Video Surveillance / Access Control Integration Guide

Author: Brian Rhodes, Published on Mar 12, 2012

One of the most desired high end security system features is integrating video surveillance and electronic access control systems. In this report, we detail the issues involved and the reasons why real world integrators choose to avoid or deploy such integrations.

Concept

The goal of integrating video management and access control system is to display critical information from both systems in a single interface. The most common integrated function is overlaying access control information on a live camera feed. Here are two examples of what this can look like:

While the layout varies by vendor, the goal is to make it easy for an operator to visually verify that the person entering is properly authorized (and not using someone else's card, etc.). The information commonly displayed include:

  • Date / Time of credential read
  • Name of credential holder
  • Unique ID number or badge number
  • Name of door or reader being accessed
  • Access Granted / Denied condition

The primary interface for monitoring can be the VMS or access control system, depending on the functionalities offered by each system. If it is the VMS, the access control system must sent events to the VMS to display. However, if the access control system is the main viewing interface, it must retrieve and display video from the VMS. A few vendors, like Genetec, NLSS and S2 are integrating both into a single software application but that is a distinct minority approach.

Typically when integrating two different vendor's systems, the end user must pay for licensing or custom integration. Most VMS and access control systems do not integrate 'out of the box', making integration either infeasible or requiring new software development (i.e. a custom integration using an API / SDK). Users must check for integration between the specific systems and versions they want integrated. If integrations are supported out of the box, it typically costs thousands of dollars. If it is not, it may cost tens of thousands of dollars for custom work.

Real World Usage

We recently asked 100 integrators 'What percentage of video surveillance systems you deploy are integrated with access control?' to gauge how frequently this integration takes place. Inside, we examine these responses and pull out some common themes for analysis.

*** ** *** **** ******* **** *** ******** ****** ******** is *********** ***** ************ *** ********** ****** ******* *******. ** this ******, ** ****** *** ****** ******** *** *** ******* why **** ***** *********** ****** ** ***** ** ****** **** integrations.

*******

*** **** ** *********** ***** ********** *** ****** ******* ****** is ** ******* ******** *********** **** **** ******* ** * single *********. *** **** ****** ********** ******** ** ********** ****** control *********** ** * **** ****** ****. **** *** *** examples ** **** **** *** **** ****:

***** *** ****** ****** ** ******, *** **** ** ** make ** **** *** ** ******** ** ******** ****** **** the ****** ******** ** ******** ********** (*** *** ***** ******* else's ****, ***.). *** *********** ******** ********* *******:

  • **** / **** ** ********** ****
  • **** ** ********** ******
  • ****** ** ****** ** ***** ******
  • **** ** **** ** ****** ***** ********
  • ****** ******* / ****** *********

*** ******* ********* *** ********** *** ** *** *** ** access ******* ******, ********* ** *** *************** ******* ** **** system. ** ** ** *** ***, *** ****** ******* ****** must **** ****** ** *** *** ** *******. *******, ** the ****** ******* ****** ** *** **** ******* *********, ** must ******** *** ******* ***** **** *** ***. * *** vendors, ***********,************ *********** **** **** * ****** ******** *********** *** **** is * ******** ******** ********.

********* **** *********** *** ********* ******'* *******, *** *** **** must *** *** ********* ** ****** ***********. **** *** *** access ******* ******* ** *** ********* '*** ** *** ***', making *********** ****** ********** ** ********* *** ******** *********** (*.*. a ****** *********** ***** ** *** / ***). ***** **** ***** *** *********** ******* *** ******** ****************** **** **** **********. ** ************ *** ********* *** ** the ***, ** ********* ***** ********* ** *******. ** ** is ***, ** *** **** **** ** ********* ** ******* for ****** ****.

Real ***** *****

** ******** ***** *** *********** '**** ********** ** ***** ************ systems *** ****** *** ********** **** ****** *******?' ** ***** how ********** **** *********** ***** *****. ******, ** ******* ***** ********* and **** *** **** ****** ****** *** ********.

[***************]

Key ********

*** ***** ***** ***** ******* ********** *****:

** *** ***** ************, ***** / ****** *********** ** ******* quite **** ** *** ********. *** ******* ******** **** **** 10 - **% ** *** ******* *** **********.

*******, *** **** ******* * ********** *** *** **** ****** they *** ** ********* ***** *** ******. *** ***** ***** shows * ***** ********* ** *********** *** ****** ********* ***** systems:

***** *********** *** ******* * ******* *** ****, ****** ***** integrate ****** *** *****, *********** *** ******* **** **** ** cameras *** ********** *** **** **** ****** ** ** **. Indeed, *********** ************ ** ***** ******** ********* ***** *** ****** about **% ** *** ****. **** ** ***** * ******** of *** ******* *** *** ****** **** *******.

********

******* ****** ******** ****** ********** *** *********** ** *** ********* video *** ******:

  • ***** *****: ********** ******* *** **** ** *******
  • ** ******: *** ***** ** *** *** *** **** ***********
  • *** *******: *********** ***** ******* *** *********
  • *** *** *******: ** ** *** **** ****** ******* *******

Lacks *****: ********** ******* *** **** ** *******

**** ****** ***** ** *** **** *********** ********. *** ********** and *********** ********* ** ***** *** ******* ** *** * problem *** **** *****. ********* ** *** *** *** ***** in ******** *** ***** *** **** ***********, *** *** ******* on *** ********** *** **** ** ********. 

  • "******* *** ********* ** ***'* ********* ** **** **** ********** in *** ******."
  • "** *** **** ** ** **** ****** *********** **** ****** we ** ******* ****** *******. ********* ***** *** ***** ********* out ***** *** **** *** ********* **** ********* *** ** date **** *** **** *** ****** *********’ ***** ** ******."
  • "*** ******* **** ******* *** *** ** ***** ***** ***** an ******** ******, ** ***** **** **'* **** ****** ** manually ******* *** **** ******* ** *** ****** ******* ***** logs."
  • "**** ***** ** ****** ******* ****** **** **** ** ***** surveillance *** ** **** ** *** ******** **** *** **** on ****** **** ***** ************ ******"
  • "** **** ***** ******** ** ** ** *** **** *** integrated **** *** ****** ******* ******* *******."
  • "********* ****** ****** * ******** ****** ******* ******"
  • "**** ** *********** ******* ******** ** *** ***** ** *** most ********* ****** **** **** ** ***** ** ****. ** an ***** **** ****** **** *** ****** **** ** *** time ** ****** ****** *** **** ** *** *****. **** integration ** ****** ****** ****** ************* (********, ******) ** ********** / ********** ******."
  • "****** *** * ******** *** *** **** *******. ********* *** or *** *****. ** ** **** ** * ******* ******."
  • "** ** **** ********. *** ******* ***** ****** ** *************** and *** ************* ** *** * *** ****** ******* ****** when *** *** *** ** ******* ****."

No ******: *** ***** ** *** *** *** **** ***********

****** ***** ******: ****** *** *********** ***** ******* ** ****. The **** ******** ** ********* ***** ******* ** *** ****** as * ******** *******, *** *** ***** *** *** ********** in ****** *** **. *** ******* *** **** ********* *** varied, **** ***** ******** ************ ** **** ********. *******, *** fact **** **** *** ***** ** *** ****** **** **** surveillance ********* ***** **** *** ********** ****** ** *********** ***** two ********* ** ** ********** ******* *** ****.

  • "* **** * ****, ** *** ****** ******** ** ** our *********, *** ********** *** **** ***** ***."
  • "**** *** *****, ** *** * ******* **** ********* ******** every **** ** *** ******, *****(****** *****, ******** *****, ***,) normally **** ** ****** ******* ***** **** ** ***** **** code."
  • "*****'* **** *** ** ******"
  • "*** ****** **** ********* ** *** (** ** **** ***** systems)"
  • "****...******* *** ***** **** **** ** ***** ********** *** ** the ******"
  • "*** ***** *** *** **** ** *** ***** ** ***********"
  • "**** ** *** ********* *** ***** ******** *********, *** ***** access *******"
  • "** **** *** **** **** ****** *** *** ********* *** not ******* **** ***** ** ********"
  • "**** **** ** **** ****** ****"
  • "*** **** ** ** ******* ******* **."
  • "*** ** ****** ******* *** *** ****** **** * *** market. * ** *** **** ***."
  • "********* ***** ** ****** *** ****** *******. **** **** **** out *****'* * **** **********, *** **** ***** ****** **** the ***** **"
  • "*** **** *** ***** **** **."
  • "*********** ***** *** ****** ******* ** ***** ******* ***** ** a **** ******, *** * ***'* ***** **** ********* *** up ***** **."

