Sunday, June 30, 2019

System Integrators tips to win Sales Proposals for New Access Control Systems

System Integrator tips to win Sales Proposals for New Access Control Systems

Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building or site. It is only a matter of time before you receive the highest compliment from one of your customers when they say: “We need a completely new access control system, and we want you to design and implement it.”

Any security systems integrator (Security Safety Automation Integrate - SSA Integrate) who has ever worked on an “enterprise-level” access control project will tell you it is not just standard access control, only larger. There are a host of requirements, challenges and issues that come with true enterprise access control.


Today’s enterprise-level projects are more complex than ever, with an emphasis on integration with not only other security systems such as video, but also Active Directory, building control and even beyond — in some cases going to PSIM-level integration. Technologies such as mobile credentialing, PoE and convergence have all to greatly impact this space in recent years, requiring more technical expertise than ever before on the part of the security systems integrator. I am always with you, in case of any designing issue / guide is required, just give me a mail – I work for smarter & safer future – Arindam Bhadra.

Now I share some Checklist to win sales proposal for New Access Control Systems. If you approach it methodically, you can reduce error and ensure that your customer gets the exact system they require.
Questions to ask include:
• What is the short-, mid- and long- range vision for the access control system? Is it based on open standards, like 802.11b/g or 802.3af, for the most affordable infrastructure? Is it scalable enough to support possible mergers and acquisitions?
• What type of Access Card / credential(s) will be used? How many are issued? What type of format will be used, and can it support a projected card-holder population? Is it controlled to ensure there are no duplicate IDs?
• What investment has already been made? Is the current system upgradeable? Or completely new.
• What assets does the end-user have, and what value do these assets have in relation to the operation or business? These range from physical assets like computers to patient records, employee records and client data.

Observe the End-User
Essentially, the integrator should be trying to find out about the culture at the end-user’s location. It can range from an open, accommodating environment, to one with strict and limiting access controls. There will always be a conflict between convenience and security — the challenge is to create procedures and rules that balance these disparate goals.
Did you observe the employees holding doors open for each other? If so, how are they able to verify their current employment status? Did they open the door for persons carrying large packages?

If so, did they check their IDs? Did visitors sign in at the reception desk? Did they wear ID badges? Were they escorted by staff members? Did students have a habit of leaving their rooms unsecure? If so, what sort of liabilities fall on school administration if a theft occurs and they knowingly allowed that practice to continue?
Conduct a Site Survey and Security Audit
Walking through a customer’s facilities can be invaluable when developing a comprehensive access control plan. Here are a few things to look for:
• Mechanical Security: If the openings are not mechanically secure, any additional funds spent on electronic access control are wasted. The following must be addressed before moving forward on an advanced access control system: Are the doors, frames, and hinges in good condition? Are they rugged enough for the application and durable enough for the traffic? Are the frames mortar-filled?
> What key system is in use? Is it a patented, high-security type? How often are locks re-cored? How many master keys have been issued? Have any been lost? How easy is it to reproduce the keys?
> Is there accommodation for the handicapped to ensure compliance with the Local Act?
> Are cross-corridor fire doors in place? Do they have magnetic door holders tied to the fire system?
• Identify the Threat: Consider the enduser’s surroundings: Have you noticed any evidence of gang activity? Have you noticed an increase in shuttered businesses?
If so, perhaps an increase in perimeter security is in order, potentially including increased lighting, cameras and gated access.
• Evaluate the Facility(s): This will help you identify product options. How old is the building? Does it have architectural or historical significance? How thick are the walls? Was asbestos used as an insulating material? If so, it may be difficult and costly to install conventional, wired access control devices. Perhaps a WiFi solution will be a good alternative.
• Identify Assets and Value: Many consider assets to be tangible items that can be sold for quick cash. But assets include anything that someone might want to steal or destroy, and vary among end-users. The important thing is to put a price tag on the loss of the asset, plus the cost of lost productivity and potential liability that could result.

