august 2025

// Integration & Network Solutions

Integrated Security Solutions for Changing Markets

Manufacturers and tech vendors weigh in on how AI is being incorporated into integrated solutions and what it’s doing for customers of all sizes.

By Christopher Crumley, SDM Associate Editor

Two security analysts collaborating in a control room with multiple monitors.

In a world moving to SaaS and RMR models, the conversation must evolve from ‘What do I deliver today?’ to ‘How can I continuously support your goals over time?’ Image courtesy of Genetec

SHARE

Integrated solutions are becoming a baseline requirement for organizations of all sizes. Ahead, we look at how manufacturers and technology vendors are evolving their offerings to meet the needs of organizations of all sizes. Their insights reveal a landscape that has been shaped by interoperability, scalability and simplicity.

Speaking to recent efforts, Steve Burdet, manager, solutions management, Axis Communications, Chelmsford, Mass., says, “We have focused on ensuring our products can operate seamlessly across a wide range of platforms — whether at the edge, on-premises servers, in the cloud, or in hybrid environments that combine all three. We have also expanded our ability to work with a broad ecosystem of partners by using open APIs and plug-ins, while adopting widely accepted data transfer protocols such as MQTT to support flexible, real-time communication across systems.”

Burdet continues, “Within our product portfolio, we’ve made major strides in unifying video surveillance, access control, and audio solutions, all enhanced by powerful analytics. These technologies are now more tightly integrated than ever, allowing customers to manage diverse security needs through a single, streamlined platform. This unified approach not only simplifies system management but also enables faster, more informed decision-making — delivering stronger overall security outcomes.”

Charles Pitman, product marketing manager, Genetec, Montreal, says the cloud has recently enabled more integration than previously possible. “Cloud used to be very siloed, with video and access control considered separate systems,” he says. “Integration was minimal. Initially, the priority was on small deployments that offered low upfront costs and easy setup. But now, the cloud is becoming much more integrated.

“At Genetec, we’ve launched a new SaaS platform that integrates video and access control,” Pitman continues. “We’re also connecting it with other cloud-native solutions like evidence management, access and identity management, work management, intrusion systems, alarm management, intercoms, and public address. These capabilities, traditionally only available in enterprise on-prem systems, are now moving to the cloud in a unified and scalable way.”

“One of the most common challenges for businesses of all sizes is the complexity of ensuring that multiple products and providers work together seamlessly to deliver an easy, positive experience”

— Steve Burdet, Axis Communications

Person monitors multi-screen security system with diverse surveillance camera views and timelines.

SMBs face unique challenges when adopting integrated security systems, including limited budgets, minimal in-house security expertise, and the need for simple, scalable solutions. Image courtesy of AMAG

AI’s Role in Integrated Offerings

It won’t come as a surprise that AI is the latest layer added to any offering. So how can that increase the value of an integrated offering? Jonathan Dupont, senior director, field sales North America, AMAG Technology, Hawthorne, Calif., explains how his company is using it: “Through the integration of Vaidio AI Analytics with AMAG’s Symmetry CompleteView, we deliver advanced video intelligence that helps users move beyond traditional video surveillance. Vaidio’s AI-powered features, such as object detection, facial recognition, license plate recognition, and behavioral analytics, provide actionable insights, reduce false alarms, and improve situational awareness in real time. This enables security teams to respond more quickly to potential threats and make more informed decisions.”

Dupont adds, “Looking ahead, we are exploring additional ways to leverage AI and machine learning across our product portfolio to enhance predictive analytics, system health monitoring, and proactive threat detection, with the goal of improving operational efficiency and helping our customers create safer, smarter environments.”

Burdet says Axis is also focused on expanding its AI efforts. “Artificial intelligence and machine learning are playing an increasingly important role in enhancing the performance and usability of our integrated security solutions,” he says. “Today, AI is embedded in several of our key offerings. These technologies enable users to detect, identify, and locate events or objects of interest more quickly and accurately — ultimately improving operational efficiency and situational awareness.

“Looking ahead, we are committed to expanding and evolving these capabilities,” Burdet says. “Our roadmap includes expanding object classifications and attribute detection, allowing our solutions to distinguish a broader range of activities, objects, and scenarios. We’re also focused on improving processing speed and enabling more complex search and identification capabilities, whether on the edge or across cloud-based and hybrid environments.”

