Access Control Integration Statistics 2016

By: Brian Rhodes, Published on Dec 13, 2016

When it comes to connecting access control with other security systems, integrator survey results clearly show it is not common for most.  However, when they are integrated, the brands being integrated make a big difference.

We look deeper at survey results and integrator color comments inside.

Response Breakdowns

We asked integrators:

"What percentage of your access systems are integrated with another security system? Which other systems are most commonly integrated?"

Here is the breakdown of those percentages:

**** ** ***** ** connecting ****** ******* **** other ******** *******, ********** survey ******* ******* **** it ** *** ****** for ****.  *******, **** they *** **********, *** brands ***** ********** **** a *** **********.

** **** ****** ** survey ******* *** ********** color ******** ******.

Response **********

** ***** ***********:

"**** ********** ** **** access ******* *** ********** with ******* ******** ******? Which ***** ******* *** most ******** **********?"

**** ** *** ********* of ***** ***********:

[***************]

*** ******* ********* **** access ** ********** **** another ****** ** ***** low.

Median **. **** **********

*** **** ** ********** systems ** ~**%, **** the ****** ****** ***** considering *********** *** ******* more ****** ********* **** doors **** **** ******* than ***** *** ** not ******* **** ****** control ** ***** *** target ******* ******** ***** integration ** **** **** likely ** ** ********* or ******.

Integration ************, ** ** ***

**** ****** ******* *** used ** ********** *******, even ** **** **** the ******* ** ********* of ********** **** ***** platforms.

** **** *****, *** price ** ********** ****** to ********* **** ** multiple ******* ** *** high *** ***-***** **** ******** after ******** *** ****:

  • "**** **** *%, **** is * *** ******."
  • "****, **** ***'* * request *** **."
  • "**** **** **%, ** mostly ******* ** ******** management, ** **** ** not **** ***********."
  • "**** **** **% ** our ****** ******* ******* are ***** ********** **** other *******."
  • "*%...*****'* ****** **** *****."
  • "*% - **** ****** integration **** ********* ** surveillance *******."

Video ***********, ******* ****** **** ******

**** ************ ** *****, access ******* ** **** often ******** **** ***** surveillance *** *******/********* ******:

  • "* ***** *** of *** ******* *** integrated. ** **** ***'* a ******* **** ** requested. **** ******** ** is *** ****** ******."
  • "**% ** **** *** integrated **** ********* *** 50% **** ***** ******"
  • "**** ***%, **** *** become *** ******** - integrated **** ****."
  • "**** ****** *********** ** VMS. ******* ** ****** most ******. **% ** the ******* *** ***** integrated. ********* "****" ***********, but ** ******** **** prefer ** *** *** systems **********."
  • "**** **********, *** ******** are ******* ********** **** burg ** ****** *******."
  • "**** ******* *** ********** with **** *** ***** surveillance."

***** ******** *** *** surprising, ** ****** ******* clearly ******** **** ****** video ******* ** **** events, *** ****** ******* events *** ********** ***** close ********** ** ********* alarm.

New **. ******** ****** ***********

*** ****** ** *********** made ***** ** ********* was *** *** ********** that ******** ******* *** integrated ** * ******** basis, *** ****** **** integration ******* ** ** performed ** *** ****** of *** ************ ****:

  • "*** ******* ***** **% old ******* ** ******** almost *"
  • "*****, **-**% ** *** systems ** ******** *** integrated, *** ****** ** 80% ** *** ******* are ********* ********** **** other *******."
  • "** *****'* ******** ******** systems, **'** ****** ***** integrate **** ****."

Mini-PSIM ******** *********** **** ********

** *** ********* ******** higher **** ******* *********** rates, *** ******** ***** 'Mini-PSIM' *********, ** ***** with ******* ********** *****-********** applications *** ** *** box, **** **** ******** used.

*** ****** ********* ************ among **** ***** ******** ************************, *** ***** *** ****** ******** ******* access *** ***** ****** the **** *********, ** who **** ********* '*******' offerings **** ***** ******* to **** ***-********** *** factory ********* ************:

  • "****** *** ** *** systems *** **********, ** primarily **** ******* ** it ** **** *** us ** *** ***-********** jobs."
  • "* ***** ***** ** 75% *** * ******* this ****** **** ******** over ****. ** ********* integrate **** ********* *** more ******** ** *** seeing ** ******** ** video ***********. ****** ******* of *** *******/***** ***** that *** **** ***** since **** ********* *****"
  • "***%. ** **** *** products **** ** ****."
  • "**% ***** ** * completely ********** ******** *** access ******."
  • "**% ********** **** *********"
  • "** ** ****** ** integrated ******* * **** and **** *** *** Genetec."

Comments (6)

This is echoed in my design and consulting experience. Many of the older systems we work on are not integrated. Our clients typically express that this is because at the time of design and installation the purchasing, programming, and maintenance of PLCs and network communications was complicated and expensive. Increasingly, however, as the security industry is influenced more and more by dedicated professionals and the average client's understanding and expectations of technology grows these integrations become more attainable, affordable, and necessary. Additionally, the data and evidence these integrations provide can be analysed by many different business management systems (to use an extremely general term for a broad number of systems that benefit from PSI), further increasing the ROI.

My firm's practice is to specify as many integrations as possible. Intrusion detection system, PSIM, building management, fire and life safety systems, VSS and access system integration provides 'defense in depth' by improving the response time, decision making and effectiveness of responders. Additionally, from an investigations standpoint the coordinated nature of physical protection system reports can be important in the resolution and give veracity to those reports in litigation.

Many of our projects rely heavily on highly engineered security communications systems, and many projects with high levels of integration require PLCs. While this level of design may be too costly for small to medium enterprises, it should be a budgetary priority to create basic integrations, particularly when much of the configuration work is done by a VMS or ACMS. After all, if at the end of the day the systems the client ends up with don't provide a high return on investment, it'll be hard to get them to increase future security system expenditures (that includes maintenance and service agreements). Security integrations provide security metrics and those metrics have a tremendous impact on future investments in security.

Not only do integrations provide greater return on investment to our client's, it presents an opportunity to continue helping your clients and customers meet their needs.

For all, PLC = Programmable Logic Controllers

Many of our projects rely heavily on highly engineered security communications systems, and many projects with high levels of integration require PLCs

Michael, thanks for the comment!

I am curious why PLCs are used. Granted, really all an electronic access system does is use specialized PLC-like components and software to do a specific job (unlock doors), but developing the basic access management software seems like it would be a bear.

In other words, buying an access product is buying a car, while using PLCs seems more like buying car parts and then assembling it manually.

What sort of PLCs are used? Allen-Bradley? Siemens?

You're absolutely right, Brian and full disclosure, I am a security veteran, but an engineering novice. I get A LOT of help with my designs from the engineers here that help me determine the parts and smarts of what I program. So that's my caveat to my engineering being spotty at times in future comments, although my knowledge of security principles is usually pretty solid! My comments came more from my practitioner side than my engineering side.

That being said, my experience has been, if the system we are designing is small to medium and includes only a VSS and ACS typically we can find a way for one of those system's to make the integration. Typically we'll use a PLC when we have higher level integrations that we're trying to make where we have components from various systems sending outputs, but none of those component's management systems are able to analyze all those signals in a unified way. Most commonly these are corrections applications, but sometimes there just isn't "an app for that" when you are trying to customize a security solution (to state the obvious). PLCs come in handy there, to help us manage outputs and system responses.

Brian,

Do you find any regional variations in these data? For example, it seems that in Europe you see a lot more Access / Intrusion integration than you see in N. America.

I confirm. Here in Europe, access control is more and more tied to intrusion systems and VMS. So that when the last person leaves premises, intrusion can be automatically turned on, and even lighting and energy can be turned off.
This is good for security and energy savings.

Frazao, you imply "occupancy count" is in standard use in the region.  If even one person tailgates out of the building, the occupancy count will never go to zero.  What measures do you normally see in place to address this?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Genetec Favorability Report 2019 on Jan 25, 2019
Genetec's favorability moderately strengthed, in new IPVM integrator statistics over their results from 2017, with 2019 results showing solid, but...
Prysm PSIM Profile on Mar 05, 2019
A decade ago, PSIM promised significant potential but has always suffered from significant problems. Now, a number of PSIMs have either gone out of...
Genetec Declares "Lead With Synergis" Access Control on Mar 04, 2019
Genetec started with and is best known for its video management software. However, the company is now imploring its partners to lead with Synergis,...
Lenel Favorability Results 2019 on Mar 26, 2019
The positive news for Lenel is that integrators do not dislike them as much as they used to.  The negative news for Lenel is that integrators...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Genetec Synergis Cloud Link - Complex, Costly and Confusing on Jun 18, 2019
Genetec's Synergis Cloud Link is complex, costly and confusing compared to competitor access control architectures. Inside this note, we examine...
Poor OSDP Usage Statistics 2019 on Jul 09, 2019
OSDP certainly offers advantages over decades-old Wiegand (see our OSDP Access Control Guide) but new IPVM statistics show that usage of OSDP, even...
Mobile Access Usage Statistics 2019 on Jul 18, 2019
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new...
Biometrics Usage Statistics 2019 on Aug 13, 2019
Biometrics are commonly used in phones, but how frequently are they used for access? 150+ integrators told us how often they use biometrics,...
Open vs End-to-End Systems: Integrator Statistics 2019 on Nov 11, 2019
Preference for open systems is on the decline, according to new IPVM statistics. We asked integrators: For video surveillance systems, do you...

Most Recent Industry Reports

Every VMS Will Become a VSaaS on Feb 21, 2020
VMS is ending. Soon every VMS will be a VSaaS. Competitive dynamics will be redrawn. What does this mean? VMS Historically...
Video Surveillance 101 Course - Last Chance on Feb 20, 2020
This is the last chance to join IPVM's first Video Surveillance 101 course, designed to help those new to the industry to quickly understand the...
Vulnerability Directory For Access Credentials on Feb 20, 2020
Knowing which access credentials are insecure can be difficult to see, especially because most look and feel the same. Even insecure 125 kHz...
AI/Smart Camera Tutorial on Feb 20, 2020
Cameras with video analytics, sometimes called 'Smart' camera or 'AI' cameras, etc. are one of the most promising growth areas of video...
China Manufacturer Suffers Coronavirus Scare on Feb 20, 2020
Uniview suffered a significant health scare last week after one of its employees reported a fever and initially tested positive for coronavirus....
Cheap Camera Problems at Night on Feb 19, 2020
Cheap cameras generally have problems at night, despite the common perception that integrated IR makes cameras mostly the same, according to new...
Milestone Launches Multiple Cloud Solutions on Feb 18, 2020
Milestone is going to the cloud, becoming one of the last prominent VMSes to do so. Milestone is clearly late but how competitive do these new...
Video Surveillance Architecture 101 on Feb 18, 2020
Video surveillance can be designed and deployed in a number of ways. This 101 examines the most common options and architectures used in...
UK Stands Behind Hikvision But Controversy Continues on Feb 18, 2020
Hikvision is exhibiting at a UK government conference for law enforcement, provoking controversy from the press, politicians, and activists due to...
IronYun AI Analytics Tested on Feb 17, 2020
Taiwan startup IronYun has raised tens of millions for its "mission to be the leading Artificial Intelligence, big data video software as a service...