Someone once suggested that to get an invitation to a party you really wanted to attend you should offer to contribute something to the party. If the video market’s predicted strong year in 2014 (Read “State of the Market: Video” on www.SDMmag.com for reasons why) is the kind of “party” access control is hoping to attend, then the market has tapped into that principle, contributing a strong argument for security systems that integrate both video and access control. That integration is influencing the expectations for the access control market in 2014.
“A key development for the coming year will be the expansion of video and the ability to host video information and tie it to the access control solution,” says Chris Gilbert, president, Security Pros Inc., Jeffersonville, Ind., a Brivo dealer who expects his company’s access control division to grow approximately 60 percent this year after experiencing 45 percent growth in 2013. Across the industry, integrators reported a strong 2013 (see “Integrators’ Market Ratings Hit a High Note in 2013” on page 48) and they have even better expectations for 2014. See “Integrators Have High Expectations for Access Control in 2014,” to the left, where the percentage of integrators expecting a very good or excellent year rose to 36 percent, up 15 percentage points from last year.
Not only are access control projects expected to grow organically because of their integration with video, but cloud-based access control products and services, more IT-friendly systems, broadened IP offerings and high interest from end-users will be reasons to celebrate, according to the many industry professionals that SDM spoke with, including Jay Hunt, president of Allied Fire & Security, Spokane, Wash., a Honeywell First Alert dealer for 10 years.
Hunt, featured on this month’s cover, added managed access services last year, choosing to place the hardware on location utilizing an in-house IT department to maintain the servers. He developed his own business model and capitalized on manufacturer consultations when setting up the service.
Hunt, a 27-year veteran in the industry, has seen many changes come and go, but managed access and cloud-related services are like a “freight train” that integrators will need to reckon with, he predicts. Following the successful implementation, his company is now analyzing its sales practices.
“We have our offering in place, so this year the goal is to bring it to the end users. Without a strong sales effort, it will be like throwing a party without letting anyone know where it is and what it is. You can’t be surprised if no one comes when you take that approach,” he observes.
Allied Fire & Security is considering restructuring its sales program to specifically reward the sales of managed services. “We find that our traditional salespeople are accustomed to selling the server. Your compensation plan drives where you want the people to go,”
A good sign for cloud-based access sales? Small businesses, a key vertical market in 2014, show none of the “cloud reluctance” often seen in the security industry, according to Steve Van Till, president and CEO, Brivo Systems LLC, Bethesda, Md.
“They want solutions as easy to use as the technology they use at home, and we owe it to them to deliver it. Since small businesses make up a large portion of the overall business community, they will continue to motivate this push towards the cloud. From a consumer behavior perspective, many access control users are driven by the ‘pay-as-you-go’ model in their own lives as well as by applications at their workplace,” Van Till says. That same behavior will continue to fuel access control buying practices, he foresees.
In 2014, many integrators will work on modifying their sales approach from proprietary access control solutions to a recurring monthly revenue (RMR) model, including Access Control Technologies, Clifton, N.J.
“That modification in strategy will prove challenging to those who do not possess a managed services mentality until they come to the realization that this approach is entirely diverse from the conventional sales approach,” warns Joseph Liguori, executive vice president, Access Control Technologies.
Video & Access
Access Control Technologies anticipates moderate growth in its access control business in 2014 and “robust” growth in video that will come mostly from large existing customers who will be catching up from years of project suspension, Liguori reports.
Linking access to video is a major request from end users and a powerful driver for the industry. Everyone, from end users to integrators to manufacturers, is paying attention.
“Any technology that you can apply to allow a security system operator to have situational awareness that will make them more likely to make the right decision in how to respond has tremendous value. Video is one of those. Even smaller systems, 16 doors or less, have video somewhere. It’s quite a valuable change,” says Chris Sincock, vice president – Security Business, DAQ Electronics LLC, Piscataway, N.J.
“At DAQ we see that as a big driver and source of revenue going forward. We’ve added an optional video module for EntroWatch, our entry- and mid-level access control solution. Starwatch also has a number of video integrations happening,” Sincock details.
Another manufacturer, WatchNET Inc USA, Tonawanda, N.Y., has been in video for 14 years, but five years ago it went into development of its own access control offering that could seamlessly integrate with its video offering.
