Security solutions should be about integration not isolation. Many organizations are considering their existing processes and systems and looking at how to leverage further value. Security is part of that focus and is a central component in the move towards a more integrated approach, which results in significant benefits. Gert Rohrmann, Technical Manager for the solutions division of Siemens Building Technologies UK, examines how by drawing data from a number of different sources and subsystems, including building automation, it is possible to move towards a truly smart environment.

For larger systems that can leverage existing IT network infrastructures, integration is an important factor. It makes sense to move away from a single discipline approach to one that views security in a more holistic way. This applies not only to the integration of different security functions, but also how security and safety can be integrated into general business processes. The market has moved significantly in connectivity terms, particularly with the development of open architecture.

New Physical Access Control Standards

Originally driven by the network video sector, the focus for the security industry has switched to the adoption and development of new physical access control standards with a push to build compliant devices. Open architecture continues to develop around the BACnet protocol, particularly in the building management systems environment, with a further drive towards standard protocols in the security arena led by industry forums such as ONVIF (Open Network Video Interface Forum) and PSIA (Physical Security Interoperability Alliance). Supporting customers to move away from proprietary communication protocols, providing software through cross-domain management and command and control solutions will become an increasing focus as the trend towards integration and standard IT solutions accelerates. Operational teams require intelligent and integrated management tools as the business environment becomes more complex.

The focus for the security industry
has switched to the adoption and
development of new physical
access control standards

Enterprise Resource Planning Software

Smart cards have the potential to enhance workplace security through the inclusion of authentication for accessing the IT network and applications, digital signature and email encryption, biometric data, printer access management and other ‘bolt on’ functionalities such as cashless vending. Increasingly, standardized and certified interfaces are being established with Enterprise Resource Planning software systems such as SAP and Human Resources, as well as facilities management. This ability to interface with data sources enables an automated process for identity management, including automatic assignment of access entitlements based on the individual’s role and responsibilities. The operational cost savings, increased data consistency and security that can be achieved is significant.

Enhanced Energy Efficiency

An important area of integration is to enhance energy efficiency and subsequent cost savings. Security has a vital role to play in this process as the security systems provide the information relating to the occupancy of a building. At its simplest, if the alarm detection or access control system knows that no-one is present in a given room, the heating, ventilating, lighting and air conditioning systems can be automatically adjusted to reflect the situation.

Fire safety systems such as fire detection and clean extinguishing still usually work in isolation
It is also possible to set building conditions based on the person that has entered


Furthermore, it is also possible to set the conditions based on the person that has entered a building, as the access control reader will know the identity of that individual and their role. An example would be lowering the temperature for cleaning staff, whose role is more physically active than that of an office worker carrying out more sedentary tasks for a longer period of the day.

Intrusion And Emergency Management

Another benefit of integrating security and building management systems is the ability to handle an emergency incident. In the event of an intrusion, the appropriate lighting and surveillance video cameras can be activated automatically, or in response to an emergency evacuation, wayfinding instructions can be set in motion to ensure safe exit.

Enhancing Fire Protection

Obtaining a return on investment is an important factor in implementing integrated management systems and capitalizing on synergies between core subsystems - such as security and fire safety protection, power, communications and building energy management – makes it possible to minimize or remove system overlaps, thereby saving money and improving manpower allocation.

It is common for security and fire safety systems to operate independently; however, deep integration across security and fire technologies will not only offer higher levels of performance from these areas, but also create a fully automated approach to task handling and incident management by extending cause and effect to include security within life safety systems.

Deeper integration will enable
identification and analysis of
unusual behaviour and facilitate
more proactive decisions

We are familiar with security subsystems such as CCTV, alarms, access control and perimeter protection working together to protect assets and restrict entry to specific areas; however, fire safety systems such as fire detection and clean extinguishing still usually work in isolation. Deeper integration will enable identification and analysis of unusual behavior and facilitate more proactive decisions.

By combining a wide variety of systems and creating a logical sequence, it is possible to limit potential damage. For example, in the event of fire, a workflow-oriented approach driven by security and safety devices would maximize protection across the site, as video surveillance cameras would verify the situation, ventilation systems would adjust to prevent smoke from spreading, escape routes would be activated and live messaging would alert relevant personnel and facilitate safe, orderly evacuation. The integration of these multiple technologies would enable a complete incident record to be collated and communication with the access control system would create an instant roll call of people on site.

Fully Integrated Security Installation

Siemens has installed a fully integrated fire, security and energy management solution at Sabiha Gökçen International Airport in Turkey.  This intelligent solution has been designed to deliver first-rate protection and maximum energy efficiency for the airport’s passengers, staff and assets and the general public.