William Knowles, regional sales manager, Traka, Orlando, Fla., says, “Traka utilizes machine learning algorithms to analyze patterns in access control behavior, identifying potential security breaches by detecting anomalies or suspicious activity. Looking ahead, we are committed to further expanding the role of AI in our solutions, particularly with advanced predictive analytics. Our roadmap includes not just optimizing physical asset management but also supporting cybersecurity reinforcement through machine learning-driven alerts that detect unusual digital access patterns, helping companies protect both their physical and digital assets.”

The combination of video surveillance integrated with access control and more can provide a truly intelligent solution. “We have a lot in video analytics — of course — but things that are less traditional include our person on-site likelihood indicator as part of our operator portal,” says Brian Lohse, general manager, commercial business unit, Alarm.com. “This gives an operator a simple likelihood score based on all sensor and contextual information that Alarm.com has, indicating whether there’s actually a person there.”

Lohse continues, “On the user side, we have something called unexpected activity. Any property — whether home or business — has things happening throughout the day: people coming and going, arming, disarming, opening doors, etc. The system builds a model for every property of normal activity. When something happens that’s odd, the AI detects that and notifies the customer, saying ‘this door doesn’t normally open at this time.’ It may be things they never thought to configure notifications for, and it’s wonderful because you don’t know what you don't know.”

SMB & Enterprise Integrated Needs

While small-to-medium businesses (SMBs) and enterprise customers have their own distinct integration needs, they can often look similar. Enterprises may be more focused on deeper, real-time connections between access, video, and cybersecurity, while SMBs want simplicity and scalability — but that’s not to say that they don’t value each of these elements. “One of the big challenges for SMB customers is that in most cases, they already have some form of pre-existing system,” Lohse says. “It’s certainly desirable to have all systems on one app working together, but they might already have cameras, an alarm panel on the wall, a fire panel. Whether they’re willing to invest in ripping all that out and replacing it to get an integrated experience is a real barrier.”

Lohse continues, “We’ve invested heavily in supporting a huge array of takeover or upgrade options. For customers with existing cameras, we now integrate with them so you can turn them into Alarm.com integrated cameras. We have a universal fire communicator, alarm modules that work with a wide range of panels, and even with access control if you have existing readers and credentials — all of those can be made to work with the platform.

Finding the Right Level of Integration

SDM asked the experts what questions integrators should be asking their customers to determine the right level of integration for their end users. Here’s what they said:

Jonathan Dupont, AMAG Technology:
“Integrators should ask about their future plans and help their clients make decisions now that will help them in the future. When choosing solutions, they need to grow with them.”

Ryan Park, senior product director of safety and security, Resideo, Scottsdale, Ariz.:

  • What security concerns are you most focused on right now?
  • How do you want your access control, video surveillance and intrusion detection to work together?
  • Who and how many people will be managing your system?
  • Do you need remote or mobile access to your system?
  • If you have or had a system already, what worked well, what hasn’t worked well and why?
  • Are there existing platforms or devices that the new system will need to integrate with?
  • What areas of your facility need the most coverage — inside, outside, or both?

William Knowles, Traka:

  • What are your top priorities in terms of asset protection, both physical and digital?
  • How much scalability do you need for your security system, considering your growth trajectory?
  • Are there any compliance requirements or regulations (e.g., ISO standards, GDPR) that the solution must adhere to?
  • What level of integration do you require between access control and key or asset management?
  • How do you envision managing user access, and what level of automation or control do you want over this process?
  • What cybersecurity measures are in place, and how can we ensure the physical security solution aligns with these efforts?

Charles Pitman, Genetec:
“First, integrators should ask their clients what systems they might want to integrate over time — not just what they need today. Understanding future needs helps avoid building a system that can’t grow with the client. Some vendors offer one-to-one integrations (video-to-access control, video-to-intercom, etc.), but these are limited. What clients increasingly want is interoperability between all systems — so their intercom can open a door, or their intrusion system can inform access decisions. Choosing a platform that supports deep integration ensures clients won’t hit a wall in the future.

