TITLE

The Business of Security Systems Integration

AUTHOR(S)
Homet, Dave
PUB. DATE
May 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;May2006, Vol. 43 Issue 5, p64
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the impact of the consolidation of integrators on changes in the business of security systems integration. PSA membership and security integrators in general are made up of what is commonly known as small business enterprises. Today's security system integrators must be educated on networking and addressing IP devices so that they can look beyond their traditional areas. The business of security integration has experienced a radical change and partnering is becoming more the norm than the exception.
ACCESSION #
20920225

 

Related Articles

  • INTIAL ELECTRONICS: BIGGER RESOURCES -- BETTER TARGET MARKETS.  // SDM: Security Distributing & Marketing;Nov2006, Vol. 36 Issue 11, p56 

    The article profiles Initial Electronics, a security and systems integration company based in Chicago, Illinois. Dick Norwood and his partner Dick Cusson bought NTC Electronics from Meade Electrics Co. in 1985, which was later on sold to Initial Electronic Security Group in 2003 and was renamed...

  • FINDING THE GOOD FIT.  // SDM: Security Distributing & Marketing;Nov2006, Vol. 36 Issue 11, p79 

    The article profiles FirstService Security, a systems integrator company based in Norristown, Pennsylvania. FirstService was founded by Frank Brewer in 1986 to provide security and lock service to small businesses. The company has 600 full-time employees including 15 Microsoft-certified...

  • PUTTING 'THE BEST' INTO PRACTICE.  // SDM: Security Distributing & Marketing;Nov2006, Vol. 36 Issue 11, p81 

    The article profiles MAC Systems Inc., a systems integrator company based in Canton, Massachusetts. MAC was founded 25 years ago by Robert and Catherine McMenimons, and employs 6 project managers and 70 full-time employees. The company focuses its services in New England on vertical markets of...

  • China's totalitarian supervision system to 90 online.  // Tibetan Review: The Monthly Magazine on all Aspects of Tibet;Jan2009, Vol. 44 Issue 1, p32 

    The article reports on the plan of China to launch a high-technology online version of its notorious Public Security system in December 2008. The said online supervision network is expected to be supplemented by 200,000 security cameras that are being installed nationwide, having the employment...

  • Knowledge is Power. Martin, Jennifer // Security: Solutions for Enterprise Security Leaders;May2006, Vol. 43 Issue 5, p62 

    The article discusses the power of knowledge in the security systems industry. Education has become the deciding factor in every success or failure with evolution of technology and the ever-increasing demand of sophisticated security systems from end-users. One driver for education is the...

  • Telling the World about Security Dealers. Stepanek, Laura // SDM: Security Distributing & Marketing;May2007, Vol. 37 Issue 5, p10 

    The author talks about the difference between security alarm company and systems integrator. She discussed the SDM 100 and its ranked companies. To help identify the distinction between the two, she stated that they have introduced a method for ranking SDM companies. Moreover, she discussed...

  • GAINING STABILITY THROUGH PLANNING.  // SDM: Security Distributing & Marketing;Nov2006, Vol. 36 Issue 11, p77 

    The article profiles the Universal Security Systems Inc., a systems integrator company based in Hauppauge, New York. The company was founded in 1991 by Theodore Meshover, it installs and services electronic systems throughout the New York and New Jersey area, and installs physical security...

  • Technology.  // SDM: Security Distributing & Marketing;Nov99, Vol. 29 Issue 14, p15 

    Discusses the role of technology in driving the security industry. Importance of computer and communications technology; Convergence of security, energy, lights, entertainment and communications in the home; Devices that share applications; Complexities of residential and nonresidential...

  • A little knowledge is a dangerous thing as end-users add mobile devices to the system. Lawson, Alan // Computer Weekly;9/20/2005, p26 

    Informs that encryption could address threat to data security of consumer storage products. View that information is an essential component of every daily business activity; Importance of access to fellow employees in a collaborative framework; Discussion on the cost of deploying enterprise...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics