Technology News  |   Industry News  |   Product News  |   Business News  |   Event News  |
  CCTV Surveillance  |   Access Control  |   Biometric ID  |   Alarm & Detection  |   Security Parts & Devices  |   Integration & Convergence  |
  Corporate & Office  |   Education & Institutional  |   Financial  |   Game & Casino  |   Government & Public  |   Homeland Security  |   Hospital & Entertainment  |   IT Asset & Technology  |
  CCTV Surveillance  |   Access Control  |   Biometric ID  |   Alarm & Detection  |   Security Parts & Devices  |   Integration & Convergence  |
  CCTV Surveillance  |   Access Control  |   Biometric ID  |   Alarm & Detection  |   Security Parts & Devices  |   Integration & Convergence  |   Consulting & Services  |
  Edit Member Profile  |  Edit Company Profile  |  Change Password  |  My Resources Profiles  
  2009 MAR Issue   |   What is Digital Magazine?  |  How to use  |  Archives  |    
 
  SecurityWorldMag.com

SecurityWorld Online Magazine

     All

Theme Tracking

Market Insight

Spotlight

Business & People

Theme Tracking

Home > Worldwide Security Report > Theme Tracking

Key to Successful Security Integration

A solid partnership between IT and Security

Leon Chlimper, Vice President of Systems for Bosch Security Systems, offers a manufacturer¡¯s view of the enterprise system.

By Jeanny Lim

 

 

In an interview with SecurityWorld INT¡¯L, Leon Chlimper, Vice President of Systems for Bosch Security Systems, provides a manufacturer¡¯s view of the enterprise system.

Addressing the fact that systems are intimately tied to technological advancements in IT and telecommunications, Leon noted that the relationship between IT and security must start well in advance of installation.  He viewed that more and more companies are assigning or attaching their security budgets to their IT departments -- and using enterprise systems for more than security functions.

¡°The IT world needs to teach the security systems manufacturers, because we don¡¯t know what we don¡¯t know,¡± Leon says.  ¡°The IT industry should work with us to help us help you.¡±

Leon pointed out that the actual beginning of the IT/security convergence was more than 10 years ago -- when access-control systems moved from proprietary to standard operating systems and databases like Windows and SQL.

He believes that the best integration comes from a single vendor who networks among its different technologies.  Most of the time, this integration allows for alarm and event reporting, command and control, and programming of edge devices -- all from a single GUI.  The key for customers is to look for solutions, not just products.

Customers should start with the Electronic Access Control (EAC) system: the backbone of any enterprise system.  EAC is used to both control access for security and to gather data for any number of uses.  EAC systems typically employ either biometrics (e.g., fingerprint, iris scan, face recognition) or smart card technology.  Next comes the integration of CCTV -- and features like video over IP, which can have a significant effect on your network bandwidth if it¡¯s not done correctly.

Leon concluded that the true power of an enterprise system lies in its ability to provide a solid Return on Investment (ROI).

 

Jeanny Lim is Editor-in-Chief of SecurityWorld INT¡¯L.  Send your comments to swied@infothe.com.

 

For more information, please send your e-mails to swm@infothe.com.

¨Ï2007 www.SecurityWorldMag.com. All rights reserved.

 

 

 
 

     What is the IQ Rating of your Security System?

     Access Management: Reap More than You Sow



Wireless IP Cam...
Home Security S...
IP camera Netwo...
Home l New Product Showcase l Gold Suppliers l Trade Shows l email Newsletter l About SWM l Help l Site Map l Partnerships l Privacy Policy | Newsletter
Publisher: Choi Jung-sik | Edited by: Lee Sang-yul | Youth Protection Officer: Lee Sang-yul
Copyright Notice ¨Ï 2004-2007 www.SecurityWorldMag.com Corporation and its licensors. All rights reserved.