Access Control Integration Statistics 2016

By: Brian Rhodes, Published on Dec 13, 2016

When it comes to connecting access control with other security systems, integrator survey results clearly show it is not common for most.  However, when they are integrated, the brands being integrated make a big difference.

We look deeper at survey results and integrator color comments inside.

Response Breakdowns

We asked integrators:

"What percentage of your access systems are integrated with another security system? Which other systems are most commonly integrated?"

Here is the breakdown of those percentages:

**** ** ***** ** connecting ****** ******* **** other ******** *******, ********** survey ******* ******* **** it ** *** ****** for ****.  *******, **** they *** **********, *** brands ***** ********** **** a *** **********.

** **** ****** ** survey ******* *** ********** color ******** ******.

Response **********

** ***** ***********:

"**** ********** ** **** access ******* *** ********** with ******* ******** ******? Which ***** ******* *** most ******** **********?"

**** ** *** ********* of ***** ***********:

[***************]

*** ******* ********* **** access ** ********** **** another ****** ** ***** low.

Median **. **** **********

*** **** ** ********** systems ** ~**%, **** the ****** ****** ***** considering *********** *** ******* more ****** ********* **** doors **** **** ******* than ***** *** ** not ******* **** ****** control ** ***** *** target ******* ******** ***** integration ** **** **** likely ** ** ********* or ******.

Integration ************, ** ** ***

**** ****** ******* *** used ** ********** *******, even ** **** **** the ******* ** ********* of ********** **** ***** platforms.

** **** *****, *** price ** ********** ****** to ********* **** ** multiple ******* ** *** high *** ***-***** **** ******** after ******** *** ****:

  • "**** **** *%, **** is * *** ******."
  • "****, **** ***'* * request *** **."
  • "**** **** **%, ** mostly ******* ** ******** management, ** **** ** not **** ***********."
  • "**** **** **% ** our ****** ******* ******* are ***** ********** **** other *******."
  • "*%...*****'* ****** **** *****."
  • "*% - **** ****** integration **** ********* ** surveillance *******."

Video ***********, ******* ****** **** ******

**** ************ ** *****, access ******* ** **** often ******** **** ***** surveillance *** *******/********* ******:

  • "* ***** *** of *** ******* *** integrated. ** **** ***'* a ******* **** ** requested. **** ******** ** is *** ****** ******."
  • "**% ** **** *** integrated **** ********* *** 50% **** ***** ******"
  • "**** ***%, **** *** become *** ******** - integrated **** ****."
  • "**** ****** *********** ** VMS. ******* ** ****** most ******. **% ** the ******* *** ***** integrated. ********* "****" ***********, but ** ******** **** prefer ** *** *** systems **********."
  • "**** **********, *** ******** are ******* ********** **** burg ** ****** *******."
  • "**** ******* *** ********** with **** *** ***** surveillance."

***** ******** *** *** surprising, ** ****** ******* clearly ******** **** ****** video ******* ** **** events, *** ****** ******* events *** ********** ***** close ********** ** ********* alarm.

New **. ******** ****** ***********

*** ****** ** *********** made ***** ** ********* was *** *** ********** that ******** ******* *** integrated ** * ******** basis, *** ****** **** integration ******* ** ** performed ** *** ****** of *** ************ ****:

  • "*** ******* ***** **% old ******* ** ******** almost *"
  • "*****, **-**% ** *** systems ** ******** *** integrated, *** ****** ** 80% ** *** ******* are ********* ********** **** other *******."
  • "** *****'* ******** ******** systems, **'** ****** ***** integrate **** ****."

Mini-PSIM ******** *********** **** ********

** *** ********* ******** higher **** ******* *********** rates, *** ******** ***** 'Mini-PSIM' *********, ** ***** with ******* ********** *****-********** applications *** ** *** box, **** **** ******** used.

