Software is key in the integration world of access control
More sophisticated access control systems, along with the convergence of physical security with other corporate functions such as building controls and human resources data bases that use the corporate IT network, has sparked continued evolution in access control-related software.
In his view, said Rudy Prokupets, chief technology officer and vice president-research and development for Lenel Systems International, customers are looking for seamless integration, open architecture and integration between electronic, or physical, security and IT security.
And within that framework, he said, it is a must that a companyÃ¢â‚¬â„¢s human resources or active directory have the ability to exchange data with the access control system so companyÃ¢â‚¬â„¢s Ã¢â‚¬Å“can enable and disable accounts seamlessly.Ã¢â‚¬Â Beyond that, he said, customers are looking to create links with other systems ranging from fire and life safety to building automation to network management.
One trend to the next
The first trend was to integrate everything (related to access control) into one console, noted Rob Zivney, vice president-marketing for Hirsch Electronics. Ã¢â‚¬Å“Now the trend is to integrate security into the rest of the building systems,Ã¢â‚¬Â he said.
Ã¢â‚¬Å“In the past,Ã¢â‚¬Â said Paul Piccolomini, general manager at Software House, Ã¢â‚¬Å“we could deliver a product that could run on a proprietary system. But we canÃ¢â‚¬â„¢t do that now.Ã¢â‚¬Â The need to work within a companyÃ¢â‚¬â„¢s IT infrastructure has changed the dynamic, he said, from a security-only function to a system Ã¢â‚¬Å“that integrates as many third-party products as possible.Ã¢â‚¬Â
Depending on a companyÃ¢â‚¬â„¢s size and needs, the access control system can range from Ã¢â‚¬Å“pretty fundamentalÃ¢â‚¬Â to highly sophisticated, noted Jerry Cordasco, vice president and general manager of Compass Technologies.
The small access control user, he said, Ã¢â‚¬Å“wants simplicity of use, so administration (of the system) doesnÃ¢â‚¬â„¢t become a nightmare.Ã¢â‚¬Â As a result, Cordasco explained, Ã¢â‚¬Å“the software has to be intuitive.Ã¢â‚¬Â
Larger customers, such as Compass TechnologiesÃ¢â‚¬â„¢ college and university clients, seek solutions that put multiple functions on one access control card, whether itÃ¢â‚¬â„¢s a smart card or a more basic card technology such as proximity or mag stripe.
What a one-card solution requires, he said, is database interface so information can easily flow from access control used for dorms and laboratories to other systems such as debit usage in college cafeterias and bookstores.
Ã¢â‚¬Å“ItÃ¢â‚¬â„¢s absolutely critical that the system can function on the (IT) network and infrastructure and co-exist with other systems,Ã¢â‚¬Â Cordasco said.
With one card providing so many different levels of access, the number of transactions occurring within the network can be huge, he said. For those providing software solutions, the question to ask is: Ã¢â‚¬Å“Is your software capable of handling incremental transactions? This is where people fall down on scalability,Ã¢â‚¬Â he said.
ItÃ¢â‚¬â„¢s about moving data
Ultimately, Cordasco said, Ã¢â‚¬Å“access control software has to be designed to effectively and efficiently move data. When traffic or transactions increase, you canÃ¢â‚¬â„¢t have the system fall apart.Ã¢â‚¬Â
Joe Schuler, senior vice president-sales and marketing for ImageWare, agreed that sophistication and integration are requiring software to be flexible and serve a variety of needs.
Ã¢â‚¬Å“WeÃ¢â‚¬â„¢re seeing more and more use of biometrics (in access control),Ã¢â‚¬Â he said, which requires software to support it. (See related story.)
Another influencing factor, he said, is the convergence ofÃ‚Â humanÃ‚Â resources, security and IT. While these functions are still generally dealt with separately, Schuler said, Ã¢â‚¬Å“they are increasingly coming together to work off a common access card.Ã¢â‚¬Â
In fact, he said, Ã¢â‚¬Å“a high-tech card can be the common link between systems,Ã¢â‚¬Â similar to how ATM cards provided the link among proprietary electronic banking systems.
Making use of existing infrastructure is important, said Pat Young, vice president and general manager Ã¢â‚¬â€œ fire and security solutions for Johnson Controls.
Ã¢â‚¬Å“Customers need to maximize the value of their security solution, using every piece of hardware that they have to minimize additional investments,Ã¢â‚¬Â Young said. Ã¢â‚¬Å“They need to be able to maximize the use of legacy systems, thus old technologies for card readers are advanced as hybrid solutions,Ã¢â‚¬Â Young said.
Also critical, Young noted, is integrating CCTV infrastructure.
Bringing it all together
Beyond the challenge of integrating different vendorsÃ¢â‚¬â„¢ products is the need to unite the security and IT departments.
ItÃ¢â‚¬â„¢s a new paradigm for the industry, said Prokupets. As security becomes more important, so too does the convergence of physical security and IT. He said Lenel has focused on providing a solution that integrates the two spaces Ã¢â‚¬Å“so it can be managed from one point.Ã¢â‚¬Â Because of this, he said, companies are looking for an individual who understands physical security, but also has IT skills.
Ã¢â‚¬Å“A person can break through a physical door, but also through a firewall, so the (security) function has to be unified. You canÃ¢â‚¬â„¢t forget about one side or the other,Ã¢â‚¬Â Prokupets said.
Piccolomini said the days of separate security administration and IT teams within a company are disappearing. Ã¢â‚¬Å“We see it merging closer together, with IT and physical security having more of an alliance,Ã¢â‚¬Â he said.
Because of integration both within an end userÃ¢â‚¬â„¢s company and among systems, Piccolomini said the industry is seeing a trend toward Ã¢â‚¬Å“opennessÃ¢â‚¬Â as well as the development of industrywide standards.
Ã¢â‚¬Å“When a customer makes an investment, they want the product to follow industry standards,Ã¢â‚¬Â he said.
Ã¢â‚¬Å“The customer is buying it as a system, and wants it to work end-to-end, turnkey,Ã¢â‚¬Â said Zivney of Hirsch Electronics.
Much of the emphasis on interopera-bility, said David Hawkins, business development manager for Software House, Ã¢â‚¬Å“comes from the IT world because it has to sit on their network.Ã¢â‚¬Â What results, he said, Ã¢â‚¬Å“is the communications between access control systems is better because it ties back to IT.Ã¢â‚¬Â
The higher level of sophistication within the access control market, said Zivney, Ã¢â‚¬Å“isnÃ¢â‚¬â„¢t changing what you do, but how you do it.Ã¢â‚¬Â
Today, he said, Ã¢â‚¬Å“we are dealing more with software to software interface.Ã¢â‚¬Â To achieve this, Zivney said, Ã¢â‚¬Å“it takes a higher level of resources, a higher level of skills.Ã¢â‚¬Â
Zivney said the advent of XML, which he called Ã¢â‚¬Å“the universal way to describe data,Ã¢â‚¬Â will make data sharing even simpler down the road.
Ã¢â‚¬Å“There are very strong things happening outside our industry that are pushing us in that direction,Ã¢â‚¬Â he said of XML. One of those is the government, which is beginning to specify that projects use XML for two-way communication, he said.
Ã¢â‚¬Å“What excites me about it,Ã¢â‚¬Â Zivney said, Ã¢â‚¬Å“is you donÃ¢â‚¬â„¢t have to do dozens of interfaces for CCTV, burglar alarmsÃ¢â‚¬Â and other systems.
XML is a standard, Prokupets added, Ã¢â‚¬Å“and every time there is a standard that aids interoperability.Ã¢â‚¬Â What XML will bring to the equation, he said, Ã¢â‚¬Å“is the ability to exchange data in a standard way between different applications.Ã¢â‚¬Â
While Zivney said those on the IT side of company Ã¢â‚¬Å“will have no problem with XMLÃ¢â‚¬Â he acknowledged some on the security side may struggle at first.
Ã¢â‚¬Å“WeÃ¢â‚¬â„¢ll see a forking in the road,Ã¢â‚¬Â he said, with higher level security dealers and installers embracing the changes, while others Ã¢â‚¬Å“try to do sophisticated systems without making the commitment.Ã¢â‚¬Â
the Security knowledge
Although IT departments have a perceived edge with understanding and handling networking and integration, PiccolominiÃ‚Â and Hawkins both warned against letting the IT sector take over all physical security-related functions.
Businesses that have been in security a long time have a level of sophistication that isnÃ¢â‚¬â„¢t easy to replicate, explained Piccolomini.
Ã¢â‚¬Å“We have had conversations with IT directors and they want to own everything,Ã¢â‚¬Â said Hawkins. But he said end users shouldnÃ¢â‚¬â„¢t let IT dominate Ã¢â‚¬Å“because they wonÃ¢â‚¬â„¢t necessarily know when and why to put something (security-related) into place.Ã¢â‚¬Â
Compass TechnologiesÃ¢â‚¬â„¢ Cordasco agreed. Ã¢â‚¬Å“IT people donÃ¢â‚¬â„¢t understand the access control world. They think they know security because they know IT security, but that doesnÃ¢â‚¬â„¢t give them the expertise in physical security.Ã¢â‚¬Â
Cordasco said a security director, engineer or integrator still need to play a critical role. Ã¢â‚¬Å“IT just doesnÃ¢â‚¬â„¢t know enough about physical security to ask the right questions,Ã¢â‚¬Â he said.
What is needed for dealers and integrators, said Piccolomini is training on the front end and alignment with IT within the organization.
Schuler said who takes the lead depends on which system Ã¢â‚¬Å“drives the action.Ã¢â‚¬Â
Ã¢â‚¬Å“If we look at an area where physical security is of paramount importance, then itÃ¢â‚¬â„¢s likely to the be the purview of security,Ã¢â‚¬Â he said.
But going forward, he said, Ã¢â‚¬Å“mostly weÃ¢â‚¬â„¢ll see HR, IT and security presenting a united front.Ã¢â‚¬Â
Prokupets said the software developer can also act as the liaison with the customer and the integrator by helping to design and configure the system.
Because security is a Ã¢â‚¬Å“hot issue,Ã¢â‚¬Â Young of Johnson Controls predicted more software developers will enter the market, but pointed out that Ã¢â‚¬Å“security requires a significant knowledge base to be successful. Many have tried and failed,Ã¢â‚¬Â Young said. Ã¢â‚¬Å“However, the trend suggest more will enter the market as development tools become easier to use and the time to market decreases.Ã¢â‚¬Â
Young said what separates companies is the Ã¢â‚¬Å“delivery mechanism.Ã¢â‚¬Â
Ã¢â‚¬Å“That team has to have a broad knowledge base and the skill set to design, project engineer, install, service and maintain a complex system,Ã¢â‚¬Â said Young. Ã¢â‚¬Å“The ability to deliver complex solutions efficiently is the most critical component.Ã¢â‚¬Â