Get the Technical Details
For each opening requiring access control, you’ll need the following details to ensure you order the right product for the given application:
• Does the door swing in or out? Is it leftor right-handed?
• What’s the finish of the existing hardware? What’s the lever style? Would the end-user prefer a more modern look?
• How is each door expected to operate? Ensure that an operational narrative is written for each opening that covers the following conditions, and have the customer sign off on it. This should include: normal state; authorized/unauthorized access and egress; monitoring and signaling; and power failure, fire alarm and mechanical operation.
• Determine where to place access control equipment. This could be an IT closets, server rooms, administrators’ offices or under BMS Room. Make sure your staff will have access for installation, and later for service and maintenance. Also, make sure there is enough space on the wall to mount access control panels, interface modules and power supplies.
• Determine network coverage. Are IP drops where you need them? Is there sufficient WiFi coverage where you need it should you opt for WiFi locksets?

Validate the Security Requirements
Different applications and clients have differing security requirements. Verify these needs with the end-user before starting the system design; otherwise, you could be in for a lot of extra work. The following considerations should be factored into an overall access control plan, as they have a direct impact on product selection and system configuration:
• Lockdown: Is lockdown capability needed in the interior or just the exterior — or at all?
• Real Time: Is real-time communications to the access control system a critical requirement? Perhaps it is for perimeter doors, but what about interior doors?
• Monitoring Requirements: How much monitoring does the end-user need? In most cases, a door position switch will suffice; however, some clients want to know that the door is both closed AND secured — these are not necessarily the same thing.
• Audit Trail Requirements: How important is it to know who and when someone
entered a building or room? For code compliance, this feature is always mandatory, such as accessing computer rooms, personnel records and patient records; however, some companies use audit trail reports to validate employee activity.
• High-Security and Classified Areas: For increased security, there are several options. Is multi-factor authentication a requirement, such as card and PIN or even a biometric verification? Should there be a two-man rule?
• Special Considerations: Some areas, require valid access credentials from both sides of the door — keeping the right people in and the wrong people out. This requirement takes different hardware than a typical free-egress lock or exit device.

Determine Business Requirements
Consider the final details that will allow you to complete your system design:
• Aesthetics: Many high-profile building owners use architectural design to make their facilities stand apart. This extends to the interior space as well. So, is a black wall reader the right choice? Or will an elegant lock with integrated card reader and designer lever be a better option?
• Infectious Disease Control: Some locks and doors are available with an anti-microbial finish designed to inhibit the growth of bacteria.
• Turnover: What kind of turnover does the facility experience? Heavy turnover would be difficult to manage with a PDA-programmable offline lock; however, one-card systems program access privileges onto the card, virtually eliminating the need to tour the doors to reprogram them. Of course, online solutions could address this as well.
• Applications: It is inevitable that a variety of applications will converge into a single system. That’s why it is important to select an access control system that can grow by providing application support for parking access, visitor badging, integrated video and other needs as required.
• System Management: It is important to determine who, how and where the enduser will manage the new access control system. For enterprise-class systems, it might mean multiple departments will manage their own people, while a system administrator will maintain and manage the main, centralized system.
• Budget: You ultimately need to know your customer’s budget; however, with all the upfront research, your findings might be beyond their initial scope. This is how long-term planning comes into play so you can develop a priority list over several phases to ensure the end user gets the access control system that fully meets their requirements

Ensure Code Compliance
Several agencies have issued codes and standards over the years to enhance life safety, improve privacy and reduce fraud. They need to be factored into an overall access control plan, and the Health Insurance Portability and Accountability Act (HIPAA). National Building Code of India 2016; Life-Safety (NFPA 101) — Means of Egress; Fire (NFPA 80) — Retro-fitting, Sprinkler Systems; Accessibility (ANSI A117.1) — Operators, Credentials; and Electrical (NEC NFPA 70) — Installation, Wiring, Products. Select products and services that meet the design requirements and comply with current standards, such as EN50133 European Access Control Standards and Electrical wiring regulations.