The integration of security, fire safety and energy management means that all the disciplines are fully coordinated
The operator can view displays of alarms, messages and the status of all connected systems

The safety and security system required the installation of 200 video surveillance cameras and 28 digital recorders, and 9,000 Sinteso fire detectors combined with 400 carbon monoxide gas detectors, all fully integrated to provide maximum levels of protection. The operator can view displays of alarms, messages and the status of all connected systems and the modular architecture makes it both cost-effective and scalable. In the event of evacuation, an integrated voice notification system using 4,600 loudspeakers will be activated automatically.

Total Integrated Power System

To further enhance safety, a Total Integrated Power system enables power distribution from the medium voltage supply right through to the socket outlet, providing maximum control and improved protection, helping to detect any irregularities in the energy distribution system to prevent the possibility of a fire or power failure.

The solution has the flexibility
to adapt to changes in usage
and requirements and can be
expanded at any time in the future

Cost And Energy Efficient Systems

The Siemens Desigo building automation system measures 11,000 data points and reacts by raising blinds, turning off lights and reducing or increasing heating and air conditioning, thereby saving energy and ensuring a comfortable environment inside the terminal.

The integration of security, fire safety and energy management means that all the disciplines are fully coordinated to ensure that the airport buildings are safer, more comfortable, more efficient and economical. The solution has the flexibility to adapt to changes in usage and requirements and can be expanded at any time in the future, thus maximizing the value of the original investment.

Integrated And Automated Security Management

At a corporate level, successful integration contributes to the delivery of strategic and operational objectives and on a day-to-day level, provides a safe and efficient working environment, which is essential to the performance of any organization. Businesses are increasingly demanding technology that will assess and manage critical situations, distribute information and co-ordinate and manage resources. It is common for building systems to operate independently; however, deeper integration of building management with security technology will not only offer higher levels of performance and greater energy efficiencies, but also create a fully automated approach to task handling and incident management.

Download PDF version

Author profile

Gert Rohrmann Service and Solutions Portfolio Technical Manager, Siemens Building Technologies

In case you missed it

Highlighting The Importance Of Security Integrations And Alliances
Highlighting The Importance Of Security Integrations And Alliances

Most technology companies have one goal in mind: to provide customers with high-quality, affordable products that can efficiently help streamline operations. Whether it's surveillance cameras, video management software, access control technology or any other type of security device, today's leading organizations invest in expertise in these product segments and strive to produce the highest quality solutions. To effectively fulfill this task, technology providers are always searching for emerging components to make their products and services even stronger. Oftentimes, a key aspect necessary to build a comprehensively robust solution involves finding like-minded partners that share a common goal and are willing to work together to create an integration that increases insight and intelligence.The interoperability between systems, devices and different types of applications should be intuitive and fast Key Factors For Security Integrations A basic factor in a partnership is openness. For an integration to perform seamlessly for the end user, the platform through which the technologies converge must follow standard protocols, easily operate with other platforms, allow freedom and customization, and provide adaptability. The interoperability between systems, devices and different types of applications should be intuitive and fast, enabling more time to be spent on analyzing critical data and responding to security events. The puzzle of a complete security solution contains many pieces, and it's often necessary to fuse together aspects from various providers to create a best-in-breed technology offering. When organizations collaborate, the end result is a simplified solution with an increased level of value. As threats become more severe and complex, customers demand solutions that combine different security and business elements into a single interface that can address a wide variety of risks.  A unified security system requires a strong collaboration between technology providers and integrated solutions Interconnected Security Devices Users used to only look at specific security devices - such as cameras or door alarms - as each having a strong, autonomous purpose, but now, every device plays an important interconnected role. And the progression of the Internet of Things (IoT) has made this transition even easier, as maintaining a consistent and uniform communication and interconnectivity between devices has now become the norm. The IoT has also made it so that partnerships must not only exist between manufacturers, but also within the customer's organizational structure. Although exceptionally beneficial, the IoT brings with it an increased amount of cyber vulnerabilities. As security systems are networked to increase flexibility, the door is opened to a number of potential threats that could compromise the entire enterprise. This risk highlights the need for an internal partnership and knowledge sharing between a company's physical security professionals and its IT team. IT experts should be pulled into security decisions and positioned as collaborative partners to assist with software updates, data safety protocols and solving complex network challenges, ultimately leading to a more cyber secure solution.Partnerships are beneficial to both the companies involved and their customers Knowledge Sharing And Learning Aside from cybersecurity, the latest prominent security attacks and events have focused primarily on soft targets, such as schools, concerts or shopping malls. This has caused many technology providers to venture into different vertical markets, and strong partnerships streamline this crossover. Innovators can extend their geographic reach and purpose through integrations with other like-minded manufacturers or integrators to add new levels of functionalities. Of course, a partnership cannot operate properly and to the best of its ability without a core component: learning. In today's evolving business and risk environment, knowledge is critical. A shared knowledge base can open up new opportunities and lead to the strengthening of security across many levels. A truly powerful, unified security system requires a strong collaboration between technology providers and integrated solutions. Partnerships are beneficial to both the companies involved and their customers, and the results created through these alliances can reach far beyond a user's expectations, offering enhanced flexibility and extensive safety options.

