such as the numerous servers and recorders that are typically required to run a large-scale security system. It also simplifies the service and maintenance process for users, shifting the burden of things like software updates to the service provider.

For integrators, hosted and managed services provides them with an opportunity to establish a recurring revenue model. Of course, there are still a number of challenges involved in providing these services, not the least of which can include reassuring skeptical customers of the security of managed and hosted platforms given the ever-increasing number of high-profile data breaches. SIW recently caught up with executives from several systems integration firms across the country to get their take on the current landscape of hosted and managed security offerings.

SIW-STE: How has technology evolved in the hosted and managed security services space and how have end users come to embrace it?

Chris Wetzel, executive vice president and founder, Intertech Security: End users are getting much more comfortable with a hosted platform, whether it is access or video. It allows end users to take a system and have a lot of the same functionality that you would have with an enterprise solution. They can also move into that platform starting from scratch with their first card reader having the functionality. As the system grows, they have the flexibility to manage that platform in-house. With this approach end users haven’t lost any of their investment and they still have all of the functionality they want. If they are trying to figure out how to migrate from an existing system away from it, the hosted platform might give them a way to migrate using this different technology on an enterprise platform. Over time they can then assess the approach they want to take to replace their existing system by having some exposure on a small scale without a lot of cost on a hosted or managed application.

Brad Wilson, president and COO, RFI Communications & Security Systems: I think the end users are pretty savvy today. End users are used to trusting the cloud and depending on those types of support services. They are also very aware, especially as younger professionals move into our industry, that there are a lot of disparate systems out there. All of sudden they’ve got this security network or systems to deal with and they’re really looking for convenience and simplification and we, as an industry, tend to make things very hard and complicated.

John Nowak, senior vice president, VTI Security: I would agree that these types of services are a more readily acceptable business model today than they were a few years ago, but they’re still kind of a challenge on the sales front, discussing the business value and showing the customers exactly how these services raise profits and lower costs. Coming from the advanced integration side of the business, we see some of these services fall down at a certain level, so there are some things that you just can’t accomplish in a cloud environment today that I’m sure will be addressed as products and solutions evolve in the future – making these things easier and more readily attainable off of a network device.

SIW-STE: Are there still those who are a little leery about using hosted or managed services and what are some of their chief concerns?

Wetzel: The network connectivity, so opening up ports and giving us access onto a network can be a concern. Customers are concerned about how well we can secure the network with the right firewall to make sure that only certain ports are open. This sometimes can be a challenge and can take a little while to get comfortable with the approach. At times, we’ll put a separate DSL line in to communicate, so we’re not on their network but still give them what they are looking for with a hosted system. The other concern is where is the information going? Where is it stored? Is it on the cloud somewhere? That’s not an issue because it is in a secured environment in our central station with everything locked down.

Wilson: Identity and authentication because everyone hears about security penetrations and hacks. Some of these are operational risks and some are organizational risks and that’s how I’ve always classified them. Operationally, this could be bad and someone could take this or take that – trade secrets, etc.. On the organizational side, you get into a penetration where someone has hacked through R&D or credit cards and you start that whole financial element and no one is immune from that. That drops the value of a company significantly or could and it kind of burns into peoples’ brains.

SIW-STE: Do you believe that the industry still needs to do a better job of educating the market or do end users pretty much understand these offerings now?

Wetzel: My guess is there are a lot of companies in the security industry that aren’t offering these services and there are a lot of customers, end users that aren’t educated on it primarily because their security system providers do not offer the solution. We feel it is an advantage to our clients and our customers because we give them an option. We are taking the time to educate them on a breadth of access control and surveillance solutions available in the market. There are still a large percentage of integrators and end users that are not educated on the use of this technology and service.

Nowak: I think there is always a place for education, especially in this area. If I’m hosting video or I’m able to pull video from the cloud at two-frames-per-second in VGA quality, that’s not exactly usable video from a security perspective in a lot of cases, so you typically have to augment that with onsite servers if you want forensic information you can pull from an incident. There’s a lot of education that needs to go on and it’s about expectations. If my expectations are that I’m going to be getting a certain level of quality of video and, through my cloud services, I’m somehow falling short of that then that’s an expectation and it goes back to that frontend conversation and education to not only to the end client community, but also those managed service providers.

SIW-STE: Are the traditional benefits of these services still the biggest selling point to customers or are there additional advantages that have caught on in recent years?

Wetzel: From an access control standpoint, those benefits are still in place. Some of the new benefits are they don’t need the hardware. If I have somebody trained who is the one person responsible for the system and that person is not available – either on vacation or it’s an off hour – then we’ve got the ability to make that change, add a card or delete a card in-house and ensure it’s done in a timely manner. That’s a huge advantage. We have the ability to manage badging remotely and provide credentials with a photo, the company logo and name without the customer having to make the investment in the software and printer.

From a video side, with better quality imaging thanks to megapixel technology and video analytics, we’re offering services that we couldn’t offer before because the camera is much more intelligent and is providing us much more reliable information that we can respond to.

Wilson: If you’re in that space and you’re working in that space, there are many more value propositions and takeaways and part of that is, as you get into more of a XML and somewhat open APIs, I can really start to talk to other types of systems and that’s a great takeaway. All these things are possible and they all come at a cost and value and there’s a cost-value price proposition that goes on there.

SIW-STE: What kind of impact have hosted and managed services had on your business as a security integrator?

Wetzel: It’s been a positive impact because it has allowed us to continue to grow our recurring revenue and our service model. As with any integrator, the more you can grow that side of your business and become less dependent on the project revenue, the more stable your organization becomes.

Wilson: It’s allowed us to go into different markets that we typically don’t go into in terms of that medium commercial market. Saying all of that, it starts to drive more recurring revenue which is the glaring, no-brainer answer.

Read the original article on Security Info Watch.