Suppose you need to design 2door, where both side card reader for 100nos Card holder. What is the MOQ.
Option 1:
Sl No
Short Description
Long Descriptions
Unit
Total Qty.
1
Door Controller
2 Door / 2 reader Door Controller
No.
2
2
Power Supply
Power Supply for controller
No.
2
3
Proximity Reader
Proximity Readers for Entry & Exit
No.
4
4
Proximity Card
Proximity Cards
No.
100
5
EM Lock
Singe leaf lock ( 600 lbs)
No.
2
6
EDR
Emergency Break glass switch
No.
2
7
MC
Magnatic Contuct
No.
2
8
Access Software
Access Control Software
Set
1
9
Patch Cord
Patch Cord 3 M
No.
2
10
Network Switch
4port Network Switcher
No.
1
11
Access Workstation
PC i5 with windows operating system, complete with keyboard, mouse
No.
1
12
4C Cable
Supply, Laying & Testing of  4cx1.5 sq.mm cable
RM
30
13
2C Cable
Supply, Laying & Testing of  2cx1.5 sq.mm cable
RM
40
14
25mm PVC Conduit
Supply, Laying & Testing of 25mm dia. PVC type conduit
RM
60
Option 2:
Sl No
Short Description
Long Descriptions
Unit
Total Qty.
1
Door Controller
Standalone Door Controller cum reader.
No.
2
2
Power Supply
Power Supply for controller
No.
2
3
Proximity Reader
Proximity Readers for Entry & Exit
No.
2
4
Proximity Card
Proximity Cards
No.
100
5
EM Lock
Singe leaf lock ( 600 lbs)
No.
2
6
EDR
Emergency Break glass switch
No.
2
7
MC
Magnatic Contuct
No.
2
8
Access Software
Access Control Software
Set
1
9
Patch Cord
Cat6a Cable
RM
30
10
Network Switch
4port Network Switcher
No.
1
11
Access Workstation
PC i5 with windows operating system, complete with keyboard, mouse
No.
1
12
4C Cable
Supply, Laying & Testing of  4cx1.5 sq.mm cable
RM
30
13
2C Cable
Supply, Laying & Testing of  2cx1.5 sq.mm cable
RM
40
14
25mm PVC Conduit
Supply, Laying & Testing of 25mm dia. PVC type conduit
RM
60


Ref:
Access & Identity Management Handbook.
https://ipvm.com/reports/video-surveillance--access-control-integration
BS EN 50133-2-1:2000 British Standards Institution 2018.


Sunday, June 2, 2019

Why network monitoring appear delay?

Why network monitoring appear delay?

Speaking in the security industry network monitoring delay, I am afraid we have become a well-known disadvantages of. However, the delay in the end it is because of what reason?
Find out your camera’s IP address by checking the camera’s directory. Once you find your address you will be able to ‘ping’ it using your laptop or smartphone to test the strength of the connection.

Type ‘cmd’ into windows search engine and this should open a DOS command prompt. When this pops up, you will be asked to type in ‘ping’ and your IP address. You may see either ‘Request Time Out’ or ‘Destination Host Unreachable’ appear on the screen. If it does, check to see if the device you are using is on the same network as your camera. If you do see the camera on the network, attempt to connect using your browser.

If you have more than one camera you need to make sure that they have different IP addresses as this can stop you from accessing one or all cameras.


1- For network monitoring, the network bandwidth limitations make ip surveillance has been part of a headache. Because of this restriction, so forcing the network to monitor the transmission had to give up some very important things. In general network transmission systems, the router is the most important and most complete system indispensable equipment. But may not so friendly router for network video transmission. Since the transmission, routing forwarding takes some time, so the more transmission through the router, the greater the delay data. This also allows long-distance transmission, the delay has become an inevitable thing.

In addition to the router, quality, high-pressure line network traffic are also causing delays culprit.

2- Check the Cabling: If the camera's link and/or activity lights aren't blinking, it's likely a cable. A high frequency of connection issues centeraround cabling problems. Basic IT troubleshooting places a huge emphasis on checking transmission cables. Since the final assembly is only as robust as it's weakest link, checking data cables for kinks, frays, shorts, and bad terminations is a very basic troubleshooting step. Cable and patch panel connections made in a hurry by hand can get crossed wires or connectors come loose.

Sometimes the power wires to a PoE camera in the cable may be powering the camera up, but the data wires may be crossed or not connected preventing network connection. To troubleshoot, use a cable tester to test the cabling or use a known good cable to connect to the camera and see if it connects. If a patch panel is used, check the patch cable, that often gets overlooked.

3- Consuming signal processing network hosts 

In the transmission network, the codec is the main factor universally recognized time-consuming. As the network video surveillance system decoding devices are often used for client host. Therefore, host configuration also directly affect the quality of the transmission rate of the entire signal. If you catch a comparison of old and sick host device, then the delay phenomenon is certainly indispensable. 


4- If possible, look at the camera to make sure it is powered up. Most cameras have LED's that indicate the camera's power status, and if it is connected to and transmitting data to the network. Many times these LED's may be concealed inside the camera's housing. If the camera is externally powered (non-PoE) check the power supply if no LED's are lit.

If it is a PoE camera and not powered, check to see if it is plugged into a PoE switch or midspan. Verify that the camera is receiving the proper wattage of PoE power, outdoor cameras with heater/blowers and PTZ cameras often require High-PoE or PoE+ 30W or 60W of PoE power that is higher than most standard 15W PoE switches provide, often requiring different wattage midspans. Some cameras that require >15W of power will boot up and connect with 15W, but not transmit images or respond to PTZ commands.

Another pitfall may be the PoE network switch itself. Some PoE switches do not have enough power to supply 15W to every port and will not supply power to another camera if it is already overloaded. To troubleshoot, connect the camera into a suitable PoE injector or midspan to see if that is the problem.

5- Network transmission, the encoding process itself takes 

Due to the daily video transmission, analog and digital conversion is also a consumer point of time can not be omitted. Currently, in order to obtain a better picture quality, many manufacturers are adopting nowadays the most advanced H.264 compression algorithm as its own. But, when the image scene more complex, more moving objects, the greater the time frame rate and bit rate, H.264 category using the higher level, the greater the difficulty of codecs, time-consuming naturally the more and more. 


6- Don't be a hero, call for help: If you have tried the above steps and still cannot connect to the camera, visit the manufacturer's website for specific model troubleshooting guides and if those do not help, call the camera manufacturer's tech support line. Many times they know "tricks" specific to their hardware and can remotely connect to your PC via the internet to diagnose. Don't be afraid to ask for help, many times technicians waste hours tracking down a problem that the manufacturer's help desk representative can fix in a few minutes. The manufacturer's technician can also start an RMA process to return the camera if it is faulty and needs to be repaired or replaced under warranty.


Sunday, May 26, 2019

Globally Tailgating is common problem

Globally Tailgating is common problem

One of the biggest weaknesses of automated access control systems is the fact that most systems cannot actually control how many people enter the building when an access card is presented. Most systems allow you to control which card works at which door, but once an employee opens the door, any number of people can follow behind the employee and enter into the building. Similarly, when an employee exits the building, it is very easy for a person to grab the door and enter the building as the employee is leaving.
This practice is known as "tailgating" or "piggybacking". Tailgating can be done overtly, where the intruder makes his presence known to the employee. In many cases, the overt "tailgater" may even call out to the employee to hold the door open for him or her. In these cases, good etiquette usually wins out over good security practices, and the intruder is willingly let into the building by the employee.

Tailgating can also be done covertly, where the intruder waits near the outside of the door and quickly enters once the employee leaves the area. This technique is used most commonly during weekends and at nights, where the actions of the more overt tailgater would be suspicious.

Solutions To The "Tailgating" Problem

First, recognize that the tailgating problem is probably the biggest weakness in your security system. This is particularly true at doors that handle a high volume of employee and visitor traffic. Many security managers spent a lot of time worrying about unauthorized duplication of access cards and computer "hackers" getting into their security system over the network. It is far more likely that someone who wants access to your facility will simply "tailgate" into the building rather than using one of these more exotic methods to breech your security.

The practice of overt tailgating can be reduced somewhat through employee security awareness training. If employees are frequently reminded of the tailgating problem, they are less likely to let a person that they do not know into the building deliberately.

It is difficult to overcome the problem of covert tailgating through employee security awareness alone. While it would be possible to ask employees to wait at the door until it locks after they pass, it is probably not likely that this procedure would be followed except under the most extreme circumstances.