Integrated security management is what people are looking for today — and two key parts of that are video and access, reports Cory Whitfield, vice president of sales and marketing, WatchNET Inc USA, Tonawanda, N.Y.
“In the last couple years we have seen the demand for access control integration with our video surveillance products grow so dramatically we went from integrating with third-party access control to developing and launching our own separate division of WatchNET Access products,” he says. “As video surveillance has migrated to IP over the last several years so, too, has access control. With both video and access control now being on the same network protocol (TCP/IP) it is easier to integrate the two,” Whitfield says.
Ray Gilley, CFE, president and CEO, ISI Security, San Antonio, believes access control and video have overtaken intrusion as the major drivers in the market. “You need both — you need to be able to prevent something (through access control) and know what happened (through video),” he describes.
Today’s events (shootings, workplace violence, theft, terrorist threats) continue to force employers to either follow regulations or take a proactive approach to protecting their employees, facilities, and business.
“You can’t have a free-moving facility all the time. We have to put up rings of perimeters and make it harder for things to happen to facilities, especially critical infrastructure. The access control — fences, gates, access control in parking lots, access control in entranceways and within buildings — make it harder for something to happen. Then video shows you the information you need to know while something is happening or afterwards,” Gilley explains.
He predicts his company will grow a sold 12 to 15 percent this year. Before installing systems in everything from petrochemical and critical infrastructure locations, to medical, correctional, and transportation projects, ISI will build, program and test a system before ever setting foot on the customer’s property to implement it. “When our customers get to come and view the customization and sign off on the system, it creates a high level of trust,” Gilley says.
Integrating access control with video (or any system an end user needs) creates actionable information that compels end users to commit and buy systems. This is just as true in the small and medium-sized (SMB) market as it is in the enterprise-level market. An added bonus? “As smaller, independent, businesses see the benefits and efficiencies they can achieve with integrated access control and security systems, the opportunities will grow for small to mid-sized dealers,” says Duane Paulson, Linear, senior vice president product and market development, Linear LLC, Carlsbad, Calif.
For example, Paulson cites a recent analyst report that states nursing homes/assisted living/daycare and churches/temples/worship centers appeared for the first time in the report analyzing the number of access control installations, representing 9 percent, and that number will only grow.
“The integration of video surveillance and access control will have greater penetration in the market this year, and there continues to be incredible growth opportunities for access control in the education market,” says Michael Flink, president, ADI Americas, Melville, N.Y. For more on the education vertical, turn to page 48. “The increased interest in protecting schools and universities in 2013 will expand to additional public venues as more awareness around security and an overall broader acceptance of access control solutions grows,” he says.
Wayne Jared, infinias, Indianapolis, president and CEO, observes a changing definition of “integration.”
“Not long ago, ‘integration’ referred to the ability to watch video in an access control solution — or the ability of an access control system to trigger alarm recording in a video system. Today, integration is being redefined to include a common management interface and approach. For example, in the corporate version of the infinias access control software, you are able to organize your zones into an unlimited depth hierarchy and grant users login abilities tied to any of those levels — limiting what they can see geographically. The ability of a system to share information between video and access control will have a much larger influence on market preference for security solutions in the very near future,” Jared explains.
RS2 Technologies LLC, Munster, Ind., reports a growing number of small- to mid-sized organizations are asking for more from their systems. What once were typically enterprise-level requests — database integration to human resources, student management, contractor management and other personal databases to accommodate single point of entry for cardholders into their access control systems — are now being sought out by smaller organizations who want information, shares David Barnard, director of dealer development for RS2 Technologies.
More complete and in-depth integrations are a definite trend because of a universal push towards information, says Mark Walters, chairman, Z-Wave Alliance, Milpitas, Calif., a consortium of global companies that oversees an interoperable ecosystem for wireless monitoring, control products, and services.
“When we first started doing Z-Wave access control, it really was about remotely controlling the lock. What we see happening in the last year and more in 2014 is the door lock functioning more as an input device. Rather than something you talk to and say lock or unlock, it is now used to trigger an entire scene. That action of opening the door lock is an intelligent occupant-detection mechanism,” Walters describes.
Whether commercial or residential, there is a growing anticipation that people can have access to information everywhere, whether through mobile access, a Web browser, and more,” confirms Marcus Logan, senior manager product marketing, Honeywell Security, Louisville, Ky.
“Integrating different systems together to drive value-added features like arming and disarming through card swipes, controlling energy management through activity based on occupancy, pulling up video associated with different events — and just making the system more meaningful — will have a powerful impact on sales,” Logan says.
End user education is happening very rapidly now and ramping up expectations for integration, advises Keith Brandon, director of sales and marketing for residential access solutions, Kwikset Corp., Lake Forest, Calif., which offers a Bluetooth-enabled lockset and a Home Connect product that interacts with other devices such as lighting and HVAC controls. “Dealers are walking in to a very different end user that is being educated on a national level — and others are converging into the market for the same space. Access control presents unique challenges as more dealers master connected door locks and control, status capabilities, and user code management, but while some dealers are not always prepared to offer those services, they should be because local, traditional security companies can win with their customer service and one-to-one relationships,” Brandon predicts.
The landscape has changed from being focused on alarm signals to more granular accountability tracking, which integration helps provide, mentions Mike Roth, president, National Technology Management Principal, Managed Technology Solutions by MA2 LLC, Southfield, Mich., a Brivo dealer. “Clients want to know who did what, not just that something happened. Integration of video with events and central monitoring by non-security personnel is powerful. Our clients have shifted from plant manager to HR director because the granular data and reporting [that] integrated systems provide gives a great picture of true employee performance. It’s the employees that cause problems for our clients as the intruders are locked out,” Roth says.
IT & Networking
“People are asking for many different things, but at a high level, many businesses haven’t invested in their access control systems in recent years, so we see customers paying significant attention to upgrading and conversions,” says Dan Schroeder, vice president of sales, North America, Tyco Integrated Security, Boca Raton, Fla. “Our partnership with world-class brands such as Software House and our newest addition, Lenel, will prove essential as we help propel our customers’ technologies into the future over the coming years. In addition, our customers are asking for help in planning for the longer term, so we are seeing requests for standardization of access control systems as well as solutions for identity management that integrate with their IT systems.”
Systems will need to be even more IT-friendly in 2014 — even small systems, expects Sincock. “It is really surprising in the small systems market how sophisticated the end users’ IT departments are. Integrators still have to meet all the requirements of the end users’ systems. One of DAQ’s dealers finished a 14-door job with 150 users, but they were looking for database back up and more sophisticated features,” he describes.
It spotlights the continuing evolution of the importance of IT relative to security. That evolution will speed up as open architecture and standards continue to be developed.
“The caveat to having great technology is that it becomes a hindrance when it’s not working in unison with other critical technologies. Access control platforms with an open architecture that allow the integration of outside brands and systems, even older ones, will emerge. The big idea in 2014 is that everything is coming together,” Paulson says.
Legacy Compatibility Is A Must
In 2014, integrators are challenged with modernizing customers’ security without having to completely replace older access control systems that have been in place for many years.
Biometrics is one “newer” technology that must wrestle with working on old systems. One provider, Zwipe, Oslo, Norway, which offers a wirelessly powered card that is based on a near field communication (NFC) platform, is exploring eliminating any external database containing sensitive information (the fingerprint data is only stored inside the Zwipe card) to open better legacy opportunities. “By placing the biometric reader on the smart card itself, we can use legacy smart card readers to read it. This provides an affordable way to use biometrics to authenticate the card holder without having to replace already-installed readers and equipment,” shares Kim Kristian Humborstad, CEO of Zwipe.
Biometrics is being requested more and more according to John Smith, senior channel marketing manager, Honeywell Security, Louisville, Ky.
“We have noticed an increase in requests for biometrics and an interest in near field communication,” says Chris Diguardi, president, Key-Rite Security, Denver, a Brivo dealer.
Biometrics for access control versus cards or PINs are on the rise, Smith believes. On the near horizon, he sees the ability to use a phone as credential rather than a card as gaining momentum in 2014. “Biometrics is acceptable for access to data. iPhones are driving greater market acceptance with the biometric thumbprint. Something previously reserved for spy movies is now being requested more frequently in the commercial space — from small business up to the enterprise level,” Smith says.
