The advent of truly integrated security management (ISM) marks a significant watershed for the security industry. In some sectors the trend is already well advanced. If similar growth is replicated in the UK, the implications for our own industry are enormous.
What level of understanding of integrated security management (ISM) actually exists among today's customer base? What impact will it have regarding the future direction of electronic security in the UK, and what are the likely implications for today's in-house security managers and their teams?

On the face of it, the concept of ISM is quite simple: combining the data from two or more previously independent devices – for example CCTV cameras and access control readers – onto one software application with one database using an existing IT network as host.

As the name suggests, these systems have been specifically designed to integrate and manage a site's entire array of electronic security systems including (in some cases) point monitoring of building management sensors such as heating or cooling system alarms or even basic lift controls. All of this is performed via a front-end software package – or Graphical User Interface – from one platform. Previously, each system required its own panel and cabling, operating in isolation.

Unlike 'traditional' electronic security products, the software programme adds intelligence to (and simplifies the management of) the information received from the control panel. The software combines the data from every device, sorts and interprets it and effectively re-presents it to the user in a way that allows much greater efficiency.

As each device is connected to the IT infrastructure using common protocols, not only can the security manager remotely monitor the data that device is collecting, but they can also perform many administrative and maintenance functions without the need for being present at each location.

Enhancing security provision
The concept of ISM brings with it a number of clear advantages, not least of which is the ability to further enhance site security by virtue of greater control. By running access control, intruder alarm and CCTV systems as one, it's possible to maximise security in ways not previously possible.

For example, unoccupied areas can remain fully alarmed and incident reporting may show combined access control, intruder and CCTV event logs for any person entering a site. Even the performance of patrolling security officers can be monitored by requiring them to 'clock-in' at specified locations within defined windows – the so-called 'guard tour functionality'. In addition, security information can be merged with other measurement data to provide a more detailed and accurate picture of any given site's integrity.

Managing security across multi-sites or large buildings can often be a frustrating business... Repeated user errors and false alarms. Temporary staff and contractors needing access cards. Simultaneous incidents at opposite ends of the site. Deciphering barely legible ticker-tape reports from incompatible systems. Co-ordinating engineer call-outs from a range of legacy service providers... Just some of the headaches encountered by security managers. However, ISM provides the catalyst for change.

In essence, a single database allows centralised card management, so as soon as an employee leaves the company, they are instantly denied access to all buildings even if they've kept their card. By combining access control and intruder functions, ISM ensures that employees are unable to inadvertently set off the alarm as they arrive in the morning.

If a sensor activates an alarm, on-screen site maps can show at-a-glance CCTV images of that zone. The alarm may be remotely re-set, thereby saving a trip or an unnecessary engineer call-out. And so the benefits to the end user continue.

Research into those companies who have adopted an ISM strategy globally indicates that some are benefiting from significantly lower security costs. Savings are made as soon as the system is installed, for example by avoiding further control panels and cabling labour costs for each system added (ie 'scalability'). The real savings have been found in operational efficiency. Reduced false alarm rates, simplified maintenance, reduced servicing costs, centralised card control and lower training expenditure are the main examples of note.

Overcoming initial scepticism
As with any new concept, there are a number of objections that have to be overcome – from both a practical and also the less tangible cultural perspective – if the true advantages of ISM are to be realised.

The principal disadvantage of ISM (or at least the one that's most often quoted) centres on the reliability and ownership of the IT network, and to a somewhat lesser extent on the worry about the upheaval in an organisation as the old wiring is replaced with network cabling (within existing buildings).

Another disadvantage is that performing maintenance on a shared system requires pre-planning and a level of inter-departmental diplomacy not required by stand-alone systems. Similarly, sourcing partners to install and maintain integrated systems (particularly if national coverage is required) can be a challenge as installers retrain and forge alliances with new suppliers, or remain ignorant of the ISM concept altogether.

It may also mean the limitation of choice to fewer suppliers offering integrated services and so reduce a customer's freedom of choice. In some industries, such as utilities, the broad availability of many local suppliers to install and maintain systems is important in providing security to a large number of remote sites.

Furthermore, lead times can be considerably longer than is common with traditional security projects due to longer testing periods, multiple approvals and consensus from varying departments with differing goals and commitments. The old system will need to be maintained while the new one is installed.

Evolution proceeds apace
Nonethless, over the past five years a number of factors have combined to create a suitable environment for security integration.

The overwhelming catalyst for mass-market integration has been the continuing fall in the cost of microprocessors. An integrated security system requires a significant processing engine and memory to perform effectively. Until recently the cost of manufacturing a system of this type restricted the market to the top 5% of corporate hq customers. With chip cost in freefall during the late 1990s, all of a sudden sophisticated security management systems have been made readily available to the more price-sensitive commercial and industrial marketplaces.

Another key driver in facilitating integration is a common infrastructure and, to this end, corporate IT networks are proving ideal. The IT industry has fast realised that not only can infrastructure investment be maximised by bringing many other devices – such as telephony and security – onto these networks, but that the installation and communication costs associated with the traditional cabling of third party devices would be saved.

Not too long ago, even if security products could be plugged into the company network, the data traffic they generated (particularly from CCTV images) would have seriously affected the performance of the network. Recent advances in bandwidth, though, coupled with sophisticated networking hardware and the reduced cost of sending data have meant that security and telephony can now be accommodated without adversely affecting the performance of typical IT traffic.

IT and facilities move in
As security devices are becoming more software-driven and being integrated onto the IT network, so the IT director is increasingly involved in the decision-making process. Facilities managers responsible for staff safety and building systems operation and maintenance are also more involved.

In the UK, it has been found that for certain businesses the task of security management can represent about 5% or less of the principal task of the appointed manager, who may also be involved in office or building management and general administration ('Dilute to waste', SMT, April 2004, pp16-18). Integrating security can move responsibility further towards the IT function – although whether that's a positive development is open to debate.

With the advent of e-bidding, procurement departments are also beginning to increase their influence in the buying process and are often assisted in doing so by external consultancies. The pressure on security suppliers to reduce costs has become overwhelming. Some countries have moved even further in new directions, resulting in the virtual extinction of the traditional security manager as we know it.

When compared with the more conventional technology which stand-alone electronic security systems employ to this day, ISM is certainly presenting a compelling new bundle of value propositions to the customer.

Planning to do nothing? Not an option
With the knowledge of the effect ISM has had on other world markets, doing nothing is no longer an option for UK security managers... but what should businesses be doing to change? For those of us who sense we might be a little way behind the technology curve, taking time out to understand the basic concepts of Internet Protocols and networks is an advantage (as is investigating the options early and having an informed opinion, even if there are no immediate plans, or even an available budget, for any kind of upgrade).

Having a clear idea of the 'hidden costs' within your organisation (and therefore the hidden savings that can be made) will also be beneficial, as will harnessing the support of your supplier partners. ISM doesn't require a big upfront investment – each electronic security system can be upgraded as it becomes due for replacement.

Whatever the ultimate size and shape of the integrated security market in the UK, the convergence of IT and physical security seems unstoppable. For those wishing to remain at the forefront of the industry, it's essential to become conversant with the networked environment and evaluate ISM before the IT manager does it for you.