You can follow this link http://arindamcctvaccesscontrol.blogspot.com/2015/11/anti-passback-in-access-control-systems.html "Regular access control is more than adequate for standard control at entry points. Use anti-tailgating systems to address a specific problem that could or has happened" says Arindam Bhadra.


The problem of covert tailgating can usually only be reliably solved through the use of special "anti-tailgating" devices.

"Anti-Tailgating" Devices

To minimize the problem of tailgating, the security industry has created a number of "anti-tailgating" devices. These devices include mechanical and optical turnstiles, security revolving doors, security portals, and doorway anti-tailgating devices.

The essential function of each of these devices is that they permit only one person to enter or leave the building at a time. They either do this by providing a physical barrier that only allows one person to pass, or electronically by providing sensors that detect when a person attempts to tailgate in, or when more than one person tries to enter using the same card.

The following is a brief summary of each of the common types of anti-tailgating devices:

HALF-HEIGHT MECHANICAL TURNSTILE
Description: Rotating mechanical barrier arms installed at waist height prevent passage through opening. Electrically-controlled, using valid access card causes arms to unlock allowing passage of one person. Turnstile can be controlled in both directions, or allow free-passage in one direction.


Approximate cost: ₹ 4, 50,000 to ₹ 5, 50,000 per opening.
PROS: Lowest cost anti-tailgating device, readily accepted by most users, relatively unobtrusive, well-proven and reliable.

CONS: Can easily be climbed over or under, requires separate door or gate for emergency exit and for handicapped users, easily defeated by knowledgeable intruder, can be somewhat noisy when operated.

Comments: Good choice for use at visitor lobbies or employee entrances where cost is a consideration. Works best when turnstile can be observed by security officer or receptionist to allow detection of people climbing over or under the device.

FULL-HEIGHT MECHANICAL TURNSTILE
Description: Rotating mechanical barrier arms installed to prevent passage through opening. Extends from floor to height of approximately eight feet. Electrically-controlled, using valid access card causes arms to unlock allowing passage of one person. Turnstile can be controlled in both directions, or allow free-passage in one direction.

Approximate cost: ₹ 14,50,000 to ₹ 15,50,000 per opening.

PROS: Provides good security at a moderate cost. Well-proven and reliable.

CONS: Obtrusive in appearance, requires separate door or gate for emergency exit and for handicapped users, lacks sophisticated anti-piggybacking detection features, can be somewhat noisy when operated.

Comments: Good choice for commercial and industrial facilities where security and cost considerations are more important than appearance.

OPTICAL TURNSTILE
Description: Consists of two freestanding pillars mounted on each side of opening. Equipped with electronic sensor beams that transmit between pillars. Passing though opening interrupts sensor beam and causes alarm unless valid access card has first been used. Sensor beams are connected to computer processor that detects when more than one person attempts to pass though opening on a single card. Turnstile can be controlled in both directions, or allow free-passage in one direction. Available with or without mechanical barrier arms and in a wide variety of styles and finishes.

Approximate cost: ₹ 20, 50,000 to ₹ 25, 50,000 per opening.

PROS: Aesthetically-pleasing appearance, accommodates handicapped users, does not require separate emergency exit, has sophisticated anti-piggybacking detection systems, provides good visual and audible cues to users.

CONS: Expensive, units without barrier arms provide no physical deterrent, must be used at an entrance manned by security guard, relatively high "false alarm" rate, some user training required to work effectively.

Comments: Good choice for use in manned building lobbies where aesthetics prevent the use of a half-height manual turnstile.

SECURITY REVOLVING DOOR
Description: Standard revolving door that has been specially modified for security use. Extends from floor to a height of approximately eight feet. Typically has multiple quadrants equipped with electronic sensors that detect number of people in each quadrant. Use of valid access card allows one person to pass through door, if more than one person attempts to enter, door sounds alarm and reverses to prevent entry. Door can be controlled in one or both directions.

Approximate cost: ₹ 70,00,000 to ₹ 75,00,000 per opening.

