Security system interoperability: are we there yet?

Woman on computer - interoperability

Share this content

Facebook
Twitter
LinkedIn

True interoperability means putting customers in charge of deciding which manufacturer best meets their needs, says Hans Kahler, COO of Eagle Eye Networks.

What is interoperability?

Take a poll at ISC West or GSX and I’d bet that most manufacturers, integrators and security directors would agree that “interoperability” of security systems is a good idea.

Access control systems should work with security cameras and tying in an intrusion alarm system should be easy too.

But what is “interoperability”? Historically the “interoperable security system” was synonymous with an end-to-end system from a single manufacturer.

Purchase XYZ manufacturer’s access control system and XYZ’s security cameras and XYZ’s intrusion system, and it could all work together.

There’s one caveat: the security system components are only interoperable if you stick with one manufacturer’s products.

It’s great in theory, but the reality is that getting locked into an end-to-end system is designed to benefit only one party – the manufacturer.

A truly interoperable system puts the customer in charge of deciding which product best meets their needs.

There are additional benefits to the truly interoperable system including cybersecurity, customization and a future-proof system.

Why end-to-end is not the end-all-be-all

End-to-end systems are closed systems that limit the capabilities, life cycle and value of the security system.

A one-manufacturer system is unlikely to have the right solution for every end user.

While one vendor may be really good at making cameras, they’re unlikely to also be the industry-leader in intrusion systems.

An end-to-end system will not allow a business to add a different access control system, a new alarm device or even a different camera manufacturer.

As a result, the business owner is stuck with a substandard system.

In some cases, an end-to-end system may actually cease working if a business customer decides they want to move to another manufacturer.

That means the initial investment in the security system is entirely lost.

Even if the customer is satisfied with their system on day one, business needs naturally change over time as the business grows and new technologies are added or acquisitions are made.

For example, a retail outlet will not be able to change its point-of-sale (POS) system or add a specialty Internet of Things (IoT) sensor if these systems are made by a different manufacturer.

This leaves the security integrator and end user in a situation where they have to rip-and-replace their system to make improvements or adjustments.

Recognizing these problems, back in the early 2000s security integrators, end users and a growing number of manufacturers started demanding ways to integrate disparate systems to achieve true interoperability.

A major milestone

The founding of ONVIF (Open Network Video Interface Forum) was a major milestone in our industry.

In 2008, three major security camera manufacturers, Axis Communications, Bosch Security Systems and Sony Corporation came together to create ONVIF “to provide and promote standardized interfaces for effective interoperability of IP-based physical security products and services.”

This was a notable moment where world-leading camera manufacturers – all competitors – realized that a common protocol that allowed all camera brands to communicate with a video management system (VMS) would not hinder them in any way.

On the contrary, it would help them and their customers.

ONVIF interoperability freed the camera manufacturers to compete on more lucrative technology investments such as developing imaging, lenses and analytics.

In September of this year, ONVIF celebrated achieving 30,000 ONVIF-conformant products.

What true interoperability looks like

For all the progress that ONVIF represents, there is much more to do before our industry achieves true interoperability.

In addition to working with ONVIF, manufacturers need to be able to create tight integrations with other third-party technology providers.

An open application programming interface (API) offers end users numerous benefits including: access to valuable analytics; seamless integrations with other applications, such as POS systems and building management systems (BMS); the ability to easily innovate; flexibility to pick and choose the specific technology they want and need; and, the ability to make the most of legacy technology investments.

Importantly, an API should be public and available on a manufacturer’s website.

Inexplicably, it’s still common for some security manufacturers to require an NDA for companies to access their API.

This limits the reseller’s and the development community’s ability to innovate and serve business owners.

Slow, steady progress

Despite the slow pace, we’re making progress toward interoperability in the security industry. Why is that?

One reason is that many businesses are in a position to upgrade their security systems in the next few years.

With some hindsight, they realize the limitations of closed end-to-end systems.

Especially if they’re having to rip-and-replace a security system, they’re now looking for guarantees that their investment will be the basis for a security system that lasts decades instead of years.

Resellers and security integrators are also beginning to understand that a manufacturer with an open API gives them a competitive advantage.

It gives their customer versatility and flexibility to have more tailored solutions.

For those business owners who want to have – or try out – cutting-edge technology, an open API makes that possible.

Resellers also realize that an open system means unlimited integrations with third-party technologies.

Each additional technology will increase customer satisfaction while also adding a new revenue stream of RMR for the security integrator.

The ability to integrate new technologies can also help resellers win new projects that they wouldn’t otherwise get.

With open APIs and true interoperability in place, the reseller and the end user customer are the winners.

The reseller has the flexibility to provide solutions that customers want.

The end user gets best-of-breed components aligned with their business goals and their budget, as well as the ability to adjust and improve their security system as new technology emerges and as their business grows.

About the author

Hans Kahler is Chief Operating Officer at Eagle Eye Networks, where he oversees a wide range of critical functions, including engineering, technical support, professional services, quality assurance, Eagle Eye University, compliance and IT.

He ensures operations run smoothly and efficiently, driving innovation and excellence across all departments.

This article was originally published in the November edition of Security Journal Americas. To read your FREE digital edition, click here.

Newsletter
Receive the latest breaking news straight to your inbox