*** ****** ********* ************ among **** ***** ******** ************************, *** ***** *** ****** ******** ******* access *** ***** ****** the **** *********, ** who **** ********* '*******' offerings **** ***** ******* to **** ***-********** *** factory ********* ************:

  • "****** *** ** *** systems *** **********, ** primarily **** ******* ** it ** **** *** us ** *** ***-********** jobs."
  • "* ***** ***** ** 75% *** * ******* this ****** **** ******** over ****. ** ********* integrate **** ********* *** more ******** ** *** seeing ** ******** ** video ***********. ****** ******* of *** *******/***** ***** that *** **** ***** since **** ********* *****"
  • "***%. ** **** *** products **** ** ****."
  • "**% ***** ** * completely ********** ******** *** access ******."
  • "**% ********** **** *********"
  • "** ** ****** ** integrated ******* * **** and **** *** *** Genetec."

Comments (6)

This is echoed in my design and consulting experience. Many of the older systems we work on are not integrated. Our clients typically express that this is because at the time of design and installation the purchasing, programming, and maintenance of PLCs and network communications was complicated and expensive. Increasingly, however, as the security industry is influenced more and more by dedicated professionals and the average client's understanding and expectations of technology grows these integrations become more attainable, affordable, and necessary. Additionally, the data and evidence these integrations provide can be analysed by many different business management systems (to use an extremely general term for a broad number of systems that benefit from PSI), further increasing the ROI.

My firm's practice is to specify as many integrations as possible. Intrusion detection system, PSIM, building management, fire and life safety systems, VSS and access system integration provides 'defense in depth' by improving the response time, decision making and effectiveness of responders. Additionally, from an investigations standpoint the coordinated nature of physical protection system reports can be important in the resolution and give veracity to those reports in litigation.

Many of our projects rely heavily on highly engineered security communications systems, and many projects with high levels of integration require PLCs. While this level of design may be too costly for small to medium enterprises, it should be a budgetary priority to create basic integrations, particularly when much of the configuration work is done by a VMS or ACMS. After all, if at the end of the day the systems the client ends up with don't provide a high return on investment, it'll be hard to get them to increase future security system expenditures (that includes maintenance and service agreements). Security integrations provide security metrics and those metrics have a tremendous impact on future investments in security.

Not only do integrations provide greater return on investment to our client's, it presents an opportunity to continue helping your clients and customers meet their needs.

For all, PLC = Programmable Logic Controllers

Many of our projects rely heavily on highly engineered security communications systems, and many projects with high levels of integration require PLCs

Michael, thanks for the comment!

I am curious why PLCs are used. Granted, really all an electronic access system does is use specialized PLC-like components and software to do a specific job (unlock doors), but developing the basic access management software seems like it would be a bear.

In other words, buying an access product is buying a car, while using PLCs seems more like buying car parts and then assembling it manually.

What sort of PLCs are used? Allen-Bradley? Siemens?

You're absolutely right, Brian and full disclosure, I am a security veteran, but an engineering novice. I get A LOT of help with my designs from the engineers here that help me determine the parts and smarts of what I program. So that's my caveat to my engineering being spotty at times in future comments, although my knowledge of security principles is usually pretty solid! My comments came more from my practitioner side than my engineering side.

That being said, my experience has been, if the system we are designing is small to medium and includes only a VSS and ACS typically we can find a way for one of those system's to make the integration. Typically we'll use a PLC when we have higher level integrations that we're trying to make where we have components from various systems sending outputs, but none of those component's management systems are able to analyze all those signals in a unified way. Most commonly these are corrections applications, but sometimes there just isn't "an app for that" when you are trying to customize a security solution (to state the obvious). PLCs come in handy there, to help us manage outputs and system responses.

Brian,

Do you find any regional variations in these data? For example, it seems that in Europe you see a lot more Access / Intrusion integration than you see in N. America.

I confirm. Here in Europe, access control is more and more tied to intrusion systems and VMS. So that when the last person leaves premises, intrusion can be automatically turned on, and even lighting and energy can be turned off.
This is good for security and energy savings.

Frazao, you imply "occupancy count" is in standard use in the region.  If even one person tailgates out of the building, the occupancy count will never go to zero.  What measures do you normally see in place to address this?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Directory of 68 Video Surveillance Startups on Sep 18, 2019
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known. 2019...
Fingerprints for Access Control Guide on Sep 09, 2019
Users can lose badges, but they never misplace a finger, right? The most common biometric used in access are fingerprints, and it has become one...
Assa Acquires LifeSafety Power on Sep 04, 2019
Assa Abloy is acquiring LifeSafety Power, adding to their growing collection of access control brands like Mercury, August, Pioneer Doors, and...
Mobile Access Control Guide on Aug 28, 2019
One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. But how does this...
Security Integrators Outlook On Remaining Integrators In 2025 on Aug 22, 2019
The industry has changed substantially in the last decade, with the rise of IP cameras and the race to the bottom. Indeed, more changes may be...
ZK Teco Atlas Access Control Tested on Aug 20, 2019
Who needs access specialists? China-based ZKTeco claims its newest access panel 'makes it very easy for anyone to learn and install access control...
Suprema Biometric Mass Leak Examined on Aug 19, 2019
While Suprema is rarely discussed even within the physical security market, the South Korean biometrics manufacturer made global news this past...
Biometrics Usage Statistics 2019 on Aug 13, 2019
Biometrics are commonly used in phones, but how frequently are they used for access? 150+ integrators told us how often they use biometrics,...
ProdataKey (PDK) Access Company Profile on Aug 09, 2019
Utah based ProdataKey touts low cost cloud access, wireless controllers, and no dealer required national distribution availability. But how does...
Axis Door Station A8207-VE Tested on Aug 07, 2019
Axis newest door station, the A8207-VE, claims to deliver "video surveillance, two-way communication, and access control" in a single device. But...

Most Recent Industry Reports

Open Access Controller Guide (Axis, HID, Isonas, Mercury) on Sep 19, 2019
In the access control market, there are many software platforms, but only a few companies that make non-proprietary door controllers. Recently,...
Axis Perimeter Defender Improves, Yet Worse Than Dahua and Wyze on Sep 19, 2019
While Axis Perimeter Defender analytics improved from our 2018 testing, the market has improved much faster, with much less expensive offerings...
Directory of 68 Video Surveillance Startups on Sep 18, 2019
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known. 2019...
Uniview Prime Series 4K Camera Tested on Sep 18, 2019
Is the new Uniview 'Prime' better than the more expensive existing Uniview 'Pro'? In August, IPVM tested Uniview 4K 'Pro' but members advocated...
US Army Base To Buy Banned Honeywell Surveillance on Sep 17, 2019
The U.S. Army's Fort Gordon, home to their Cyber Center of Excellence, has issued a solicitation to purchase Honeywell products that are US...
Vivotek "Neural Network-Powered Detection Engine" Analytics Tested on Sep 17, 2019
Vivotek has released "a neural network-powered detection engine", named Smart Motion Detection, claiming that "swaying vegetation, vehicles passing...
Schmode is Back, Aims To Turn Boulder AI Into Giant on Sep 16, 2019
One of the most influential and controversial executives in the past decade is back. Bryan Schmode ascended and drove the hypergrowth of Avigilon...
Manufacturers Unhappy With Weak ASIS GSX 2019 And 2020 Shift on Sep 16, 2019
Manufacturers were generally unhappy with ASIS GSX, both for weak 2019 booth traffic and a scheduling shift for the 2020 show, according to a new...
How Cobalt Robotics May Disrupt Security on Sep 13, 2019
While security robots have largely become a joke over the last few years, one organization, Cobalt Robotics, has raised $50+ million from top US...
Panasonic 4K Camera Tested (WV-S2570L) on Sep 13, 2019
Panasonic has released their latest generation 4K dome, the WV-S2570L, claiming "Extreme image quality allows evidence to be captured even under...