Security through connected solutions

Security through connected solutions

Share this content

Facebook
Twitter
LinkedIn

Experts representing several of Traka’s ASSA ABLOY partners explain how they’re solving security challenges while pursuing integrated opportunities to streamline operations for end-users.

  • George Winker (GW), Vice President of Sales – North America, Vingcard
  • Chad Lerette (CL), Global Business Development Director – Partner Ecosystems, HID
  • Brandy Byrd (BB), Business Development Specialist I Mission Critical, Ameristar Perimeter Security
  • John Tyrer (JT), VP & Head of Construction (Biosite) – Americas
  • Natalie Bannon (NB), Director of Strategic Alliances, Gallagher Security

How have you seen the security industry transition to a more integrated landscape?

GW: Many properties are recognising that the limitations of siloed systems and hardware extend to access control operations and are instead seeking out solutions that are more adaptive and responsive. This is especially important considering that security-related issues can suddenly arise, while bad actors continue to evolve their methods and implement creative ways of bypassing legacy systems. Therefore, building operators are finding they need to take a more unified and centralised approach to how their access control operations function.

CL: Over the past decade, the security industry has moved from isolated, proprietary systems to more interoperable platforms. This is driven by the need for real-time data sharing, operational efficiency and a unified view of risk. Integrations like the HID Integration Service illustrate this change – connecting access control with asset management, identity governance and various solutions that will extend automation and efficiency deeper into the business.

BB: Several layers of security has always been the approach to securing a site; however, the first layer (the fence, gate, barrier) is now being used to add in more technology (IDS, Cameras, Lidar).

JT: Advancements in technology and the adoption of it have improved the landscape, with more awareness and means to move away from a siloed approach; however, this is still a challenge. The mindset and approach are positive, and now is the time to focus on implementation and delivery to find appropriate solutions that work for the end-user.

NB: Security is no longer just about locking doors or managing alarms. Customers are asking how systems can integrate with HR platforms, visitor management, operations, reporting tools or heavy machinery and forklifts. The conversation has moved from “does it work?” to “what else can it do?”.  That’s a huge mindset shift and it’s exciting because it opens opportunity for more strategic value.

What are the advantages to approaching operations in a more connected manner?

CL: Connected operations speed up decision-making, cut manual work and enhance incident response. This type of automation not only enhances physical security but decreases administrative workload and human mistakes. Integration transforms reactive processes into proactive safeguards – especially in mission-critical environments.

BB: The biggest advantage is not only quicker notice to your guards, but data for budgetary decisions, performance and changes to SOP and SESSO.

JT: Connected operations and connected data mean greater efficiency, visibility and, most importantly, often better security and safety.

What are the hesitancies that you’re seeing from end-users who may be apprehensive about exploring an integrated ecosystem?

GW: There can be a misconception that an interconnected ecosystem is less secure and vulnerable. However, this is an issue that’s resolvable by working with a reputable solutions provider that prioritises the latest data encryption and secure communication protocols. Other issues can be a hesitancy to invest in and learn a new technology infrastructure. This can be sidestepped thanks to more modern integrated solutions being designed with intuitiveness and ease-of-use in mind, while properties are often able to upgrade and interconnect their operations on a gradual basis.

BB: The security market can be slow to move with new technology; it tends to prefer proven processes. It also like layers of security and backups. If everything is integrated into one ecosystem and it goes down, the fear is that all the layers won’t work.

JT: There can be hesitancies around understanding how an integrated ecosystem works in practical terms – how will it fit into an organisation’s existing ecosystem and how will it deliver value when considering the implementation requirements? Often, once integration, deployment and value are understood, the response is extremely positive.

How important is scalability regarding integrated solutions? How can end-users do it effectively?

GW: Scalability is crucial to ensuring that an integrated ecosystem continues to accommodate current or future business needs while keeping pace with evolving technology and industry trends. Many integrated solutions, such as a property’s access management system, now leverage cloud-based designs to ensure seamless scalability. Using this approach, often all that is needed when a building is aiming to implement a new integration or update is a software patch or API.

CL: Scalability is essential – but only when combined with adaptability. As organisations grow, adopt hybrid work models or expand globally, they need physical security solutions that support robust APIs, provide cloud-native architectures and offer flexible licensing. End-users should also focus on vendors with strong integration roadmaps and reliable partnerships. Equally important: Invest in user training to ensure teams understand when and how to scale.

BB: At the rate at which data centres are being built, it is important to make it scalable. Cloud providers are building for themselves, but many other people are building them to their standards, so having something replicated on a site, no matter who is building it or even running it, is important.

NB: A solution that works for one site needs to scale to hundreds without creating admin chaos. You don’t want to solve one site’s problem and realise you’ve created 10 more. I would recommend starting small; maybe one integration that solves a real pain point, then build over time.

How is the constant evolution of cyber-threats impacting how end-users are approaching access control and security?

GW: The evolving pace of cybersecurity risks means that interconnected cloud-based solutions backed by advanced encryption are more important than ever. Siloed systems can be more vulnerable to being exploited without a property’s staff noticing, especially if they’re not supported by the latest security measures. By adopting a cloud-based access management solution, properties can benefit from automatic software updates that ensure the latest protections are always in place.

CL: As threats become sophisticated, organisations are reevaluating access control by focusing on identity management, governance and zero-trust security. This includes stronger digital supply chains and vendor risk mitigation programs; establishing strong linkages between company policies, security controls and external forces and creating flexible workflows that adapt to business and risk needs.

NB: Cyber is no longer separated from physical security. We’re seeing demand for certificate-based credentials (PIV, FIDO, etc.), encrypted comms and solutions that offer strong reporting and audit trails. End-users want solutions and systems that are secure by design. With prospects, we often see cyber and IT teams as part of the vetting process and will include risk assessments to be completed.

How do you measure true return on investment for a single solution, including through its integration capabilities?

GW: Measuring ROI for a solution goes beyond immediate financial benefits to encompass operational efficiencies, enhanced security and long-term adaptability. By implementing a solution that offers robust integration capabilities, properties can reduce maintenance costs associated with managing multiple independent systems. Additionally, integrated solutions can streamline workflows, allowing staff to dedicate time to guest-facing activities rather than operational tasks.

JT: A lot of the value results from improvement in data quality and efficiency improvements through time-saving. This is particularly the case with repeatable tasks, where an integration addresses repetition or manual tasks and makes them more efficient and robust from a security perspective. 

NB: ROI isn’t just about cost savings – it’s about headaches saved. It’s risk reduction, operational continuity and scalability. It can also be completely unconventional, such as an increase in NPS scores. We help organisations frame the conversation around outcomes.

Why should end-users have a collaborative relationship with their suppliers in addressing needs?

CL: Security challenges evolve quickly and no vendor can anticipate every case. A collaborative relationship ensures solutions are tailored, roadmaps are aligned and feedback loops are active. This model also helps end-users stay ahead of regulatory changes, threats and integration opportunities.

BB: That relationship not only can help with forecasting, lead times and correct product being delivered, but it also can help the supplier with future products to meet end-users’ needs.

JT: The success of a solution lies in clear communication and shared understanding. Without collaboration, a partnership may appear successful, but dig deeper, and results may vary. It’s important that both sides understand requirements and capabilities and work together.

NB: The best solutions I’ve seen came from users willing to share their pain points and suppliers who were willing to listen and act. That partnership builds trust, and it shows in the outcomes.

What should suppliers strive for in the future regarding integrated operations? How will that impact the end-user?

GW: Suppliers should further prioritise the development of increasingly flexible, interoperable and future-proof technologies to better support integrated operations. This involves embracing open-platform architectures, leveraging cloud-based solutions for ease of scalability and adopting advanced cybersecurity protocols to maintain robust protection against evolving threats.

JT: It’s important to stay ahead when it comes to the latest technology and integration capabilities, and in understanding how this impacts the end-user. Requirements and expectations will evolve and it’s critical to be on hand to best meet needs and tailor effective solutions.

NB: Customers don’t need a laundry list of features; they need systems that work. For suppliers, that starts with listening. Not just waiting to reply, but truly hearing what the problem is. Integration isn’t about impressing people with how much tech we can stack and shiny features. It’s about solving the right problem at the right time. If we get that right, we’re not just winning the project, we’re earning respect and becoming a trusted advisor.

Newsletter
Receive the latest breaking news straight to your inbox