What Are The Security Challenges Of The Hospitality Market?
What Are The Security Challenges Of The Hospitality Market?

Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?

How SecuriThings Boosts Cybersecurity Across Multiple IoT Devices
How SecuriThings Boosts Cybersecurity Across Multiple IoT Devices

As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorized access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a challenge, and the fragmented structure of the video surveillance market contributes to that challenge. A variety of companies are involved in manufacturing, integrating, installing and operating video systems, and cybersecurity threats can enter the picture at any stage. “It’s not always clear who is responsible,” says Yotam Gutman, vice president of marketing for SecuriThings, a cybersecurity company. “However, the only entities who can ensure cybersecurity are the security integrator and the service provider. They will bear the financial pain and are willing to pay for cybersecurity. An extra $1 or $2 per camera per month is not expensive.” SecuriThings’ “lightweight software agent” runs in the background of video cameras, sending information to an analytics system in the cloud IoT Device Security Management At the recent IFSEC trade show in London, SecuriThings unveiled its IoT Device Security Management (IDSM) approach to enable integrators to ensure cybersecurity. Founded in 2015, the company has around 20 employees in Tel Aviv, Israel, and operates a sales office in New York City. SecuriThings’ “lightweight software agent” runs in the background of video cameras, collecting metadata on camera processes and connections and sending information back to an analytics system in the cloud. Drag-and-drop deployment enables a camera to begin generating data within seconds and requiring only two mouse clicks. The cloud system analyzes data, pinpoints abnormalities, identifies new users, detects multiple entry attempts and tracks other camera processes to identify any cyberattacks. It monitors all devices, gateways, users and APIs to detect threats in real-time and mitigate the threats based on a pre-determined security policy. Machine learning tools also analyze more subtle activities that can indicate insider abuse. For example, a user support center can identify if cameras are being accessed improperly by employees, thus preventing insider abuse. Certified Vendor Agnostic Software SecuriThings is working with camera manufacturers and video management system (VMS) manufacturers to certify operation of its software agents with various camera models and systems. Working through integrators, such as Johnson Controls, is the fastest route to market, SecuriThings has determined. The system can be added after the fact to existing installations for immediate monitoring and remediation, or it can easily be incorporated into new systems as they are launched. “We have a strong sales team in the United States focusing on bringing the technology to more local and national integrators,” says Gutman. Certification ensures SecuriThings’ software agent can be installed in most modern camera models without negatively impacting operation; the software is vendor agnostic. Another eventual route to market is to work with camera manufacturers to install the SecuriThings software agent in cameras at the factory. In this scenario, the system can easily be “clicked on” when cameras are installed. The SecuriThings cloud system generates a dashboard that tracks system activities to identify any cybersecurity threats IoT Security Operations Center SecuriThings operation is transparent to the VMS, and the company works with VMS manufacturers to ensure the code operates seamlessly with their systems. Cloud analytics generate a dashboard that tracks system activities, and/or a managed service monitors the system and notifies customers if there is a problem. “We monitor it from our IoT Security Operations Center, a fully managed service that ensures the real-time detection and mitigation of IoT cyber-threats,” says Gutman. “We found that end-customers don’t have the manpower to monitor the system, so our experts can guide them.”Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable" A benefit for camera manufacturers is the ability of a system like SecuriThings to “level the playing field” on issues of cybersecurity, says Gutman. The approach provides a higher level of cybersecurity confidence for integrators and users, including those using cameras that have previously had cybersecurity problems such as “back door” access. SecuriThings has certified its software for use with Hikvision cameras and is in the process of certifying with Dahua, says Gutman. “Western manufacturers say their products are more secure, but we can help all camera manufacturers prove that they are just as secure,” says Gutman. “Integrators and users can log into a device and see all the activity.” Securing Connected Devices From Cyber Threats Beyond video, SecuriThings’ products target the full range of connected devices in the Internet of Things (IoT). The SecuriThings security solution enables real-time visibility and control of IoT devices deployed in massive numbers in smart cities, physical security, building automation, home entertainment and more. Video surveillance is an early focus because of market need, an opportunity to gain traction, and the critical nature of security applications. But the challenges are much broader than video surveillance. “We are seeing similar risks to other devices,” says Gutman. “Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable. If you can disable the access control system, you can cause a lot of problems.” Other connected devices that could be at risk include building automation and heating and cooling (HVAC) systems.