Whether it is biometrics, analytics, video or any other new technology end users are requesting, manufacturers are focused on providing products that allow usage with legacy systems. For example, Honeywell announced a drop-in board replacement for use with its Pro-Watch® Security Management System that allows integrators to easily migrate third-party legacy systems.
The Pro-Watch M-5 Conversion with the new Honeywell M-5 Intelligent Controller and Modules eliminates the need to replace hardware, wiring, input/output devices, cards, and card readers, according to the company. These field devices and accessory items remain in place while the new controller technology communicates with the Pro-Watch platform. Pro-Watch integrates intrusion, video and access control systems — including non-Honeywell systems — to bring end user control of all security systems under a single, common interface.
“It’s to the benefit of both users and system integrators that these new technologies are also capable of maintaining legacy support and providing enhancements to pre-existing systems,” says Robert Laughlin, president, Galaxy Control Systems, Walkersville, Md.
The new access control and security management technologies on the market today promise dramatic improvements in performance and efficiency, whether upgrading legacy systems or installing new ones. Add the potential of the cloud and the power of video integration, and you have a party with plenty of reasons to attend in 2014.
ONVIF Releases Profile C for Physical Access Control
ONVIF, San Ramon, Calif., a global standardization initiative for IP-based physical security products, announced the final release of Profile C, which brings the functionality of the ONVIF global interface specification into the physical access control arena.
Through Profile C, systems integrators, specifiers and consultants are able to achieve interoperability between clients and devices of physical access control systems (PACS) and network-based video systems. With this final release, including the availability of the Profile C Test Tool, manufacturers are now able to introduce Profile C-conformant products to the market.
“Extending the ONVIF interface into other areas of physical security emphasizes ONVIF’s recognition that systems designers need a consistent interface to enable seamless integration within their security systems,” said Per Björkdahl, chairman of ONVIF’s Steering Committee. For information, visit www.onvif.org.
Q&A With STANLEY Security’s Jeremy Morton
SDM: What is changing with access control in 2014?
Jeremy Morton, vice president of Product Management for STANLEY Security, Indianapolis: “There aren’t fundamental shifts in access control from a year-over-year perspective, but the following are the some of the growing trends:
- Hosted solutions / cloud-based software
- Integrated locking hardware (on the door) is becoming more common in every channel, where it once was primarily focused on the education market.
- Smart card compatibility in the access control architecture and the growth of smart card technology as the credential of growth.”
SDM: Where will the growth be in 2014?
Morton: When thinking about percentage of growth in the security industry, electronic access control continues to outpace mechanical security, and product development and strategies will be focused on continuing to improve upon and advance those technologies. Additionally, smart card technology and mobile credentials (NFC) continue to be of high interest to large end users and security-driven vertical markets, such as higher education, healthcare and commercial institutions. From a products company perspective, we’ve seen a growth of integrations between architectural hardware and access control software (“on the door”), which have been outpacing traditional “around-the-door” solutions.
Succeed With Legacy-Friendly Access Control Systems
In a constantly evolving business environment, an increasingly popular strategy for organizations to achieve growth and market share is through acquisitions and mergers. Among the many challenges facing these new business situations is standardizing and/or upgrading the physical security systems to ensure enterprise-wide compatibility and efficiency. In many of these organizations, that process begins with the access control systems.
Even just a few years ago, a “rip-and-replace” plan would have been the most feasible to bring uniformity to the enterprise. However, the availability today of best-in-breed access control solutions that enable legacy systems to be upgraded and/or integrated is resolving many of the issues and eliminating the need for an entire system replacement. What makes this solution even more viable is that new software solutions negate the need for concern regarding the brand of legacy hardware or system topography.
Legacy systems typically are comprised of a series of controllers that have embedded software to control specific entrances. Essentially, the intelligence in the system is distributed to the access location entry points, with data sent back to a centralized location for system control. To upgrade such a system, controllers are replaced and new remote interface cards are installed so that all operations are controlled centrally by an enterprise access control solution. In legacy access control systems that feature centralized architecture, all the system intelligence resides in the software. In most cases, these legacy systems also are most likely running on twisted pair cabling that can be utilized by the new system. This yields extremely high cost-efficiency, as only the centralized software is being replaced at the head-end.
