Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://security.gallagher.com/Contactless-Solution
INSIGHTS

What systems integrators can expect from perimeter security in 2022

What systems integrators can expect from perimeter security in 2022
Perimeter security will continue to offer substantial business opportunities for systems integrators, but industry experts are quick to point out the challenges that need to be overcome.
Perimeter security will continue to offer substantial business opportunities for systems integrators, but industry experts are quick to point out the challenges that need to be overcome. In some cases, the challenges could be technology-related, such as difficulties in integrating different brands and new technologies, whereas in other cases, regulatory requirements and privacy issues could pose problems.
 
While overcoming these challenges may seem complicated, the perimeter security segment has the potential to attract SIs. As the world transitions to a post-pandemic situation and hybrid work structure, perimeter protection solutions need to become smarter and more diligent.

Working with different brands

Jamie Barnfield, Senior Sales Director at IDIS Europe, pointed out that one of the biggest challenges facing systems integrators is the complexity caused by having to mix and match solutions from different providers.
 
“Mixing and matching may initially look like the more cost-effective option, but almost as soon as the kit is out of the box, an engineer will face compatibility problems, and the user will soon realize that costs for upgrades and refresher training are beginning to mount up,” Barnfield said. “Therefore, an end-to-end solution from a single provider is the smart way to go, offering a much lower total cost of ownership (TCO).”
 
Using a supplier who can provide all the various components for a surveillance system will ensure seamless compatibility. It will make installations faster and smoother with less chance of costly project overruns. Of course, this may not work if you plan to add new solutions like drones to the system, as specialized companies would offer these. In such instances, finding the right solution that can integrate best with the rest of the systems becomes key.

Also read: 2022 perimeter security trends to watch out for

Finding the right mix of devices

Integrators need to remain up-to-date about the latest devices in the market. But more importantly, they should know how to use traditional perimeter defenses for comprehensive security.
 
“Covering large perimeters used to mean multiple cameras leading to expensive installation and maintenance, so it is worth assessing the latest UHD PTZs that can provide the coverage and evidential footage that organizations need while replacing 3-4 traditional fixed-lens bullets,” Barnfield explained. “Leveraging existing infrastructure such as fences, lighting columns, and traffic lights on adjacent road junctions will also help reduce upfront costs to win projects.”

Ensuring regulatory compliance

In the US, integrators also need to check if organizations are involved in federal business activity or receive associated funding. Many schools and universities, for instance, receive federal grants or loans and need to comply with section 889 of the 2019 National Defense Authorization Act (NDAA).
 
“Yet the same is true for many organizations in Europe and the Gulf States in the Middle East that already do business in the US or have US expansion plans,” Barnfield said. “So, it’s important to ask the right questions before specifying or worse, implementing NDAA banned Chinese cameras or equipment that use their components.”
 
Several countries outside North America are also considering such rules as concerns about cybersecurity increase. The key takeaway is to know which companies can offer devices with solid cybersecurity support.

How to boost revenue in perimeter

Customized remote monitoring offers a huge opportunity for systems integrators to increase their revenue while providing perimeter security. This capability enables organizations to enhance security while also reducing costs and inefficiencies.
 
“For instance, a systems integrator and remote monitoring firm that focuses on the hospitality sector has expanded the capabilities of its virtual guarding services by leveraging AI and deep learning algorithms to perform what was previously labor-intensive and costly onsite guarding and monitoring tasks – and at an unmatched accuracy rate,” Barnfield said. “End-to-end video solutions are delivering enterprise-level monitoring to customers, including even small hotels, more affordably.”
 
Advanced, remote video monitoring is also becoming much more attractive to a range of mid-sized businesses, thanks to the developments in AI analytics that are transforming the quality of service they can provide to remain competitive. These video solutions are helping to reduce risks, streamline operations, meet with compliance, and create the best user or guest experiences possible, affordably and seamlessly.

Meeting security at the perimeter

With the best use of AI and analytics, the perimeter sector can become a major revenue generator for integrators. As the technology progresses, customers would want more return on their investments, and integrators can offer solutions like ALPR that can not only help in security but also for business operations.
 
Using different technologies is also an option to consider. Radar, LiDAR, drones, and even robots are advancing at a fast pace, offering excellent solutions for specific use cases. With a clear understanding of the requirements, integrators would now be able to help their customers achieve more at the perimeter than ever before.
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: