The benefits of a truly unified security ecosystem

Traffic light trails on road

People appreciate a good platform. We want services and solutions that simply work and make it easy for everybody, from installers and consultants to end-users. These days, a seamless setup and usability are paramount. That’s why it's more important than ever to have a unified security ecosystem in which all your security products and solutions work together seamlessly to provide you with the best possible protection.

In the technology industry, there is an age-old argument about open, unified, and proprietary platforms. It is common to see an array of vendors integrating a multitude of technologies and hardware then slapping on them the label of being an ‘open and unified platform.’ However, many of these solutions can be riddled with challenges including unsupported features, voided warranties, and increased cyber security vulnerabilities. Although they may be open, they are very rarely unified.

In this blog we unravel these multi-vendor technologies and discuss the benefits of moving to a truly unified security ecosystem.

What does ‘Open Platform’ mean?

In the world of software computing, an Open Platform describes a platform that has provision for:

  • Open standards so there is a way for anyone to connect with the platform via application programming interfaces (API)
  • Open-source code that can be edited by users to tailor it to their needs 
  • Flexible scope to use the software for purposes other than as it was intended
  • Free adoptability allowing users to gain access without going through official channels
  • Editing functionality of specific features

Incorporating any of the five elements stated above makes a software program an Open Platform. So, an Open Platform can be made up of components that are open as well as closed and still be classed as an Open Platform. For example, Microsoft Windows has an Open API, and unlimited scope flexibility, yet its source code is closed and proprietary. If you analyze most security platforms, you can conclude they too are open, where needed.

What does ‘Open Hardware’ mean?

Open-source hardware, likewise, is hardware that has made its design publicly available so that anyone can study, modify, distribute, make, and sell the design or hardware based on that design. The hardware’s source, the design from which it is made, is available in the preferred format for making modifications, or bringing it into another access control ecosystem. 

If you were to analyze security hardware manufacturers, you could conclude that all in market are in fact, closed. Furthermore, even if they are ‘open’, it is unlikely they would allow anyone, and everyone access their hardware. 

How many manufacturers does it really take to supply an open, unified system?

There is a dangerous narrative currently circulating within the security industry, which speaks of providing customers with a selection of software and hardware solutions, so they are never ‘locked in’. These providers also simultaneously promise an open, unified solution that can be used across multiple systems and locations – compatibility and interoperability guaranteed. However, there are many factors to consider when switching between multi-vendor technologies, including:

  • Unsupported features/integrations
    Just because another system supports the same controller hardware does not mean a new platform supports the same range of features and integrations. Individual features, like OSDP or event cross-linking, may be supported at the panel in one system, but not in another.
  • New licensing/OEM Mask codes
    Another potential problem can occur if some platforms observe a 'Product OEM Mask' that codes third-party hardware to a specific brand. The codes are not always observed, and not all third-party vendors have them in place. Adding existing hardware to a new system can be blocked and potentially require additional licensing fees or risk rejection by the new vendor. In most cases you cannot simply and easily move your firmware from one system to another. Furthermore, physically changing chips on the controller board may be required.
  • Voided warranty or support
    In many cases, when a site moves their solution to a new provider, the vendor may choose not to provide technical support for taken-over devices, nor do they typically provide warranty for them if something goes wrong. 
  • Cost of re-training
    The nominal life expectancy of an access control system is 10 years. System changes within the 10-year expectancy have been historically very low. In the past, most customers would stay with their current provider and were happy with their choice. They saw it as a significant investment worth sticking with. Up until a few years ago, this was the norm. As with any evolving technology, there is always a steep learning curve when switching to new technologies, leading to potential mistakes and vulnerabilities. 
  • Cyber security implications
    Many third-party components contributing to a security solution can amplify potential cyber vulnerabilities within hardware and at connection points. A cyber-attack on these systems can have extensive and far-reaching consequences, jeopardizing the safety and security of employees and visitors, corporate assets and intellectual property, or national security.
  • Multiple points of contact and responsibility
    A solution that incorporates technology from several vendors means multiple points of contact and responsibility, which can lead to confusion and the ‘blame game’ if something goes wrong. This can cost operators valuable time when trying to fix issues and contribute to cyber security vulnerabilities.

So, why the sudden shift in thinking? It is the fear that has been perpetuated whereby if you stick to a particular hardware system, it will become obsolete. So, an “open, unified system” is given precedence with many manufacturers supplying to this ideology. However, this ecosystem is not truly unified, and comes with added difficulties to configure and maintain. Thus, there is a higher cost of ownership and lots of finger-pointing when things do not go perfectly right. What is so unified about that?

Moving from multi-vendor technologies to a truly unified security ecosystem 

Some security providers claim that proprietary platforms are closed solutions that do not evolve with customer needs. However, this is not the case. Proprietary platforms are very much open, when needed, offering a truly unified end-to-end ecosystem in which they integrate industry-leading manufacturers into a holistic and synergistic solution and therefore constantly evolve to meet the needs of customers. 

This myth about open platforms is simply not true. There’s no security in obscurity, and a proprietary system helps lift the lid on what it means to be truly open and unified. Proprietary platforms are also a better choice for businesses who want a platform that is tailored specifically to their needs. For example, one of the benefits of using a proprietary platform is that you get access to a dedicated team of developers who are focused on building new features and enhancements for your specific needs. These developers are always working to improve the platform and make it more efficient and user-friendly.

Additionally, proprietary platforms often have a larger user base than open platforms. This means that you have access to a larger pool of potential customers and partners who can help you grow your business. And because these platforms are constantly evolving, you can be sure that you are always using the latest and most up-to-date technology.

So, next time you hear someone say that proprietary platforms are closed solutions, be sure to set them straight! Proprietary platforms are very open, and they offer many benefits beyond multi-vendor solutions.

Gallagher is the world’s only truly unified access, intrusion, and perimeter platform

Managing your security solutions is hard enough as it is, but when they do not work together seamlessly, it can be a nightmare. Command Centre is a truly unified platform that gives you control over your entire security infrastructure. From one console, you can see everything that is happening across your network, physical and virtual servers, endpoints, and applications. And with our powerful analytics and reporting, you can quickly identify threats and trends before they become serious problems.

A more connected security ecosystem is the key benefit of a unified security approach. According to a recent Pulse survey, 95% of MSPs say their team loses productivity and efficiency switching between different interfaces in a decentralized system, when managing security for a single client. Streamlining this process into a single platform or console helps remove extra steps and ultimately increases productivity.

In addition to clear productivity benefits, we always provide a path for our customers to move to the latest generation of hardware and software with minimum pain, whereas other systems may require a rip and replace between generations. The Gallagher solution is designed to be upgraded over time to ensure cyber risk is minimized, rather than be ripped out and replaced, which is the only solution for other systems. With out-of-date hardware, Gallagher prioritizes backwards compatibility in our products, allowing the customer to manage upgrades over time. We will also help to create a migration pathway for the individual customer, including helping to prioritize what is most important to upgrade first.

Gallagher security systems offer a high level of interoperability and will remain compatible even if you upgrade part of your hardware at a time in a phased approach.

The Gallagher solution offers a truly unified platform in which we integrate best-of-breed manufacturers into a holistic and synergistic solution.

What if security is capable of so much more?

By challenging what's possible, Gallagher empowers businesses to be more connected with their people, their goals, and their potential.

Unlock More


Do you have a question?

Let us put you in contact with one of our team members.

CONTACT US


Want to hear more from Gallagher?

Get the latest Gallagher news, updates, and event information delivered straight to your inbox.

SUBSCRIBE

Stay up to date with Gallagher

Get the latest Gallagher news, updates, and event information delivered straight to your inbox.