Download PDF version Contact company

To say that the security industry draws people in and demonstrates its value in terms of relationship building with the caliber of people who comprise the industry is an understatement, as Bart Williams, President of Security Solutions and Communications, Inc. (Security Solutions) found out.

Founder of Security Solutions

Williams chose to become an engineer as his profession, but he began dabbling in the security industry part time, soon to discover it would lead him on the path to becoming State Senator in the US State of Mississippi.

I started Security Solutions in 1993. I was an engineer at the time and just started [it as a] part time business,” explains Bart Williams, adding “And, for five years, it was part time, but in 1998, I made the jump to do it full time.

Value of ESA membership

Bart Williams describes the value of ESA membership in one word, ‘networking’

Since then, for the last 22 years, Williams has grown his company, currently employing approximately 22 people, and successfully serving the folks of Northern Mississippi.

As a member of Electronic Security Association (ESA), he describes the value of ESA membership in one word, ‘networking’. “I mean, there are 20 things, but in a word, if I had to pick one thing, its networking. I’ve gotten to meet professionals from all across this country. We interact; we share horror stories; we help each other. ESA is a melting pot of that,” said Bart Williams.

In fact, it was the power of networking or as he puts it, “looking people in the eye” that Williams believes empowered him to come out on top of the Mississippi State Senator election.

Entry into MAA and US Politics

It was in 2009 that Williams was elected secretary of the Mississippi Alarm Association (MAA). “That was my entree into associations and started the path that brought me to running for Senate,” he says.

From secretary, Williams was appointed the Legislative Chair of the MMA in 2012 and a year later, they produced a bill that would require licensure in the State of Mississippi to install security systems.

Law requiring license to install security systems

Most states had it, we didn’t, so we thought the need was there,” Williams said enthusiastically, adding “And the bill was killed in about 30 minutes from one of the big corporate telecom companies.

First we met with AT&T and we found out where there heartburn was"

Having the pleasure to speak with Williams, becoming more and more intrigued by the minute with his story, he said, “Yeah, we thought we really had this great thing going!” With determination and perseverance to do what was right for his home state and the people of Mississippi, Williams and the legislative committee did not give up. Instead, they acted.

The next year, our legislative committee, there’s about four or five of us, we went around meeting,” said Williams, adding “First we met with AT&T and we found out where there heartburn was. It wasn’t anything important to us, so we were able to work out a deal with them on the bill and they became a proponent of it. We also met with other people we thought might be in opposition, legislators, attorneys, everyone we could think of to ‘sell our bill,’ so to speak and make sure we were all aligned.

Senate passes Mississippi State bill

Talk about some serious hustle and it was not for naught. In 2014, the Senate passed the bill unanimously, while the House of Representatives only had one person who did not vote for it. So, Williams and his team were successful in getting that bill created and turned into law for the State of Mississippi. This process grew Williams’ appetite for politics even more, because for him, it is all about the good of the people.

It [passing the bill] was good for the citizens of the state of Mississippi,” Williams stated, adding “That whole process intrigued me and that is where the desire first came about to run for office.

Path to becoming Mississippi State Senator

In June 2020, running for the Mississippi State Senate became real when Jerry Jackson, the current State Senator, retired out of term due to health reasons. (Jackson was the legislator who helped Williams and his team gets their bill passed in 2014.)

The campaign lasted three and a half months and was very intense

I sat there and spent about a day and a half,” reminisces Williams, stating “I talked to my wife, of course, and my family, my business and the good Lord and I didn’t get any opposition so we threw our name in the hat and went through with our campaign.

The campaign lasted three and a half months and was very intense. Williams said, “I worked harder than I have in a long time for something, maybe ever [he chuckles] but we got there.

Hard and well-thought-out campaigning

When the race started, there were four people, and the Williams’ campaign was not frontrunner. There was a lady who was well-known and political, and Williams felt she would probably be the one to come out ahead. This motivated him.

I thought, ‘well, if we’re not going to win, it’s not going to be because we’re not going to try,” Williams stated.

Power of Networking

This is where the power of networking came into play. Williams did all the ‘typical’ campaign practices, advertising and using the advice of a consultant, but he believes going door to door pushed his campaign over the edge in favor of the eyes of the people.

The ‘ground game,’ we call it looking people in their eyes, going door-to-door, and seeing people and meeting people,” he said, adding “We knocked on thousands of doors; this district has a population of 55,000 people. I think that’s what did it for us. We worked extremely hard; had a village; and we came out victorious.

