Building a Monster with Pumped Up Panels

Clients in all market sectors find that they are obligated by code or common sense to install new systems or upgrade old ones

Clients in all market sectors find that they are obligated by code or common sense to install new systems or upgrade old ones. The demands of selling and installing security have never been greater.

Technology is always migrating. Now functions used by human resources and energy management are being put onto computers. Records and vital statistics for the entire company reside in virtual filing cabinets called databases.

The systems all communicate with one another over the ubiquitous network. It’s almost inevitable that your commercial security projects and system installs will utilize existing databases or network infrastructure or both. You are going to have to negotiate with the IT department for IP addresses, bandwidth and storage. You are going to have to learn how to cope with the new regime.

The industry indeed is building more into the panels. You, in turn, are building more into your systems. It’s become mandatory in order to remain ahead of the increased competition from other trades migrating into the security field.

The System
It used to live in a locked metal box safely tucked away in an electrical closet. Today’s system is different. A portion of it may reside in a box, but the emphasis has shifted away from the hardware to systems that also involve firmware, network infrastructure, software, servers, storage and the Internet to operate.

David Bitton, Chief Operating Officer of Supreme Security Systems, runs a successful full-service electronic security firm in New Jersey. The company provides over 10,000 businesses, industrial facilities and residences with the most advanced burglar and fire alarms, CCTV systems, access control systems and process and environmental monitoring systems, audio and video intercoms and music systems.

As Vice President and COO of Supreme Security Systems, Bitton is responsible for the day-to-day operations of the business. According to Bitton, he works closely with a number of internal departments, including operations, IT, customer service and sales to ensure that the strategic plans of the company are integrated into all key functions of the business.

Commercial security represents 40% of Bitton’s business. Supreme Security Systems has its own central station, which monitors for fire and life safety, intrusion and industrial processes. “We integrate burglar alarms and access control systems,” says Bitton. “Proximity cards are our preferred access control credential.”

In order for independent security dealers to remain competitive and differentiate for the long haul, according to Bitton, it is important to adopt high-tech strategies along with stellar customer service. “When a customer chooses Supreme Security Systems, they are investing in advanced security protection,” he comments.

This month’s offering of products clearly illustrate technology at its finest. You cannot let these monsters scare you, however. Take heart. You do not need to know how an internal combustion engine works in order to drive a car. Similarly, you do not have to be a computer geek in order to successfully interface with the network. You simply need to understand the rules of the road.

Support for Functions The HID VertX products provide a complete infrastructure for central station applications. They provide integral access control functions within existing alarm monitoring and management software

The VertX CS platform is a fully-functional hardware/firmware infrastructure based on application specific collaborations with a number of development partner companies within the central station market, including Bold Technologies, Ltd., DICE Corporation, GE’s Monitoring Automation Systems (MAS) and OzVision Global Inc.

VertX CS also supports intrusion-related functions and terminology associated with central station alarm monitoring software. It serves as a network-compatible access device that interfaces with HID Prox, iCLASS and all other popular access control card and reader technologies enabling alarm dealers to now have the ability to provide access control solutions to their centrally managed alarm customers utilizing the same software platforms they already use today.

This content continues onto the next page...