And beyond the technical side, it’s about relationships. Integrators should position themselves as long-term partners. In a world moving to SaaS and RMR models, the conversation must evolve from ‘What do I deliver today?’ to ‘How can I continuously support your goals over time?’”

“Another foundational issue is that SMB customers often don’t know to ask for systems to be unified,” Lohse says. “For a long time, it’s been a product-based business, not a service-based business. In their minds, the video system is totally independent from the alarm system, which is totally independent from the access system. Often not only are the systems separate, but they’d call different companies to install them. There’s a big customer education gap, which represents a big opportunity. Customers probably won’t call saying, ‘I want all these systems to work together,’ because they haven’t thought about the benefits or that it’s even possible. We spend a lot of time helping our partners tell the story to customers about how these can all work together and illustrating use cases of why having them work together will help.”

AMAG’s Dupont adds, “SMBs face unique challenges when adopting integrated security systems, including limited budgets, minimal in-house security expertise, and the need for simple, scalable solutions. They require systems that are easy to deploy, manage, and expand as their business grows, without the complexity or cost of enterprise platforms. Compatibility with existing infrastructure, built-in cybersecurity, and support for compliance requirements are also key concerns.”

Speaking to how Axis views the SMB customers challenges — and what the company does to help overcome them, Burdet says, “One of the most common challenges for businesses of all sizes is the complexity of ensuring that multiple products and providers work together seamlessly to deliver an easy, positive experience — something that can be especially difficult for organizations with limited IT resources and staff.

“To address this, we take a two-fold approach,” Burdet says. “For solutions built entirely with Axis products, we prioritize a unified platform where video, audio, access control, and analytics are developed to work together natively. This deep level of integration ensures a more intuitive user experience, faster deployment, and fewer technical complications — making enterprise-grade functionality more accessible for SMBs.”

Burdet continues, “When it comes to third-party integrations, we focus on building strong partnerships and aligning technologies proactively, rather than reacting only when customers raise compatibility issues. We also provide a stable foundation for integration through open, well-documented APIs. This minimizes complexity across different versions and platforms, helping SMBs adopt best-fit solutions without the burden of custom integration work. Our goal is to reduce friction and make advanced security solutions easier to adopt, manage, and scale — so SMBs can focus on running their businesses with confidence.”

While many of these considerations apply to the enterprise user, too, Dupont says of this type of customer specifically, “Enterprise customers are demanding deeply integrated security platforms that unify access control, video surveillance, and cybersecurity into a single, intelligent system. They expect real-time correlation between access events and video, supported by AI analytics for faster threat detection and incident response. Features like object recognition, facial matching, and behavioral analytics help reduce false alarms and improve situational awareness. Cybersecurity is critical; enterprises require encrypted communication (e.g., OSDP), secure device authentication, hardened firmware, and regular software updates to mitigate cyber risks. Many are also moving toward hybrid deployments that balance cloud flexibility with on-prem security standards.”

Ramesh Songukrishnasamy, senior vice president and chief technology officer, HID, adds, “These enterprise customers know that security infrastructures are no longer isolated; they are complex ecosystems that include access control, video surveillance, identity platforms, building management systems, IoT sensors and cloud services, among others. Integrating these ecosystems is vital. This requires interoperability and a shifting to open architectures that enable gradual upgrades, modular deployments and long-term scalability without starting over every few years.

“Edge computing is becoming integral to accomplishing this as part of an open, future-ready strategy of which controllers are a key element,” Songukrishnasamy continues. “Pushing processing capabilities close to the access point enables third-party applications to run directly on controllers, tightly integrating them with local sensors, readers and devices while maintaining compatibility with broader cloud and enterprise systems. The decentralization of this approach also reinforces both security and flexibility.”

Leveraging Training, Support & Partner Programs for Success

SDM asked the experts what additional support their organizations are offering to integrators. Here are some resources from each that — according to them — can be leveraged to better succeed in offering integrated solutions.

Alarm.com
Brian Lohse says, “We offer a lot. We have Academy, which has both in-person and online versions with different tracks for executives, sales folks, and technicians to help them understand how the system works and what the go-to-market strategy is for unified and integrated systems. We provide playbooks with real-world examples. If you were the owner of a company who historically sold non-integrated systems but you’re interested in getting there, we’ll give you a playbook that goes through suggestions for how to set up your packaging and pricing, how to commission your salespeople to drive the sale of integrated systems, how to measure your technicians’ efficiency in installing and configuring integrated systems, and how to market and promote value to customers.

Lohse, continues, “One capability we call in-app Discover enables partners to show existing customers through the app interface other components of the integrated system they could be using. For example, if a customer has a video system and intrusion system on Alarm.com, the dealer could place content right in the app saying, ‘If you had access control on this system, here’s how they would work nicely together. It’s very intelligent.’ We won’t show content about a device they already have, and we’re using AI to determine which customers are most likely to want a given new capability based on their characteristics. Partners can use that smart targeting to intelligently place the right capabilities in front of the right customers.”

AMAG Technology
“Integrators can strengthen their business with AMAG Technology by fully utilizing our training, support, and partner programs,” says Jonathan Dupont. “Becoming certified in the Symmetry ecosystem builds deep expertise across access control, video, identity management, and visitor management, enabling integrators to deliver comprehensive, integrated solutions. For complex or highly customized deployments, Site Support Agreements provide direct access to AMAG’s technical experts, ensuring system performance and long-term customer satisfaction.

“Participation in AMAG’s Platinum Program offers enhanced support and additional resources, while the new Partner Portal provides 24/7 access to training, technical documentation, software downloads, product updates, and sales tools, all designed to simplify project delivery and keep integrators current,” Dupont concludes.

Axis Communications
Steve Burdet says, “To support our integrator community, we offer a wide range of resources designed to deepen technical knowledge, expand solution design skills, and strengthen overall expertise in integrated systems. … Through the Axis Communications Academy, integrators can access structured training — both in-person and online — that covers everything from product fundamentals to advanced integration techniques,” Burdet says. “These programs are designed to build understanding and confidence in deploying complex solutions while helping integrators stay ahead of evolving technologies.

“In addition, our Channel Partner Program provides ongoing support, tools, and collaborative opportunities that empower partners to grow their business while delivering greater value to their customers,” Burdet continues. “By leveraging both the Academy and our partner ecosystem, integrators can better position themselves to design, implement, and support integrated security solutions that align with their clients’ needs.”

Genetec
Charles Pitman says, “We offer a robust learning management platform called Genetec University. It provides both technical and commercial training, with certifications for both engineers and sales professionals. Training is available on-demand, in-person at Genetec offices, or through onsite visits for large teams. On the support side, we offer standard support through our Genetec Advantage program, as well as professional services for more complex projects — whether that’s design help or post-deployment care. We also provide 24-hour support and assign dedicated care professionals when needed.”

Pitman continues, “Our partner programs go beyond training and support. We also collaborate on regional marketing initiatives and provide tools to help integrators succeed in their local markets.”

Resideo
Ryan Park says, “Having the right products is only half the equation — the right training and support make all the difference. We recognize that training installers and truck inventory management are opportunities for integrators. That’s why Resideo’s solutions offer optimized truck inventory and training efficiencies. We offer unified and simplified programming for installers to deliver streamline installs and reduced time on site. With Resideo Academy, we hold on-demand, in-person and online training, helping to ensure your team stays ahead on installation best practices, system integrations and new technology advancements by accessing training where it's most convenient for you.”

Park continues, “Through Resideo Academy, customers and partners can participate in hands-on training and demonstrations led by product and industry experts to make installations easier and faster. The training is designed not just to enhance technical skills, but also to help integrators better understand and communicate the value proposition of our integrated solutions to their customers, whether in residential, light-commercial or SMB settings.”

Traka
William Knowles says, “Traka offers a comprehensive suite of training, support, and partner programs designed to help integrators expand their expertise and grow their integrated solution offerings. Our partner program includes access to detailed product training, certification programs, and dedicated support from our technical team. This enables integrators to stay updated on the latest advancements in key and asset management solutions, ensuring they can offer the most secure and efficient systems to their clients. Additionally, we provide marketing support and resources to help integrators demonstrate the value of our solutions in addressing security needs. By leveraging our training resources and collaborating closely with our team, integrators can confidently deploy advanced integrated solutions that enhance their clients’ security posture, while growing their own business through increased demand for top-tier security solutions.”