With this article, SDM inaugurates a series that will examine the challenges of integrating a different type of equipment each month or explore issues of integrating systems. We are interested in your feedback and questions about this series. Please contact Russ Gager, Managing Editor, at gagerr@SDMmag.com.

Perhaps you are the type of security dealer or systems integrator whose customers have modest access control needs. Maybe you sell and install only 10 or 15 access control systems each year.

Your customers may need a system that controls only from two to four doors, points out Vineet Nargolwala, director of strategic marketing for access control solutions, Honeywell Systems Group, Louisville, Ky.

Because your business is small, you do not have time for a lot of training. You and your team appreciate an access control system that can be easily installed out of the box.

Larger dealers may be installing systems that control from 30 to 50 doors, Nargolwala estimates. These systems tend to be more complex, and dealers need more training so their customers may benefit from integrating access control with video, visitor management and some ID badging. Offering these technologies can distinguish such a dealer from competitors and improve profits.

Perhaps you are a large commercial security dealer or systems integrator and install access control systems with 100 or more doors. Your additional specialties may be video surveillance, intrusion and fire systems, audio/video, data networks, and more. You may even go beyond the traditional security environment and link to human resources databases and enterprise applications. These are the dealers and integrators Nargolwala calls the “technology leaders.”

Regardless of which category your customers and business falls into, you should be sure to install systems that can be upgraded and integrated to other security subsystems at a later date, Nargolwala maintains.

So the question of integration is one of cost/benefit.

“If I were a security director for a small to mid-size firm where price was the primary driver, I would want to look at a system that would give me a low total cost of ownership,” asserts Peter Boriskin, director of product management for access control, Tyco Safety Products, Boca Raton, Fla. “Instead of looking at what it costs me on day one, what will it cost me in two, three or five years?”

He maintains that although the amortized cost of many access control systems across their usable lifetimes are within a few percentage points of each other, their total cost of ownership varies widely based on the cost of alternatives they would replace.

For example, if a system has a non-embedded database, how much time must a database administrator spend maintaining the access control system? If the access control database is not integrated with the human resources database, how much is the database entry person paid, and how much of his or her time is used by re-entering people in the access control system?

If the person is paid $30,000 annually and half of his or her time is spent re-entering people for access control, then $15,000 can be applied to the cost of an access control database that will integrate with the human resources database, Boriskin suggests. With such calculations, the payback on the cost of an integrated access control system can be rapid.

“So the integration side of it is huge,” Boriskin remarks. Integrating video surveillance with access can reduce confusion and time spent sifting through separate reports for video and access.

“I can now have a single unified report that includes videos as well as alarms and events,” he points out. “I’ve reduced my officer’s time on this investigation by weeks and I’ve tremendously reduced my total cost of ownership.

“It is a sliding scale – the further you integrate, the more savings over time you will achieve,” Boriskin maintains. “My recommendation is to evaluate the cost of credible threats you’re mitigating with the cost of integrating.”

Manny DaCosta (left), Wheelabrator purchasing manager, and Bob Maunsell of Electronic Security Group, Worcester, Mass., a Compass system integrator, inspect equipment at Wheelabrator's Millbury, Mass., plant.

Assessment of Risks

Calculating the cost of credible threats in dollars to compare them with the price of additional integration is the challenge of the dealer/integrator when proposing these features to customers.

“It’s always very challenging to talk about return on investment in a security arena,” concedes Adam Shane, senior applications engineer, AMAG Technology Inc., Torrance, Calif.

“The bottom line is you’re limiting your risk to something bad happening, and your risk assessment program will try to assign a dollar value to those risks that you’re looking at, and that’s got to be the thing that drives the customer with wanting to go with an integrated system versus a non-integrated system,” he calculates. “It will further limit their exposure to risk.

“If you are able to indicate you are preventing some high-cost incident from occurring – think about the child abduction from the hospital or the baby-switching – that’s a high-risk occurrence,” he points out. “If it happens just once, it’s going to cost the hospital millions and millions of dollars in lawsuits and bad publicity.

“So if the hospital spends $100,000 to install a system to reduce the possibility of something like that happening, they may get some positive publicity, but they can never show on paper that they saved money or reduced cost,” Shane admits. “They stopped their exposure to a liability problem.”

He recommends doing a risk assessment of all potential jobs regardless of their size to determine reliably how much integration of access control may be justified. “If a risk assessment indicates your exposure is less, [then] additional integration cost may not be justified,” he concedes.

Photo ID cards are used by Ocean City Home Bank’s access control system.

Size Does Not Always Correlate to Threat

If a risk assessment indicates even a small installation has a high threat level, then recommend more highly integrated security to your customer.

“An application with a low number of doors still can have high sophistication,” asserts Nargolwala of Honeywell. “You can offer the same feature set at different scale points, depending on the size of the facility and what the customer’s needs are.”

He cites a law firm that had a low number of doors – four – but a high need for security. “Start by understanding what the needs of the customers are and what actual issue they are trying to address by using that system,” Nargolwala suggests.

A trend towards more integration in smaller systems is being noticed by Jerry Cordasco, vice president and general manager of Compass Technologies Inc., Exton, Pa.

“It used to be unless you got into a pretty big facility, the customer really wasn’t looking for too much integration, but we’re seeing more and more people who have four, eight or 16 doors and now want integration to other systems,” Cordasco reports.

“In the past, the cost to integrate smaller systems was so high, and sometimes what it did was make a system so complicated that it increased maintenance costs and made it complicated to operate, and the average small user said they weren’t going to do this,” he remembers. “That kind of integration now can be done really easily, and it’s not too costly and doesn’t overly complicate things.

“For a small dealer now to be able to integrate access control and video, it’s really easy, whereas five years ago, it was a complex nightmare,” he maintains. The same is true of integrating energy, lighting, and control of elevators even in a small building, he insists.

“The most common integration that we’re seeing as access control suppliers is a desire to integrate with video,” he observes. “Our concept is that people don’t have an infinite budget for security, and if they can get more functionality out of any one of the systems they buy, it becomes more valuable to them.”

For a project Compass did in Texas, the HVAC and lighting systems were turned on automatically by the access control system in an employee’s area when it identified people coming in the building. “They figured out they’re saving $5,000 a month,” Cordasco estimates.

“Even in the smaller systems, the customer is becoming sophisticated enough to understand that any single discipline of security is not enough,” he maintains. “Each type of security – whether intrusion, video or access control – all have a particular functionality. When you connect those systems together, you get a functionality that is way beyond just the sum of the individual pieces.”

A variety of devices besides cards, like the key fob shown here, can be used with an access control system.

Over and Over Again

Security dealers and systems integrators should be sure to investigate suppliers’ costs of integrating systems, such as licensing fees for integrating each camera of a video surveillance system, recommends Shane.

“Depending on the scale of the facility, if it’s very heavily video monitoring and very light access control, such an integration may be very expensive and may not offer as much of the functionality as they want,” Shane warns.

Shane recommends that an access control system have the ability to grow as a company does.

“Will the system scale as your customer grows, and what’s going to be the cost to provide that scalability?” he asks. “In other words, is it a one-time purchase, or does it have to be purchased over and over and over again?”

He also advises selecting an access control system with flexibility, which he defines as the ability to integrate with systems that may not even have been developed yet.

An advantage of integrating access control with human resources databases is less confusion about employees’ identities, Shane points out. For example, when data is entered from different sources and at different times, especially in large databases, duplications can result.

An example is three access cards being issued to the same person because he was listed in various databases as James Smith, Jim Smith and J. Smith, he explains.

“When you have your human resources database being your gold standard for identity management, that information can be downloaded to the access control system in a high integrity fashion, so that the records all come across and are consistent between the two different systems and are consistent within the system,” Shane declares.

Another value of such integration is reassigning or terminating employee access rights to a computer system and a building at the same time, so that once a person is terminated from a company, his or her access control system card would automatically be deactivated.

Mike Mahon (left) of Compass Technologies Inc., Exton, Pa., and Jim Yensel of Ocean City Home Bank import security information into the bank’s 5E system.

System’s Handshakes Not Secret

Another important factor to consider when recommending an access control system for integration is its ability to interface with other security systems.

“The key word in the industry seems to be interoperability,” asserts Thomas Moro, CPP, access sales executive for Amano, Roseland, N.J. “You either have the ability to handshake with various technologies or you’re going to be left behind.

“If somebody has a biometric but also wants to use a prox system and integrate it to a time-and-attendance database, it’s very important that you can do that out of the box without customization,” Moro emphasizes. “It’s a huge benefit to provide exactly what the end user wants and without needing a whole roomful of programmers writing a custom code.”

Many suppliers offer software interfaces to popular systems already on the market, but occasionally an interface must be written.

“If we have the opportunity to help one of our dealers get a huge job and the interface is the existing DVR system, we’ll put it right on deck and check out the cost benefit,” Moro pledges about writing custom interfaces. “Interoperability drives the market.”

His company and others have software development kits that enable security dealers, systems integrators or end users to write custom applications such as for point-of-sale or other uses. Ultimately, the type of access control integration a security dealer or systems integrator recommends must match the real needs of the customer.

“It is application-driven,” Cordasco emphasizes. “You have to look at each customer as a unique customer. To go in and propose any pat solution for security that involves integration without first understanding the customer’s needs is just a bad approach.”

Sidebar:Access Control is the Unifier

Although it may not be the first system installed, more and more access control is serving as the unifying element, thinks Adam Shane, senior applications engineer, AMAG Technology Inc., Torrance, Calif.

“Access control has expanded the envelope in which it really behaves as more of an overall security management platform,” Shane believes. “It will provide an interface to video, time and attendance, database transfers, human resource systems and directory systems.”

Depending on the type of business the end user is in, the first system installed may be for time and attendance, he suggests. Then as the security system becomes more sophisticated, control of locked doors is added. “Access control becomes the focus of their security system, and the access has to hook into other systems already in place,” Shane explains.

In other applications, video goes in first. “People will have hundreds of cameras installed before they do anything about controlling locked doors,” Shane remarks. “When they finally add access control, they don’t use the video as their window into access control, they use access control as their window into video monitoring.

“Access control may not be the first kid on the block, but it ends up being the most popular one at the end of the day,” he concludes.

Sidebar: No Controllers Necessary

A different approach to integrating access control is to connect network appliance card readers through data cable to a computer server rather than have individual controllers at each door.

“Middleware controllers are a legacy of the 1980s, when computers were not powerful enough to run systems by themselves,” declares Stephen Pineau, CEO of Viscount Systems, Burnaby, B.C. “Because these new systems eliminate the primary cost of a system, which is a controller, they reduce the cost per door. This gives end users the ability to put in much more comprehensive systems for the same budget.”

The amount of savings with such a system is compounded by the size of the installation, which theoretically is unlimited. For applications with thousands of doors, such a system can save many millions of dollars, Pineau insists. For example, hotels can use online rather than battery-operated room locks for ease of reprogramming and networking.

“The network cable architecture can be much simpler for a dealer to install and lowers the end-user cost of adding doors,” maintains Pineau. “End users want affordability, flexibility and reliability. It’s all about how doors are secured and how the system is programmed, not what goes in the electrical room.”