EN - Datasheets

Integration vs. true unification

Issue link: https://resources.genetec.com/i/936549

Contents of this Issue

Navigation

Page 0 of 1

Whereas integration refers to establishing some form of connectivity between two standalone security systems (i.e. access control and video), a unified system is unique in that it refers to one platform that fully embeds all video surveillance and access control (ACS) capabilities. The two are fundamentally different and each represent different user benefits. There are fundamental shortfalls associated to integrated systems, which limit how far they go in addressing an organization's needs in becoming more effective at managing multiple security applications. Tech note Plugin-based integration vs. true unification Integrated security systems represent a more traditional and vastly different approach from unified security. Plugin-based integration Unification 1 platform for video and ACS 1 UI for configuring both video and ACS 1 UI for monitoring both video and ACS All alarm management is consolidated All ACS reports include video Federation of ACS and video systems Personnel trained on one unified platform and interface 1 service agreement to pay for 1 place for all system support Assured compatibility with seamless upgrades End-to-end encryption is always assured Several disparate systems Several UI apps for configuring each Several UI apps for monitoring each with some exchange of information You may not be able to acknowledge the other's alarms Some ACS reporting may include video Separate architectures, little to no consolidation Personnel must be trained on several systems Several service agreements to pay for Must coordinate between vendors for support Plugin may not be compatible with recent upgrades Encryption may be broken with plugin-based integration Centralized Servers – Deploy and maintain fewer servers through consolidation Seamless Upgrades – Plugin integrations complicate upgrades as they are not always compatible when one system is upgraded. Unified Threat level management – Some 3rd party systems don't support the concept of threat levels; they therefore cannot dynamically change state in response to Security Center™ threat level activation. Efficient and Consolidated Reporting – Multiple reports must be generated and then manually consolidated to correlate or automatically link events and alarms from different standalone systems. Plugin-based integration Unification

Articles in this issue

view archives of EN - Datasheets - Integration vs. true unification