*** Complex: *********** ***** ******* *** *********

******* ****** ***** ********* **** *********** ***** *** ******* ********** complexity ****** ************ ** ********* **** ** **** *******.

  • "**'* **** ** ** **** *** ** *** ********** **** integration ******* **** *** ***."
  • "**** ******* **'* ********** *****'* **** ** ***** ****."
  • "** ******* ** *** ** *** ********** ***. ** **** are **** ***...**** *** ***** ********** **** **** **** ******** systems. ****'** ******* ******* *** ****** *** ***'* **** ** add **********"
  • "****'* ****** ******** ** ****** *** ******** ******* ** ****** and **** *******, ** **** ** **** *** ****** ** use."
  • "**** *** **** ********* ** ** *******. ******** ******* **** best."

*********** ***** **** * **** ** **************** ******* ******* ***** that ********** **** **** ** ** **** *****, *** ** worst *** ********.  *** ***** ***** **********, **** ** **** means ******** *** ********* *******. *** ************ ** ****** ************* between *** ********* ** ****** ** ********** *******.

Not *** *******: ** ** *** **** **** ****** ******* *******

**** ********** ********* **** ********** ****** ******* *** *** * core **********. ******* *** ***** *********** ********* ** ***** ******** systems, **** *** ******** *** ********* ***********. ******* ******* ** hanging **** ********, ******* ******* ** *****, *** *********** ****** control ******* *** ****** *** *** ****** **** **** ** video ************. 

  • "**** ** ***** ********** ****** ******* ** **** ** ********** with *** ***"
  • "**** ** ** **** ** **** *** ********* *** ****** opportunities."
  • "** *** **** ******** ** *** **** **** **********."
  • "** * ******* ** **** *** ******* ******** ** ****** control ***********."
  • "** *** *** ** *** ****** ******* ********."
  • "*** ******* *********** ** ******** ******* *** ** **** ** access ******* **** *** ****** **** ** ** ** ******** customer"
  • "** ***'* **** **** ****** ********"
  • "** *** ******* ********* ***** ***********"
  • "** **** *** **** ***** ******* ** **** ** ** would **** **"
  • "** ** *** ******* ****** *******."

**** ***** ********* ********* ******* *********** *** *** ****** ************ of ******* *********. *** *******,************ ********* *** *** ****** **** '******' ********** **** **** both ***** ********** ******* *** ****** *******. ***** ******** ****** to **** **** ** *** ******** **** **** *********** *** operating ***** ******* (******* **** *** *******), *** *** ******** remains ** ******** ** *** *** ****** **** ******* *** these ******** *******.

*********

* ***** ****** ** ********* **** ******** ******** ** **** concept, ******** **** *** *********** ** ************ ******* ** *** end ****. **** ******* ********* **** *** ****** ******** *********** when ********* *** **** *** **** ****** ******* *** ******** by *** ****** **** ***** ***** ************ ****.

  • "*********** **** ***** ******** ******* ** **** ****** *** ******* everyday. *** **** ** *********** **** ********** ******* ***** ** the ******* ******* *** ******** **** ***** "***** *** ***********" to *** ********."
  • "*** ********* **** *** ***** ******* **** ***** *****."
  • "*********** ******* *** *** ** ********* ** *****'* ******. ***** physical ******** *** ****** **** ** ** ** ****, ******* administration ** ***."
  • "** *** ** **********, *** ********** ******* ** *** ***** thought... ******* ** ***** ***** ** ******* ********* *************."
  • "************ ********* *** ** ***** ******** ********** ****** **** ********** different ******** ********."
  • "**** ** *** ***** ** ********** ** *** ***. **** helps ** ******* ******."
  • "**** **** **** ** *** ******** *** ******** ***** ************ and ****** ******* *************."
  • "* ***** ** ** **** ******** **** ** ***** ***** solutions ***** *** ******** *** ******** **** *** ****** *** integration ** ********. * ****** ** **** * *** **** integration **** **** **** **** ****."

**** ** *** ***** ********* **** ***** ** *********** *** also ******** **** ********* * ***** ****** ** ******* ** an ******* ******. ** **** **** ** ** ********* ****** of ************ **** ****. ********* **** ****** ****** ****** *** more ****** ** **** **** ********* ******** ************ **** ******* counterparts. ***** ********* *** **** ****** ** **** ******* ********* monitoring ***** ******* *** *** ********* ************ ****** ** *********** these ******* *** **** ****** ** ** ***********.

**********

*********** ** ********** **** ****** ******* ******* *** ****** ** remain * ***** *********** *** *** **** ******. ***** *** value ** **** *********** ******* **** ********, *** **** ** integration *****, ** ******* ****** *****, **** ************* **** ** valued ** * ****** ** ****** *** ***** *** *** integrators **** ******* ****.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Panasonic Unified Surveillance Strategy Analyzed on Nov 17, 2017
Panasonic is now a "Unified Surveillance" offering, as their ASIS 2017 booth proclaimed: Looking to make a comeback in the security industry,...
Isonas Cofounders Split, Launch Partner/Competitor on Nov 16, 2017
Breaking up is hard to do, especially when door access security is at stake. But that is exactly what has happened at Isonas. Senior employees...
PoE UPS Tested (Energy Reconnect) on Nov 15, 2017
In security, backup power is important, but most often requires UPS systems or extra cabling to devices for low voltage power. Now, some have...
Axis Commits To Long-Term Firmware Support on Nov 15, 2017
With the rise of cyber security awareness, and a general increase in hardware reliability, "software warranties" may prove more valuable than...
Hikvision NVR 4.0 Improvements Tested on Nov 14, 2017
Hikvision has released firmware version 4.0 for select NVRs, touting two years of research and development, and claiming "the new generation GUI...
Mobile Credentials (BLE / NFC / Apps) Guide on Nov 14, 2017
One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. In this guide,...
Long Range Access Control Readers Tutorial on Nov 10, 2017
One of the classic challenges for access control are parking lots and garages, where the user's credential is far from the reader. With modern...
Hikvision 4K IR PTZ Tested (DS-2DF8836IV-AELW) on Nov 10, 2017
The IR PTZ trend continues, now with 4K resolution, with Hikvision releasing its DS-2DF8836IVAEL-W camera, a 4K 1/1.9" PTZ model specifying 200m IR...
Selecting Access Control Readers Tutorial on Nov 09, 2017
Given the variety of types available, specifying access control readers can be a daunting process. However, focusing on a few key elements will...
Milestone XProtect Essential+ Free VMS Tested on Nov 09, 2017
Milestone continues to expand its aggressive free and low-cost offerings, with this year, Milestone releasing XProtect Essential+, part of their...

Most Recent Industry Reports

Panasonic Unified Surveillance Strategy Analyzed on Nov 17, 2017
Panasonic is now a "Unified Surveillance" offering, as their ASIS 2017 booth proclaimed: Looking to make a comeback in the security industry,...
Amazon Cloud Cam Is Poor (Tested) on Nov 17, 2017
Retail behemoth Amazon has entered the surveillance market with the Amazon Cloud Cam, the eyes of its just-announced Amazon Key delivery...
Nest Secure Alarm System Tested on Nov 16, 2017
Google's expansion continues, this time into home security with their Nest subsidiary's move into alarm systems. They paid more than a...
Dahua Forbes 'Next Web Crisis' Vulnerability Dispute on Nov 16, 2017
The buffer overflow vulnerability in Dahua products is not in dispute, in fact we covered it when it was first published. What is in dispute is...
Isonas Cofounders Split, Launch Partner/Competitor on Nov 16, 2017
Breaking up is hard to do, especially when door access security is at stake. But that is exactly what has happened at Isonas. Senior employees...
Hikvision China Criticizes The WSJ on Nov 15, 2017
Hikvision, through the Chinese government's authoritative news service, has criticized the WSJ investigation into Hikvision. In this...
PoE UPS Tested (Energy Reconnect) on Nov 15, 2017
In security, backup power is important, but most often requires UPS systems or extra cabling to devices for low voltage power. Now, some have...
Axis Commits To Long-Term Firmware Support on Nov 15, 2017
With the rise of cyber security awareness, and a general increase in hardware reliability, "software warranties" may prove more valuable than...
Hikvision NVR 4.0 Improvements Tested on Nov 14, 2017
Hikvision has released firmware version 4.0 for select NVRs, touting two years of research and development, and claiming "the new generation GUI...
Vivotek Remote Stack Overflow Vulnerability on Nov 14, 2017
A stack overflow vulnerability in Vivotek cameras has been discovered by bashis, the security researcher who has also found vulnerabilities in...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact