A couple of decades ago, when the Security sector was almost born, its different subsystems (Intrusion Subsystem, CCTV, Access Control, Interference, etc.) lived together without any interrelation.

By Juan José Hernández Cabello

- Advertising -

At the end of the 90 decade, coinciding with the advent of the Internet explosion and the "IP world", this solution became what we can call today an Integrated Security System (hereinafter, let me call it SIS).

Thanks to this technological evolution, the SIS was also able to achieve an evolution whose limits are not yet known. After all, prior to this technological breakthrough, Systems integration was limited to interconnecting different equipment (Intrusion Control Units, Video Recorders / Video Matrices, etc.) to a PC through different serial ports.

News
The first thing to keep in mind is to reflect on the SIS concept. In the current world, different definitions can be found (Control System, SCADA System, Monitoring System, Integration Platform, etc.). For security control center applications, the definition could be expressed as follows:

  • It is a software product for the supervision, control and interrelation of the systems necessary to guarantee the optimal security surveillance, such as: Intrusion and Fire Detection, Access Control, CCTV Video, Intercom, Data Networks, Energy ...
  • A SIS can be applied to a large variety of control and / or monitoring centers, so it is important to study where its use is recommended and how. In any Control Center where it is possible to receive signals from the different Security systems it would be convenient to use a SIS. We are talking about Local Surveillance Centers, Remote Surveillance Center, Civil Protection and Security Center ...
  • The next thing to keep in mind when considering SIS implementation is when it is necessary. Without going into much detail, some guidelines are suggested when a SIS is necessary:
  • In any Control Center where the installation is complex and signals can be received from different Security systems. We are talking about Local Surveillance Centers, Remote Surveillance Center, Civil Protection and Security Center.
  • Where multiple control stations are required, it is desirable to simplify the operation by the high rotation of the guards, a step-by-step integration of buildings / facilities and / or several control zones (Control Center, Reception, Surveillance Center ) The implementation of a SIS will be appropriate and possibly necessary.
  • It must be supported by a flexible architecture (centralized, distributed, proprietary solutions ...). It must have a great capacity of integration of the devices used in Security, in its different areas of: Intrusion, CCTV, Access Control, Intercom, Fire, Automation and Technical Services ...
  • Another important feature of a SIS is the Graphical Interface, which can combine data, plans, and Image; Must be able to be customized by workstation and operator. For this purpose it must contain a complete Graphic Editor (Zoom / Views, Layers, Icons, Classes, Groups, Instructions, Models, Counters ...).
  • A very important subsystem within the management of a SIS is CCTV. Adequate integration and management will result in a higher capacity monitoring and surveillance system. Of vital importance will be the system allowing the generation of surveillance scenarios with multiple screen technology to define scenarios, forming a "virtual matrix" of monitors, with intelligent viewers for presentation in VideoWall mode.

Case of success: Vigiplus
A clear success story of what should be a SIS is the Vigiplus system, developed by the company Desico; As a relevant data, the developer is an integrative engineering company of security systems, whose objective is the realization of projects of security control. In this line of coherence Vigiplus product was born to offer the ideal level of quality, benefits and price in all those projects that participates.

One of the important features of a SIS, in this case Vigiplus, is modularity. As a summary, the different modules provided by this tool are detailed below:

  • System Access Protection
  • Management of alarms and events
  • Graphical user interface
  • Management of articles
  • Project Configuration Tools
  • Automatic Updates
  • Management of technical signals
  • Network Services
  • Backup Server
  • Access control
  • Visitor Control
  • Vigiplus PSIM

* Juan José Hernández Cabello is the Corporate Director of Business Development at CASMAR.

Santiago Jaramillo
Author: Santiago Jaramillo
Editor
Social communicator and journalist with more than 15 years of experience in specialized digital and print media for Latin America. Currently Editor of the Security Sales, Building Management and Academic Coordinator of the TecnoEdificios Congress.

IN OTHER NEWS

article thumbnailSony The HAW-S series is the first NVR compatible Sony 4K device that can record and play in 4K resolution, for monitoring systems of ...
article thumbnailSeco-Larm The new multifunctional timer and counter SA-025MQ includes operation with low current consumption, seven modes easily ...
article thumbnailJohnson Controls The new 8.0 version of Kantech's EntraPass now adds support for the American Dynamics NVR network recorders through the app ...
article thumbnailST Electronics The AgilFence perimeter intrusion detection system developed for perimeter fences offers reliable detection and ...
article thumbnailAxis Communications The new AXIS Companion Dome Mini LE camera is designed to meet the needs of video surveillance in small businesses ....
article thumbnailU.S. For the first time in its history, the WINGS Summit will have online registration open to the public to visit the commercial exhibition and ...
article thumbnailInternational. Information technology (IT) managers are more likely to catch cybercriminals on servers and networks ...
article thumbnailU.S. Recent reports from Business Insider, CNN Business and many other publications have highlighted the undisclosed on-board microphone ...
article thumbnailInternational. ASIS International launched the Selection and Training Guide for Private Security Officers (PSO) of ASIS (ASIS PSO-2019) that ...
article thumbnailInternational. The World Wide Web Consortium (W3C) has just approved the web authentication API, also known as the WebAuthn standard, which is ...