Security-Net Welcomes Three New Member Companies, Combined Sixty Years of Industry Experience

Exton, Pa. – August 12, 2015– Security-Net,a global provider of security integration services, announced today that three member companies from across North America have joined the organization, bringing its membership to more than twenty.

The new members include CONTAVA, A3 Communications, Inc. and A.C. Technical Systems, with headquarters in Edmonton, Alberta, Columbia, S.C., and Toronto, respectively. Together, they provide Security-Net with a diverse geographical footprint, expertise in providing security to the government sector, oil, gas and healthcare markets. Each company also boasts a strong background in IT.

“Each of these new members has experience in multiple industries,” said Jim Coleman, President, Board of Directors of Security-Net. “CONTAVA’s IT background, A3 Communications’ roots in networkingand A.C. Technical Systems’ experience in the electrical market will no doubt help Security-Net meet the demands of tomorrow’s market.”

Dominic Burns is the founder and president of A.C. Technical Systems, the third company to recently join Security-Net. Based in the Toronto, Ontario-area, the company maintains three offices in Ontario, and two in Quebec, employing 74. A.C. Technical Systems specializes in providing access control, IP video and IP intercom systems to several industries, including mining, education, government, utility, commercial property management, retail, and sports arenas, and was founded in 1990.

CONTAVA, anEdmonton, Alberta-based company specializes in bridging the gap between security and information technology. The company maintains four locations and a staff of more than 60 integrators to serve customers across Canada. CONTAVA’s background in engineering, construction and IT allows it to provide a high level of technological skill to its customers that includeprovincial government, transportation, oil and gas, and others in the commercial market. The president of CONTAVA is Curtis Nikel and the company was founded in 2005.

Headquartered in Columbia, S.C., A3 Communications maintains five branch locations, with offices in South Carolina, North Carolina and Georgia,and employs 80– specializing in systems integration. The company, which was founded in 1990, has customers within the education, government, enterprise, financial and manufacturing industries. A3 Communications was named number six on this year’s SD&IFast 50 list. Operations are run by Brian Thomas, president.

With these new additions, Security-Net can now offer comprehensive security services to customers who operate in Canada and the Southeast U.S. markets. Security-Net’s membership is now 21 members strong, making it the largest organization of independent security systems integrators.

A full list of Security-Net member companies can be accessed on www.security-net.com.

Security-Net Interview with Security-Guy Radio (Video)


Fast50 Award Recognizes Four Security-Net Members for Consistent Growth

Las Vegas – April 14, 2015– Security-Net, a global provider of security integration services, announced today that four of its member companies are being recognized by Security Dealer & Integrator in its fourth annual Fast50 rankings, which names the fastest-growing security integrators and dealers in North America.

SD&I will be honoring the Fast50 winners at this year’s ISC West Security Conference and Exposition in Las Vegas on April 15th, recognizing the 50 fastest growing security installation companies in North America.

Placing the highest of Security-Net members on the list is Anaheim-based Firstline Security Systems with a ranking of 26th on the Fast50 list. Firstline Security Systems is known in the market as a leading security integrator in the South West specializing in bringing clients the expertise they need in access control, CCTV, burglar and perimeter protection. Rankings for the Fast50 are based on a formula that evaluates revenue and percentage growth over two consecutive years.

“SD&I Fast50 security integrators excel in understanding their clients’ needs and in providing the highly-specialized services for their clients’ individual markets. They are succeeding in a way that many service providers strive to emulate: they are continuing to grow while simultaneously providing outstanding service to their clients,” said Security Dealer & Integrator Editor-in-Chief Paul Rothman.

Rothman added that the fastest growing vertical market for systems integrators is the corporate market, including the advanced technology market. “But security for educational institutions — both K-12 and colleges — is continuing to grow as well, and is seen as one of the fastest-growing by Fast50 companies, along with industrial, healthcare and government/municipal,” he said.

In addition, Koorsen Security Technology and two other Security-Net members were listed in the SD&I Fast50. Indianapolis-based Koorsen, ranking 41st on the list, is known in the market for specializing in enterprise class products and systems integration projects involving video surveillance and access control. CGL Electronic Security of Norwood, Mass., is 43rd on the list. CGL is recognized for its post-sale service and as a leading independent security systems integrator in the New England region. Intertech is located in Pittsburgh and specializes in protecting corporate, educational, healthcare, government and residential facilities, and ranks 49th on the Fast50 list.

“Security-Net’s presence on the Fast50 list reflects the innovative and client-first approach of our member companies, an approach reinforced and valued by the Security-Net organization,” said Jim Coleman, President, Board of Directors of Security-Net. “I’m delighted to be a part of the Security-Net organization, which includes and supports these industry leaders and innovators.”

A full list of companies listed on the SD&I Fast50 can be found in the April 2015 issue of Security Dealer & Integrator magazine.

SSI Magazine: Security-Net Ensures Access Control for USI Insurance Services

Learn how The Protection Bureau and fellow Security-Net partners are rolling out a seamless access control solution for USI Insurance Services’ 100+ locations.

Sometimes it takes a collective effort, along with a small army of security systems integrators, to ensure that an aggressive plan to unify more than 100 locations and 5,000-plus access control credentials all within a quick timeframe can be executed in a timely fashion. That’s exactly what happened for end user USI Insurance Services when it called upon the Security-Net Inc., an independent network of 18 security systems integrators located throughout the United States, to handle its unified access control needs.

USI Insurance Services specializes in property and casualty insurance, employee benefits and specialty products. Headquartered in Valhalla, N.Y., the company has more than 4,000 experienced professionals who operate out of in excess of 140 nationwide offices. Through the years, USI Insurance has been actively acquiring other insurance businesses, driving home the need for a unified access control platform company wide.

“For a company to be successful, it needs both an organic and acquisition growth strategy,” says USI Vice President and CTO Tim Porreca. “We’ve done north of 200 acquisitions over the past 15 years and we continue to be active in the acquisitions marketspace. However, we also have heavily invested, and continue to invest in tools and resources that help us grow organically. These investments are geared toward creating an environment that facilitates success in the market-place for our people, and enables our clients to achieve — and even exceed — their business goals.”

With continued expansion a part of its culture, USI has to manage its buildings and employees as efficiently as possible — something that becomes increasingly difficult, as with that rapid growth comes more employees, more cards and badges, and more disparate security systems of which to keep track. This is the still unfolding tale of how exceptional results can be achieved in the name of security by combining a well-defined vision, impeccable coordination, flawless execution and immediate follow-up.

Rekindling Decade-Old Relationship

As mentioned, the insurance and consulting firm needed an integrator that could handle its aggressive plan of eventually unifying more than 100 locations and 5,000+ cards, including employees, contractors and maintenance, within a quick time-frame and without missing a beat. It was important the integrator had a national focus so that multiple locations and continued expansion could be handled easily while allowing USI one point of contact for design, installation and troubleshooting.

The impetus for this was when USI acquired TD Insurance Inc., a wholly-owned U.S. subsidiary of TD Bank, N.A.; that acquisition included the South Portland, Maine, office and about a dozen other locations. “They had C•CURE 9000 from Software House running on a PC,” recalls Porreca. “It wasn’t what I would consider enterprise class, but they had the beginnings of some-thing that we could build on.”

Looking for an integration partner, USI approached the integrator that had installed the C•CURE 9000 system in its former TD Bank’s location, but the company didn’t get the answer for which it was looking. “They were unresponsive and very expensive,” says Porreca. “That’s when I thought of The Protection Bureau. The Protection Bureau had put in the security system in USI’s datacenter more than a decade ago. Once I gave them a call, they were able to provide me with one-stop shopping, which was a big timesaver for us and no headaches.”

Founded in 1975 by Keith Ladd, The Protection Bureau is a full-service, soup-to-nuts security systems integrator serving the entire Mid-Atlantic region. The multiple awards-winning firm is a UL-Listed fire alarm installation company and operates its own central monitoring station from its Philadelphia metro-area headquarters. The company was named a Security Sales & Integration Installer of the Year in 2009.

“When we first met with Tim, he showed us a stack of access cards that was probably eight inches thick, and he said, ‘We need to fix this,’” says Matthew Ladd, second-generation president of The Protection Bureau family business and a Security-Net member.

Because of The Protection Bureau’s affiliation with Security-Net, it allowed USI access to a national network of partners to expand and unify its access control across the country, while providing streamlined communication. USI and The Protection Bureau agreed on the design, end results and processes it wanted, and The Protection Bureau tapped into its Security-Net (for more on this organization, see box) partners to execute installation in other cities.

To date, nine integrator partners have coordinated with The Protection Bureau to install and upgrade 50+ sites, with a roadmap in place to eventually support all locations within three years.

“When there is a problem or question, there is one person to call, one number to call. That’s one of the strengths of the organization that we’ve put together with Security-Net,” Ladd says.

Achieving Active Directory Integration

Another deciding factor in USI partnering with The Protection Bureau and Security-Net was their ability to tackle Porreca and his team’s biggest item on its must-have list: integration with Microsoft Active Directory. The company wanted to bring the C•CURE 9000 platform into its datacenter in Philadelphia and have it handle support for all of its locations across the country.

Because the company’s IT team would be handling the access control management, integration with the IT department’s Active Directory database was a nonnegotiable. The team needed to be able to easily manage the additional responsibilities without adding significant time or complications to their existing daily workload.

According to Porreca, with so many locations and cards, USI recognized it would be difficult to maintain all of that information in both the C•CURE and Active Directory networks. The biggest challenge would be that when people changed roles or left, the systems would be out of sync with each other.

The Protection Bureau identified a way to tie C•CURE into Active Directory. “This was no small undertaking,” Ladd explains. “You’ve got 10 projects going on at any one time. That’s 10 site managers, 10 IT connections you have to coordinate with and make sure that everyone involved knows what they are doing beforehand to avoid any roadblocks.”

Thanks to an integration with Active Directory, daily card maintenance, updates to doors, or changes to access rights would automatically be updated in both systems. Since USI must follow HIPAA (Health Insurance Portability and Account-ability Act) and other government regulations because of its client information, an integration that merges IT and security is a huge benefit for the company. It allows IT personnel to keep track of employees who are allowed rights to certain files, data or doors, and update/reassign access rights across the company both remotely and instantly. “There is no hole or gap; it’s a huge timesaver for us,” Porreca says.

Security-Net Partners Execute Plan

Currently, with the aforementioned 50+ sites already online and upgraded, USI and Security-Net have ambitious plans to convert about 40 sites per year, in order to adhere to the timeline of getting the whole company onto a one-card system within three years. With such complicated logistics on so many fronts, having a centralized project manager from The Protection Bureau to co-ordinate the entire undertaking and communicate with Security-Net partners has allowed the proceedings to be seamless, with very little disruption of service to USI employees.

Security-Net member Security Controls Systems (SCS) was the first integrator partner on the job, taking advantage of its Houston base of operations to upgrade USI’s Dallas office. The office location, which encompasses two floors of a major high-rise building, made it to the top of USI’s conversion list because, while there was a functional access control system in place, there were considerable issues managing the 100+ cards in the system.

“Though the access control system was installed, the location was essentially out of service. Personnel couldn’t add or delete cards,” says SCS President Bill Savage. The integrator’s operations manager was closely involved in coordinating the site assessment and specific requirements that The Protection Bureau and USI had discussed.

Weekly meetings between those involved at USI and The Protection Bureau help fine tune the ongoing deployment, and the integrator makes sure that the end user’s point of contact is al-ways the same so that nothing falls through the cracks.

“The fluidity of these installations has so much to do with the amount of planning and communication that happens between us and The Protection Bureau before we ever walk into the location. It minimizes problems and answers many questions that might come up while we’re in the field,” says Henry Olivares, president and CEO of Gilbert, Ariz.-headquartered APL Access & Security Inc. APL’s team, led by David Castro, vice president of sales/operations, completed the second installation for USI at the company’s six-door, El Paso, Texas, location.

The planning before this installation, and every installation, is meticulous, making sure all parties have accurate employee and access lists. Cards are defined, tested and sent out prior to the installation. According to Castro, because of the high level of communication before and during the project, the installation was able to be completed on time within one weekend. This was the case even with an initial hiccup of having to rerun wire to the elevator access control system because the current system had been disabled.

This whole process has been made even easier by the fact that The Protection Bureau’s design for integrating the access control solution with Active Directory works automatically, al-lowing USI’s IT staff to handle all of its current and new responsibilities without adding personnel.

“It takes a lot of foresight and integration at a high, high level to be able to execute a security plan such as this one,” Ladd says. “USI pushed really hard to make sure the solution would integrate with Active Directory and it has paid off.”

“Once you get to the point of adding, deleting and managing thousands of employees in dozens of locations at any point in time, that is a full-time job for any staff to keep track of,” adds Porreca. “And integrating all of this together for our IT staff just makes it an absolute breeze.”

End User Eager to Expand Into Video

With USI’s constant growth through new acquisitions, the integrator partner and access control platform it chose will surely al-low the company to continue managing its security and credentialing on a highly scalable enterprise level. “This is an ongoing effort for us,” Porreca says. “We are always growing. So as we add more locations, we are bringing them onboard to the managed system. We no longer have to rely on someone locally to manage the systems. It’s a lot more flexible for us.”

And, if unifying access across its expansive U.S. footprint isn’t enough, USI has two more items to add to its agenda. The company has plans to centralize its current video surveillance, which includes a few disparate systems at a handful of locations, into one centralized system. “We also want to look into issuing photo ID cards to give all of our employees a visual identifier. A lot of people travel and not everyone is familiar with everyone else, so we want to manage that better,” Porreca says.

With Security-Net and its partners in place, USI is in good hands as it braces for an integrated future. “We’ve only touched the surface,” says Porreca of the possibilities.

Read the original article at Security Sales & Integration.

State of the Market: Access Control

By Karyn Hodgson
SDM Magazine, March 2015

Sometime around the middle of last year many access control industry insiders noticed a welcome phenomenon: People were smiling more. At trade shows, around industry round tables and across boardrooms, a collective weight seemed to have lifted. As the economy finally shrugged off the doldrums and businesses started loosening the purse strings, those manufacturing, selling and installing access control saw momentum — whether for the first time since the recession or as a continuation of a recovery begun a year or two earlier — that led to a positive 2014 for most and a rosy outlook for 2015.

This is reflected in SDM’s 2015 Industry Forecast Study. SDM readers were contacted in the fall of 2014 about their opinions of the state of the market in 2014 and their expectations for 2015. Nearly 70 percent rated their current access control market as good or very good/excellent in 2014. When asked to predict how the market would fare in 2015, there was a substantial gain (9 points) in the percentage of respondents who expected the access control market to be very good/excellent. (See charts on page 51).

“We fared better than we budgeted for or expected in 2014,” says security integrator Skip Sampson, CPP, president, KST Security, Indianapolis. Sampson, who is featured on this month’s cover, attributes this growth in large part to the general economic recovery.

“It all hinges on budgets. We would engineer a lot of projects in previous years, but they might sit for a year or two before the funding would come through. This year a lot of those projects were finally funded, and other projects we consulted on and engineered got funded right away. In the summertime, everyone said to themselves, ‘This is going to continue to be good.’ We saw projects in the summer that took us right through fall and winter and proved to us that corporate America was releasing funds.”

Christopher Sincock, vice president, security business, DAQ Electronics LLC, Piscataway, N.J., says the positive atmosphere was palpable. “There were more smiles the second half of 2014.
Traveling around North America, I saw signs of construction that I hadn’t seen for a few years and that was very encouraging. There is nothing like seeing a bunch of cranes when you are driving through a city. I love to see those.”

Research firm IHS Technology, in its most recent study, predicted the global market for access control would grow at about 5.5 percent. However, Blake Kozak, senior analyst for the Englewood, Colo.-based firm, says if you figure in wireless and electronic locks, that number is closer to 7.5 percent. “2013 was sluggish; but [during] the back end of 2014 the market started to come back,” he says. “Based on our analysis of the last eight months or so, the market will continue to improve.”

While many in the industry reported similar growth numbers, a few outstripped that by quite a margin.

“I would say that our company performed extremely well — almost publicly too well,” says security integrator Craig Jarrett, president, Netronix Integration Inc., San Jose, Calif. “We grew right at 65 percent last year. As a whole I would say the industry grew, maybe not as much as we personally did, but everyone I talked to was pretty positive and the sentiment seems to be that 2015 will be even better.”

There are concrete reasons for this optimism. Along with a freeing up of funds for both old and new projects and a rise in construction (see chart on page 55), access control systems are quite simply “aging out.” This fact, timed as it is with rising optimism in the economy and businesses’ willingness to spend money, is good news for the access control industry.

The Big Trends

“I think what has happened is the economy finally started to show signs of stability and there are many large companies and systems that really needed significant upgrades or replacement,” says Frank Gasztonyi, chief technology officer, Mercury Security, Long Beach, Calif. “Many of those systems were installed 15 to 20 years ago. What we saw after 2009 was many companies who were reluctant to grow or upgrade those systems or they did the minimal. In 2014 they started to release the budgets to upgrade.”

Scott Schramme, vice president of sales, Continental Access Control, a Napco Security Group Company, Amityville, N.Y, agrees. “Right now in the access industry one of the big things going on is a lot of opportunities with what I will call ‘retro.’ There are a lot of systems out there that have just gotten old. Because of the influx of money, a lot of businesses are spending it to upgrade access control systems. It is a big opportunity.”

Sampson has seen this trend in action. “We see a large opportunity out there for upgrades to systems that have been in place for years. They are now getting the funding to upgrade both the hardware and software side of things for those systems.”

Speaking of software, Mitchell Kane, president, Vanderbilt Industries, Parsippany, N.J., points to the life cycle of technology as another driver timed just right for the access control industry now. “There is a technology cycle every six to seven years where everyone seems to do upgrades. One of the biggest drivers over 2014 and going forward is that a lot of the companies we support are finally moving to the latest Microsoft version, which in turn forces upgrades. Some of them are still running on special license agreements. When they start to move away from those it opens up all kinds of opportunities.”

Beyond software, another sea change has occurred within that seven-year technology cycle: the rise of the “Internet of Things.” While not a direct driver for security yet, this is an entire mindset taking over the consumer side of life, and many expect that to bleed over to the industry sooner than later.

“The Internet of Things (IOT) is literally a giant map of smart devices that are floating out there,” explains Rob Martens, futurist and director of connectivity platforms, Allegion, Carmel, Ind. “I do see an interesting growth potential with the pull through into the commercial market with the IOT. Now a lock isn’t just a lock. It is a potential smart device that can add something to their lives.”

Everyone is a consumer, says Andrew Elvish, vice president of marketing and product management, Genetec Inc., Montreal. “It’s my mantra. We all have smartphones; some have Apple TVs or home automation. Even though we are a B2B business, people’s expectations are set in many ways by their experience as consumers.

“There is a refresh period going on in terms of technology. In the past six to seven years, the tech gap between what they have and what they can get is so compelling it is time to make that move. And concerns around security both physical and logical are very present in those doing risk assessments,” Elvish reasons.

As more and more IT departments get in on the security upgrades, this could be a significant factor.

Marcus Logan, senior manager, product marketing, Honeywell Security, Louisville, Ky., sees a definite correlation between consumer experiences and business expectations. “I can unlock my door or manipulate my house through my phone or iPad. How come I can’t interact with my office door the same way?”

Finally, there is the fact that U.S. corporations are sitting on more cash today than ever before, after hoarding it for years against a sluggish economy. Moody’s, a credit ratings company, reported that U.S. company cash levels reached a record level $1.65 trillion in mid-2014, according to an October 2014 Reuters article.

“I read there is more cash sitting on the ledger books today than at any time in history,” says Scott Baker, president, EMS & OEM Group, ASSA ABLOY Americas, Phoenix. “In 2008 a lot of corporations focused on cash flow. Once they have all that cash, there are only a few things they can do when the economy gets better: look for acquisitions, buy back stock or invest in some other way. Business investments include security.”

CEO and founder of Camarillo, Calif.-based Security Door Controls (SDC) Arthur V. Geringer, DAHC, agrees with the options present in such a circumstance. “This year should be even better because there is so much money sitting on the sidelines and pressure to get more than just a larger return.”

What does more money to play with, a willingness to spend it, the need to upgrade end-of-life access systems and new types of buyers with a keen interest in technology add up to? A whole lot of opportunity.

Baker put it best: “I am more optimistic at the start of 2015 than I have been at the start of any year since 2008. It is the first time I can remember that the end users and manufacturers and integrators are all lined up with a strong economy.”

Industry Challenges & Opportunities

In addition to the big things that are adding up to a very optimistic outlook for access control, there are also some ongoing inside industry trends with the potential to impact sales both positively and negatively.

As a whole, access control is not a fast-moving industry. Often, what is “new” to the average end user has actually been around for several years; but only after it is proven and they see others implementing it will they jump in.

“There are a number of key challenges to this market,” says Dr. Selva Selvaratnam, senior vice president and chief technology officer for HID Global, Austin, Texas. “The biggest challenge is perhaps related to the prevailing attitudes about access control. In 2014 HID Global conducted a survey that raised questions about how well organizations are ‘keeping up with the bad guys.’ We found reliance on legacy infrastructure, technology and mindsets will make it hard for organizations to keep up with today’s technology advances that address a world of increasingly sophisticated threats.”

For example, the survey found that while 75 percent of respondents felt cards with cryptography were important, the majority also believe that mag stripe and proximity technologies provide adequate security, despite their vulnerability to cloning.

“The access control industry today still has a lot of proprietary nature to it,” adds Jason Ouellette, product line director, Access Control, Tyco Security Products, Westford, Mass. He points to situations such as the end-of-life announcements around GE products. “At the end of the day it is a forklift exercise and most of the strategy is how to protect and preserve the reader. What is already in place will drive a lot of who they will go with when it comes to access control decisions.”

This is a trend across the board, Genetec’s Elvish says. While his company experienced strong growth in 2014 in line with others’ performances, it wasn’t as strong as they had expected, due in part to platforms being discontinued and companies (both manufacturers and integrators) being acquired.

As the industry was busy consuming itself, those watching — particularly the new breed of buyers — went into “wait and see” mode before committing.

“We were expecting a lot more of our large customers were going to add access into unified projects,” Elvish says. “It did happen and is happening but there really was a wait-and-see attitude among CSOs and CIOs due to so much flex in our industry. Interestingly, in 2014 we also saw a real change in the people around the table, the buying teams and decisions makers. Now we see people like the chief resiliency officer (CRO).”

These new people are influencing buying decisions and that is a trend that will continue. Like it or not, access control and the security industry in general have to embrace IT and IP (Internet Protocol) and the new breed of decision makers who live in these worlds.

“There is slow progression, even within organizations,” says David Bunzel, executive director, Physical Security Interoperability Alliance (PSIA), Santa Clara, Calif. “We have board members working for larger security companies that, when they come from a different industry, scratch their heads and say this industry thinks ‘old.’ But there are some companies and individuals in companies who see the value and understand what IP devices do and the Internet of Things.”

So what you have going on in the industry is a push-pull of those who feel that the traditional panel/card reader (often proximity) systems have worked for them and continue to work and those that understand the power of IP and the potential it can bring. The age of the traditional panel is waning and the IP/network/edge infrastructure is waxing. The trick is negotiating the transition.

A new breed of integrator is beginning to emerge to help navigate these waters — the IT integrator. This integrator is not always the competition, says Gavin Bortles, president, The Kepler Group Inc., Altadena, Calif. “We are bridging the gap between physical and logical security. There are a lot of old school security integrators who have a significant momentum in the market, but have yet to really invest in the IT side of their skill set. That is where we come in to help.”

KST’s Sampson adds: “We rarely see an opportunity that isn’t involving both IT and security now. When we have our yearly client reviews it is with both — security to understand what is coming up with deployments and IT because they know what that software road map is.”

IP may be daunting to some, but Bortles sees access control systems, even traditional ones, as a natural fit into the IP world. “Because of its network footprint, access control has a lot more flexibility on where it resides and on what infrastructure. A camera load is significant on the network, but access control just acts like a regular computer. Because of that it is much easier to IP-enable an access control system and deploy it in any environment. The barrier to entry is a lot lower. I don’t think the convergence industry will mature this year, but there will be a big push.”

What that means is even though video is often considered “king” in the security world, access control actually has the advantage when it comes to being the kind of solution that is considered normal practice in an IT department, he explains.

And guess where the budgets reside? “We can potentially get to the point where security folks have access to the kind of budgets IT has had for the last 20 years,” Bortles adds. “Security has been kind of the red-headed stepchild within the organization, not a profit center. But as security becomes more of an integral part of that we will have a lot more IT departments doing security system upgrades. Look at Sony. If someone is inside your firewall, imagine if they can view your cameras and physically see your sensitive areas. That is the frightening discussion in the enterprise now. When folks have that kind of fear struck into them, money becomes available.”

Beyond Access Control

It is impossible to talk about access control today without also talking about “what else?” Access systems are rarely standalone these days and more and more customers at all levels expect it to be integrated, at a minimum, with video and intrusion detection.

In fact, 60 percent of SDM’s Industry Forecast responders expected sales of integrated systems to increase in 2015, ahead of access control at 55 percent (see chart on page 51). This is a number that has been steadily climbing over the past few years.

“We have deployed a percentage of systems with video integration and that continues to trend up,” says integrator Jason Cloudt, vice president of sales and marketing, Security Equipment Inc., Omaha, Neb. “We were integrating video on smaller systems this past year: we did some systems that were 50 cameras or a single building that wanted video integration. Another thing I see us having more success with is integration with intrusion and tying it all in with one graphical user interface (GUI) to manage it.”

DAQ’s Sincock calls this the “holy trinity of access control.”

“At the end of the day, everyone has that, even the smaller operations by virtue of number of doors often have more cameras than doors under access control,” he says.

What has changed and is changing, however, are end user expectations for what that integration can do for them. They no longer have to be persuaded that integration is a good idea. They know that. Now the conversation is about the how and the what.

“They are buying a lot more of the integration capabilities,” says Gary Staley, national sales director, RS2 Technologies, Munster, Ind. “Number one is integration to outside databases so we can exchange data from HR packages for adding and removing people automatically from systems.”

Integrator J. Matthew Ladd, president and COO, The Protection Bureau, Exton, Pa., agrees with that assessment of buyer preferences. “We are seeing much more drive to have Active Directory, or integration to other systems. I think that is where you will see the growth, whether in 2015 or 2016: building and HR systems connected with access control.”

Steve Piechota, vice president and CFO for integrator Netronix sees this trend as a motivational force. “I think the ability to integrate with other systems has motivated some folks to begin to upgrade existing systems. Last year we did several that were virtually forklift change-outs of systems. They had end-of-life systems that were going to have to be replaced. They looked at ways of integrating with their HR systems and various IT systems and we sat in planning sessions with end users that were all about being able to do integrations and improve efficiencies. That is something I am selling on virtually a daily basis — the integration to other systems and taking disparate systems and linking them together.”

Sincock says even the term “access control” is outdated. “We have to stop calling it the access control market because it is so much more. There are so few access-control-only systems sold. These days so many folks also want integrated video and other things. It is becoming far more common to sell an integrated system than just straight access control.”

KST’s Sampson thinks “unified platforms” are the way forward. “They are really needing and buying a unified head end for all of their security systems. I think the vote is still out on who will win that unified head end: access or video manufacturers? But most of our opportunities have been centered around access control applications being the unified GUI of the video system and intrusion system and those types of technologies.”

This is what is driving the whole discussion around standards in the access control world. (See related article, “I’ll Take 3 Standards; Hold the ‘Secret Sauce’” on page 66.) “End users are seeing that the other ecosystems they work with, whether that is office systems or productivity tools, are all fairly integrated and work nicely together,” Genetec’sElvish says. “On the security side of the house there are a lot of silos still and a lot of users are very hungry for unified or open systems.”

Per Bjorkdahl, chairman, steering committee for ONVIF, San Ramon, Calif., believes the access control market is following the video market in expecting open platforms and choice. “End users want to select an access control management platform and be able to pair it with a wide variety of different IP-based door controllers and card readers. It is no longer considered a luxury in the market. End users expect to be able to integrate video and access control together for a more complete and accurate picture of their security operations.”

End users are frustrated with closed, proprietary systems and are embracing the open architecture approach more and more, says Bruce Stewart, business development manager for access control, Axis Communications, Chelmsford, Mass. “With an open system users can build best of breed solutions instead of being locked into a legacy system with one vendor. IP-based solutions not only meet their needs today, but also have the flexibility and scalability to grow with them into the future.”

End users are also extremely interested in mobility — a trend that is a direct crossover from the consumer side. “There has been an interesting transition in the access control market over the last 12 months,” IHS’s Kozak says. “What wasn’t even talked about six or seven years ago is now at the forefront. People want to manage things on the go and not have installed software. The industry is beginning to focus on flexibility and mobility.”

Honeywell’s Logan agrees. “One thing we have seen more requests for that has been somewhat surprising is apps. Users want ways to interact with the system on the go, anywhere at any time. This trends spans from small entry-level systems to the enterprise. Three to four years ago they weren’t interested in apps. Now it is almost a minimum to compete.”

Paul Ahern, president, Cypress Integration Solutions, Lapeer, Mich., would add customization to that list of newer demands. “The requests for custom integration solutions to adapt non-typical data collection devices into access control systems have been robust.”

At the end of the day it all comes down to listening to the end users, adds Paul Bodell, president/CEO, ECKey Smartphone Access Systems, Lancaster, Pa. “They want a secure, convenient access control system that is affordable. Take a look at what you are providing. Is it secure? Most are. Is it convenient? Affordable? End users will ultimately buy the things that meet these three qualifications.”

And increasingly that convenience piece gets back to the consumer experience and expectation, Stewart adds. “With information at our fingertips in our daily lives, the thought of not being able to access your security information in the same way is becoming more of an expectation gap each day. Younger generations of security professionals are coming up through the ranks and are looking toward easy, accessible, flexible and open systems — not technology from the last millennium.”

Sidebar: 2 Technologies to Watch Closely

While access control may be a “slow moving” industry, that doesn’t mean there aren’t new technologies being developed all the time. Two of the hot-button discussion points of the past year have involved the buzz around NFC/Bluetooth, and wireless online locks. SDM asked experts to weigh in on these technologies relative to their influence on the market in 2015 and beyond.
SMARTPHONE AS CREDENTIAL

This is probably the top thing people are talking about in the industry. Interestingly, integrators mostly agree that they hear much more about this from manufacturers than they do from their end users. Still, the whole consumer expectation discussion would not be complete without contemplating the No. 1 technology of the decade: the smartphone. Putting aside whether near field communications (NFC) or Bluetooth low energy (BLE) will ultimately be the technology of choice — or whether there will be room for both — many insiders feel the phone as credential has the potential to be a “disruptive force” on the industry.

“I believe Bluetooth may have some of the most immediate opportunities,” says SDC Product Development Manager Mauricio Lainez. “NFC-enabled products are becoming more readily available, but the technology is still relatively unknown to end users.”

Rob Martens of Allegion still sees it as a generational thing, with the younger generation almost universally carrying a smartphone. “They think, ‘Why do I need to carry a card?’ As more of them enter the workforce that demand will only go up.”

NFC is brand new, says Jeffrey Nunberg, president and CEO, Integrated Security Systems, Miami, Fla. “We are looking at 2016/2017 for that to become more widely adopted. I am personally looking at NFC readers for our new headquarters building. But really it is new but not revolutionary. It is just another app. I don’t think it is something that will cause people to go out and replace what they have. They might upgrade their readers.”

ASSA ABLOY Americas’ Scott Baker agrees. “It is not going to be 2015. That will be our first opportunity to sell it in any numbers and early adopters will be the hospitality industry. If there is one lesson I have learned in this business it is that people in this industry are slower to change than in their personal lives or even other industries. Whatever technology will eventually dominate the world, it will take longer in the security industry than it did for smartphones to take over in cell phones.”

Manufacturers such as ECKey are on the forward side of this trend. “We are an early-stage company, says ECKey’s Paul Bodell. “I would say right now that 50 to 60 percent of our leads are end users asking if we have dealers that support these products because they want to do it.” Bodell believes in small and medium businesses things will start happening in 2015. “Smartphone-based solutions are literally a fraction of the cost of traditional panels and readers. Enterprise systems will take longer because they specified systems a year or two ago and aren’t going to change now. It will be at least another year and a half before it starts to disrupt that market.”

Others aren’t so sure smartphones will be a big factor any time soon.

“In 2015 we will, I think, see some advances in NFC/Bluetooth type access credentials,” says integrator Skip Sampson of KST Security. “But it is not ready for mass deployment yet. We haven’t forecasted a decrease in card sales because of it.”

RS2’s Gary Staley points to a personal experience that illustrates that the technology is not ready for prime time. “When I was in Las Vegas recently I bought breakfast in McDonalds using my phone. The girl behind the counter looked surprised and told me it was the first time she had seen that — ever. That gives me a measure of what people are used to.”

Still, there is a Unisys statistic that it says takes 26 hours for the average person to report a lost wallet, but only 68 minutes to report a lost or stolen phone.

“That is driving some of the awareness around mobile credentials, but what are still being deployed are traditional cards and readers,” says Marcus Logan of Honeywell Security. “I think it will transition, but don’t know how quickly.”

WIRELESS ONLINE READERS

The emergence of a new class of readers from the likes of ASSA ABLOY and Allegion are set to position wireless technology as one to watch for 2015.

“Wireless is a very lucrative proposition,” says Frank Gasztonyi of Mercury Security. “Through the use of wireless we see that the number of secured doors can be significantly increased and end users are quite willing to do that because they don’t have to go through a major disruptive installation effort.”

Sampson views the new online locks as a business opportunity. “Finally we have something that is somewhat new in our bag of tricks that we are seeing a lot of success with now. We are not losing that business to a pushbutton lock.”

Not all integrators are comfortable with wireless yet, but if they can get there, it can literally open up new doors — and new business.

“Dealers and integrators are still not leveraging the benefits of wireless like they could,” says Scott Lindley, president, Farpointe Data, a DORMA Group company, Sunnyvale, Calif. “These solutions let integrators and end users reap the benefits of a wired system, without the cost of a hardwired system. They are an attractive alternative to off-line, standalone locking systems because they offer a real-time solution that’s compatible with nearly all brands of access control.”

Mitchell Kane of Vanderbilt Industries thinks wireless will bring the entire industry up. “These companies are making a large effort to move technology onto every door. When they do that, you are going to need access control systems to support them. It helps drive the whole industry in a positive way.”

Allegion’s Martens sees 2015 as the year for wireless. “We think it will be a great year for wireless locks. People really want that functionality but there were a bunch of us that didn’t really have that [online] solution. Now we have it and the interest is pretty big. If you think about it, it is very intuitive. I have let myself in the front door with my badge (or phone). Why do I have to use a key when I get to my office? Historically there just weren’t the right solutions in the marketplace. I feel like we nailed that one.”

ASSA ABLOY’s Baker agrees. “Not everything that needs to be locked is a door. There are a variety of openings, including cabinets, gates and server locks. This is a relatively new trend that we haven’t been able to do before.”

Integrator J. Matthew Ladd of The Protection Bureau says wireless locks are a growing part of his business. “It has changed the cost structure. We used to have to put in a control panel and then run wires to specific locations. Now we just have to get it connected to the network and we are up and running.”

Read the original article at SDM Magazine (login required).

3 Key Steps to Implement an Overseas Security Project

by Matthew Ladd

From big box retailers and gourmet coffee shops to oil and gas companies, software firms and major automakers, U.S.-based businesses continue to expand their reach with global operations, all of which require the same high standard of security services as they have implemented stateside.

However, security directors will often find that there can be myriad challenges to overcome when looking to secure a new facility in a foreign country, or to standardize security systems for an international acquisition.

The bottom line is doing business in a different country can be different. There are cultural issues to deal with, language barriers, system compatibility problems and the list goes on. Seldom are these issues deal breakers, but they can sometimes slow down a project or at least require rethinking on how best to implement security, whether installing card readers at a satellite office or putting in an entire surveillance system.

So what are some of the requirements for tackling a global security project?

1. Start with a Global Platform

Doing business around the world becomes simpler when you have a technology platform that is recognized worldwide. Working with an open-platform such as Lenel can make the process of finding integration and solution support partners easier.

In addition, working with U.S. integrators that have international relationships can make the discovery and vetting of these partnerships more streamlined as well.

2. Identify the Barriers and Address Them

Language can certainly become an issue when working internationally. Thus, it can be helpful to have a project manager who is bilingual or at least to engage an interpreter when warranted so everyone involved can be part of the process. And be aware, there may be added problems when troubleshooting technical issues because terminology may differ.

Another language-related problem may arise when the company undertakes alarm integration, bringing alarms at its international sites back to a U.S.-based central station. With IP connectivity it’s easy enough to transmit the information, but there may be trouble with getting that data in various languages.

Cultural differences should also be addressed. Other nationalities look at various forms of security differently than Americans do. A company may not think twice about putting access control on doors to sensitive areas, since that’s the protocol within its U.S. operations, but doing that in Japan would be considered an affront to loyal employees.

Privacy issues, such as the placement of cameras, also differ by country, so again it is important to find someone who can walk you through those issues so they don’t become impediments to a successful project.

3. Be Adaptable

There are two kinds of companies: The companies that have strong central control, where the mothership tells the field offices how to operate, and the companies that allow the field offices to do what makes sense for them.

Chances are security directors will find that there are some areas in which they can more easily institute what is tried-and-true for their business, and others where they will yield to local dictates. Often this is determined by environmental factors.

What is considered older construction around the United States may seem like it’s newly built when sized up against historic buildings around the world that can be centuries old. Similarly, the tools of the trade used for domestic projects, from cable or door locks, won’t always be the products of choice when doing business in other countries.

A U.S.-based company taking its business overseas may want to bring its own standards and technology along, but it’s important to look at what is achievable within the setting. If the walls of the building are made of two-feet-thick stone, an integrator isn’t going to be running cable as they would in a modern office building.

Code requirements can be another area where countries vary. While the U.S. codes may require locking systems to break the power at the door, some countries don’t have that requirement. And that is just one of the areas of disparity. Within locking systems alone, there can be dozens of differences that security personnel will need to review to decide in which direction to go.

The adoption of technology will also play a role. While much of the world has adopted smart cards, many U.S. companies are still using a proximity card-based system. This raises the question of whether to standardize globally or find a way to coordinate multiple card technologies.

These are the types of issues that companies will face when entering into a global security structure. The key is to know what needs to be done, find the best way to do it and select partners, both within the United States and abroad, who can ensure that the project is handled the right way.

Read the original article in Security Magazine

Technology Changes the Landscape of Perimeter Security