Moving forward

I want to truly represent the people of District 15, which is the district I won in and to be their voice in the legislature"

When asked what he hopes to accomplish in office as Senator, Williams didn’t answer with his laid-out agenda. Instead, he is all about serving the people by allowing their voice to be heard.

I want to truly represent the people of District 15, which is the district I won in and to be their voice in the legislature,” explains Williams, further stating “A lot of people feel like their voice is lost, when someone gets elected, they just kind of become a part of the ‘machine.’ I don’t want to become part of the machine.

Being the voice of the people

Williams’ goal in Senate is profoundly simple, he adds “They [the people] want to be heard on the issues that are important to them, and that’s what I plan on doing.” To others, Williams offers an important piece of advice, “Get involved and stay involved.

Williams sets the example of involvement by not only being a member of ESA, but serving on ESA’s Financial Committee as well, now in addition to being Mississippi State Senator. Williams concludes, “Angela White asked me to serve and I said, ‘yes ma’am!’ I’m a numbers guy; I like numbers, quite simply.

Williams’ journey teaches that even the largest of industries are a lot smaller than initially perceived, so vital to Williams’ success has been networking and serving, getting involved and staying involved.

Download PDF version Download PDF version

In case you missed it

Cutting Through The Hype: AI And ML For The Security Space
Cutting Through The Hype: AI And ML For The Security Space

Today’s organizations face numerous diverse threats to their people, places and property, sometimes simultaneously. Security leaders now know all too well how a pandemic can cripple a company’s ability to produce goods and services, or force production facilities to shut down, disrupting business continuity. For example, a category three hurricane barreling towards the Gulf of Mexico could disable the supplier’s facilities, disrupt the supply chain and put unexpected pressure on an unprepared local power grid. Delivering timely critical information Tracking such risk is hard enough, but managing it is even more difficult. A swift response depends on delivering the right information to the right people, at the right time. And, it’s not as easy as it sounds. Indeed, 61 percent of large enterprises say critical information came too late for them, in order to mitigate the impact of a crisis, according to Aberdeen Research (Aberdeen Strategy & Research). These challenges are accelerating the hype around Artificial Intelligence (AI) These challenges are accelerating the hype around Artificial Intelligence (AI). The technology promises to help us discover new insights, predict the future and take over tasks that are now handled by humans. Maybe even cure cancer. Accelerating the hype around AI But is AI really living up to all this hype? Can it really help security professionals mitigate risk? After all, there’s a serious need for technology to provide fast answers to even faster-moving issues, given the proliferation of data and the speed at which chaos can impact operations. Risk managers face three major obstacles to ensuring business continuity and minimizing disruptions. These include: Data fatigue - Simply put, there’s too much data for human analysts to process in a timely manner. By 2025, the infosphere is expected to produce millions of words per day. At that pace, you’d need an army of analysts to monitor, summarize and correlate the information to your impacted locations, before you can communicate instructions. It’s a herculean task, made even more difficult, when we consider that 30 percent of this global datasphere is expected to be consumed in real time, according to IDC. Relevance and impact - Monitoring the flood of information is simply the first hurdle. Understanding its impact is the second. When a heat dome is predicted to cover the entire U.S. Pacific Northwest, risk managers must understand the specifics. Will it be more or less hot near their facilities? Do they know what steps local utilities are taking to protect the power grid? Such questions can’t be answered by a single system. Communication - Once you know which facilities are impacted and what actions to take, you need to let your employees know. If the event is urgent, an active shooter or an earthquake, do you have a fast, effective way to reach these employees? It’s not as simple as broadcasting a company-wide alert. The real question is, do you have the ability to pinpoint the location of your employees and not just those working on various floor in the office, but also those who are working from home? How AI and ML cut through the noise Although Artificial Intelligence can help us automate simple tasks, such as alert us to breaking news, it requires several Machine Learning systems to deliver actionable risk intelligence. Machine Learning is a branch of AI that uses algorithms to find hidden insights in data, without being programmed where to look or what to conclude. More than 90 percent of risk intelligence problems use supervised learning, a Machine Learning approach defined by its use of labeled datasets. The benefit of supervised learning is that it layers several pre-vetted datasets, in order to deliver context-driven AI The benefit of supervised learning is that it layers several pre-vetted datasets, in order to deliver context-driven AI. Reading the sources, it can determine the category, time and location, and cluster this information into a single event. As a result, it can correlate verified events to the location of the people and assets, and notify in real time. It’s faster, more customized and more accurate than simple Artificial Intelligence, based on a single source of data. Real-world actionable risk intelligence How does this work in the real world? One telecommunications company uses AI and ML to protect a mobile workforce, dispersed across several regions. An AI-powered risk intelligence solution provides their decision makers with real-time visibility into the security of facilities, logistics and personnel movements. Machine Learning filters out the noise of irrelevant critical event data, allowing their security teams to focus only on information specific to a defined area of interest. As a result, they’re able to make informed, proactive decisions and rapidly alert employees who are on the move. Four must-have AI capabilities To gain real actionable risk intelligence, an AI solution should support four key capabilities: A focus on sourcing quality over quantity. There are tens of thousands of sources that provide information about emerging threats - news coverage, weather services, social media, FBI intelligence and so much more. Select feeds that are trusted, relevant and pertinent to your operations. Swift delivery of relevant intelligence. To reduce the mean-time-to-recovery (MTTR), risk managers need an accurate understanding of what’s happening. Consider the different contextual meanings of the phrases ‘a flood of people in the park’ and ‘the park is at risk due to a flood’. Machine Learning continuously increases the speed of data analysis and improves interpretation. Ability to cross-reference external events with internal data. As it scans different data sources, an AI engine can help you fine-tune your understanding of what’s happening and where. It will pick up contextual clues and map them to your facilities automatically, so you know immediately what your response should be. Ready-to-go communications. Long before a threat emerges, you can create and store distribution, and message templates, as well as test your critical communications system. Handling these tasks well in advance means you can launch an alert at a moment’s notice. The ability to minimize disruptions and ensure business continuity depends on speed, relevance and usability. AI and ML aren’t simply hype. Instead, they’re vital tools that make it possible for security professionals to cut through the noise faster and protect their people, places and property.

What Career Opportunities Await The Next Generation In Security?
What Career Opportunities Await The Next Generation In Security?

A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labor pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?

Video Surveillance As A Service (VSaaS) From Integrator And User Perspective
Video Surveillance As A Service (VSaaS) From Integrator And User Perspective

Technology based on the cloud has become a popular trend. Most IT systems now operate within the cloud or offer cloud capabilities, and video surveillance is no exception: virtually every major hardware and software vendor offers cloud-based services. Users benefit from the cloud due to its numerous advantages, such as ease of implementation, scalability, low maintenance costs, etc. Video surveillance as a service (VSaaS) offers many choices, so there is an optimal solution for each user. However, what about integrators? For them, VSaaS is also a game-changer. Integrators are now incentivized to think about how they can maintain their markets and take advantage of the new business opportunities that the cloud model provides. Hosted video surveillance The cloud service model has drastically changed the role of an integrator. Traditionally, integrators provided a variety of services including system installation, support, and maintenance, as well as served as a bridge between vendors and end-users. In contrast, hosted video surveillance as a service requires a security system installer to simply install cameras and connect them to the network, while the provider is in direct contact with each end-user. The cloud service model has drastically changed the role of an integrator There is no end to on-premises systems. However, the percentage of systems where the integrator’s role is eliminated or considerably reduced will continue to increase. How can integrators sustain their markets and stay profitable? A prospective business model might be to become a provider of VSaaS (‘cloud integrator’) in partnership with software platform vendors. Cloud-Based surveillance Some VMS vendors offer software VSaaS platforms that form the basis for cloud-based surveillance systems. Using these solutions, a data center operator, integrator, or telecom service provider can design a public VSaaS or VSaaS in a private cloud to service a large customer. The infrastructure can be built on any generic cloud platform or data center, as well as resources owned by the provider or client. So, VSaaS providers have the choice between renting infrastructure from a public cloud service like Amazon Web Services, Microsoft Azure, or Google Cloud or using their own or clients’ computing infrastructure (virtual machines or physical servers). Gaining competitive advantage When integrators purchase commitment use contracts for several years, they can achieve significant savings As an example, a telecom carrier could deploy VSaaS on their own infrastructure to expand their service offering for clients, gaining a competitive advantage and enhancing profits per user. Using a public cloud, a smaller integrator can host the computing infrastructure immediately, without incurring up-front costs and with no need to maintain the system. These cloud services provide scalability, security, and reliability with zero initial investment. When integrators purchase commitment use contracts for several years, they can achieve significant savings. Next, let’s examine VSaaS options available in the market from an end-users point of view. With hosted (or cloud-first, or true-cloud) VSaaS solutions, all the video feeds are transmitted directly from cameras to the cloud. Optionally, video can be buffered to SD cards installed on cameras to prevent data losses in case of Internet connection failures. Dedicated hardware bridges Service providers may offer dedicated hardware bridges for buffering video footage There are many providers of such services that offer their own brand cameras. Connecting these devices to the cloud should only take a few clicks. Firmware updates are usually centralized, so users don’t have to worry about security breaches. Service providers may offer dedicated hardware bridges for buffering video footage and secure connections to the cloud for their branded and third-party cameras. Typical bridges are inexpensive, basic NVRs that receive video feeds from cameras, record on HDD, and send video streams to the cloud. The most