With new software solutions, even systems that span separate buildings in different locations can be efficiently upgraded — even if they have different hardware providers — by using one or both of the previously described methods. More importantly, disparate systems can be integrated without ripping and replacing hardware.
New software also holds the key for future growth of access control. This is especially true as users continue to employ access control systems for business operations beyond security, for example time-and-attendance or billable hours. Applications might include auto repair centers for accessing tool vending cabinets; verifying time for grounds maintenance crews; behavioral or usage tracking; and so on. — Contributed by Galaxy Control Systems
A ‘Must Watch’ Vertical in 2014: Education
Education Wrestles to Increase Security
Education continues to be a strong vertical market for access control in 2014. School shootings have placed a blinding spotlight on the need for better security, especially access control, shares Richard Goldsobel, vice president, Continental Access, Amityville, N.Y., a Napco Security Group company, an access provider since 1961.
“Education has a real need right now. There is this combination of the right items for solutions for schools. It includes access control integrated to video and intrusion platforms. But so many schools have video but little to nothing else integrated in place,” he says.
Schools are unique in that they are open early and open late. They have parents and other visitors, dormitories, school activities, rental situations, and so much more to account for in a security solution, Goldsobel adds.
In a NAPCO Security Technologies’ white paper on school security, Jorge Hevia reports that since 1980 there have been 137 fatal school shootings that killed 297 victims. “The Sandy Hook Elementary School mass shooting in Newtown, Conn., created a watershed moment for public outcry, but unlike the reaction to 9/11, whereby a centralized, national, body of action, namely the Transportation Security Administration, was formed to address the problem, no such entity has been established. As a result, the enhancement of security and access control measure in schools across America, primarily at the K-12 level, has been disorganized, decentralized, [and] inefficient,” Hevia writes. The paper outlines the need for a national school security association, as well as the unification of the security industry, as well as the creation of the School Access Control Vulnerability Index™ (S.A.V.I.). The audit measures the efficacy of how well the total group of security systems and structures work together in blocking access to the school.
“We’re focused on getting information out there about good components to add on top of video as a security force multiplier,” Goldsobel says.
‘Hall Pass’ Feature Provides Peace of Mind for School Administrators
In a specific application deployed by Galaxy Control Systems, a school in Connecticut was looking for a better way to manage student traffic between a large number of portable classrooms being used while a new facility was constructed. One of the main concerns centered on children using restrooms and other facilities located in the main school building throughout the day. School administrators wanted a way to efficiently track student movements beyond issuing conventional written hall passes. The company developed a feature called “Hall Pass” that provides teachers with proximity devices they issue in lieu of conventional hall passes. Through the placement of access readers in the classrooms and at all entrances to the main school building, students are monitored with a predetermined amount of time to walk from their classroom to the building. If a student fails to report in the allocated time period, the system issues a general alert.
Changing Trends in Locks
In our college and university market we have seen the choice to move from magnetic stripe card technology to a more secure card technology transition from a small curiosity into an all-out race, reports David Barnard, RS2 Technologies. “This is driving a lot of business for us not only at the actual card reader level but also in the planned migration from off-line locksets on student dorm rooms to online or near online (in the case of locksets that are battery-powered, Wi-Fi) locksets in those campus dormitories. We expect to deploy almost half as many of those types of locksets just in 2014 as we have in the last five years!” Barnard says.
Educating School Administrators on Security Opportunities
Allegion, Dublin, Ireland, plans to keep school administrators abreast of technology and trends in school security via training courses, seminars and webinars. Dates and topics are listed on the Allegion website. Allegion also offers a free Building Security Site Assessment including a walk-through of the facility by an Allegion Security & Safety Advisor to survey the building’s doors, entries and access points. An assessment of the facility for Americans with Disabilities Act (ADA) accessibility; fire, life and safety compliance; and access control system viability is also available. For schools that need help identifying funding allocations, Allegion maintains a 24/7 cloud-based database of federal and state grant funding information.