feature-rich bridges include those with video analytics, data encryption, etc. Introducing a bridge or NVR makes the system hybrid, with videos stored both locally and in the cloud. At the other end of the spectrum relative to hosted VSaaS, there are cloud-managed systems. Video management software In this case, video is stored on-site on DVRs, NVRs, video management software servers, or even locally on cameras, with an option of storing short portions of footage (like alarm videos) in the cloud for quick access. A cloud service can be used for remote viewing live video feeds and recorded footage, as well as for system configuration and health monitoring. Cloud management services often come bundled with security cameras, NVRs, and video management software, whereas other VSaaS generally require subscriptions. Keep in mind that the system, in this case, remains on-premises, and the advantages of the cloud are limited to remote monitoring and configuring. It’s a good choice for businesses that are spread across several locations or branches, especially if they have systems in place at each site. On-Site infrastructure All that needs to be changed is the NVRs or VMS with a cloud-compatible model or version All locations and devices can be remotely monitored using the cloud while keeping most of the existing on-site infrastructure. All that needs to be changed is the NVRs or VMS with a cloud-compatible model or version. Other methods are more costly and/or require more resources to implement. Hosted VSaaS helps leverage the cloud for the highest number of benefits in terms of cost and technological advantages. In this case, the on-site infrastructure consists of only IP cameras and network equipment. This reduces maintenance costs substantially and also sets the foundation for another advantage of VSaaS: extreme and rapid scalability. At the same time, the outgoing connection at each site is critical for hosted VSaaS. Video quality and the number of cameras directly depend on bandwidth. Broadband-Connected locations Because the system does not work offline, a stable connection is required to stream videos. In addition, cloud storage can be expensive when many cameras are involved, or when video archives are retained for an extended period. The hosted VSaaS is a great choice for a small broadband-connected location The hosted VSaaS is a great choice for small broadband-connected locations and is also the most efficient way to centralize video surveillance for multiple sites of the same type, provided they do not have a legacy system. Since it is easy to implement and maintain, this cloud technology is especially popular in countries with high labor costs. Using different software and hardware platforms, integrators can implement various types of VSaaS solutions. Quick remote access For those who adhere to the classic on-premises approach, adding a cloud-based monitoring service can grow their value proposition for clients with out-of-the-box capabilities of quick remote access to multiple widely dispersed sites and devices. For small true-cloud setups, there is a possibility to rent a virtual machine and storage capacity in a public cloud (such as Amazon, Google, or Microsoft) and deploy the cloud-based VMS server that can handle dozens of cameras. In terms of features, such a system may include anything from plain video monitoring via a web interface to GPU-accelerated AI video analytics and smart search in recorded footage, depending on the particular software platform. Optimizing internet connection Hybrid VSaaS is the most flexible approach that enables tailoring the system to the users’ needs High-scale installations, such as VSaaS for public use or large private systems for major clients, involve multiple parts like a virtual VMS server cluster, web portal, report subsystem, etc. Such systems can also utilize either own or rented infrastructure. Some vendors offer software for complex installations of this kind, though there are not as many options as for cloud-managed systems. Finally, hybrid VSaaS is the most flexible approach that enables tailoring the system to the users’ unique needs while optimizing internet connection bandwidth, cloud storage costs, and infrastructure complexity. It’s high time for integrators to gain experience, choose the right hardware and software, and explore different ways of building systems that will suit evolving customer demands in the future.