PROS: Provides best protection against tailgating and piggybacking, fast, handles high volumes of traffic, unobtrusive in appearance, provides energy savings when used at exterior entrances.

CONS: Very expensive, requires separate door or gate for emergency exit and for handicapped users, door cannot be used for loading/unloading of large objects, relatively high maintenance costs.

Comments: Good choice for use at unattended building entrances where appearance is important.

SECURITY PORTAL (also called "Security Vestibule" or "Mantrap")
Description: Consists of passageway with door at each end. Regular swinging doors or automatic sliding doors can be used. Passageway is equipped with sensors that detect total number of people present. Sensors can include electronic beams, floor mat switches, and weight detectors. Video cameras with analytic software can also be used (see video analytics below). To use, user enters passageway and closes door behind him. He then proceeds to second door, and uses access card to enter. If more than one person is present in passageway, portal sounds an alarm and prevents entry. Portal can be controlled in one or both directions.

Approximate cost: ₹ 18,50,000 to ₹ 21,50,000 per opening.

PROS: Provides good protection against tailgating and piggybacking, unobtrusive in appearance, accommodates handicapped users, does not require separate emergency exit, allows load/unloading of large objects.

CONS: Expensive, relatively slow, cannot support large volumes of traffic, some versions can have high maintenance costs.

Comments: Good choice for use at unattended building entrances with relatively low traffic volumes and for entrances into high security internal areas, such as computer rooms.

DOORWAY ANTI-TAILGATING DEVICE
Description: Consists of devices installed on each side of regular doorway. Equipped with electronic sensor beams that transmit between devices. Passing though opening interrupts sensor beam and causes alarm unless valid access card has first been used. Sensor beams are connected to computer processor that detects when more than one person attempts to pass though opening on a single card. Doorway can be controlled in both directions, or allow free-passage in one direction.

Approximate cost: ₹ 6,00,000 to ₹ 7,00,000 per opening.

PROS: Easy add-on to existing doors; provides good protection against tailgating and piggybacking, unobtrusive in appearance, accommodates handicapped users, does not require separate emergency exit, allows loading/unloading of large objects, relatively inexpensive.

CONS: Must be used at an entrance manned by security guard, does not provide good visual and audible cues to users, some false alarms.

Comments: Good choice for use at doorways with relatively low traffic volumes and where conditions do not permit the use of another type of device.

VIDEO ANALYTICS ANTI-TAILGATING SYSTEMS

Description: Consists of video cameras installed at doorway opening. Cameras are connected to a computer with special video analytics software that detects and analyzes people and objects at the door. System may use multiple cameras that allow precise determination of object size, height, and direction of travel. When used at single door, video analytics anti-tailgating systems work similarly to doorway anti-tailgating devices and sound alarm when more than one person attempts to enter through door after a valid access card has been used. Video analytics anti-tailgating systems can also be used with security portals to both sound alarm and deny access when more than one person attempts to enter.
Approximate cost: ₹ 3,50,000 per opening for single door system, ₹ 12,50,000 to ₹ 15,50,000 for security portal system.

PROS: Easy add-on to existing doors; provides good protection against tailgating and piggybacking, unobtrusive in appearance, accommodates handicapped users, does not require separate emergency exit, allows loading/unloading of large objects.

CONS: Single door systems do not provide a physical barrier so must be used at an entrance manned by security guard, requires frequent user training to prevent false alarms, relatively expensive.

Comments: Popular choice for use at computer rooms and other high-security facilities.

Selecting the Right Anti-Tailgating System

Choosing the right anti-tailgating system is an important decision. You need to consider your overall level of security risk, your ability to provide security staff to monitor your entrances and respond to alarms, and your budget for initial purchase and ongoing maintenance of the anti-tailgating systems.

Artical Publish by Safe Secure Magazine in the month of May 2019 issue.

Sunday, May 5, 2019

8-steps System Integration Model

8-steps System Integration Model

BEMS, BMS, BAS, EMCS, and this list goes on and on. Welcome the acronym-filled wasteland know as building automation. What you are about to read may seem high-level, but I promise if you follow these steps you will take your skills to the next level. Let’s begin.
One of the persistent challenges I hear from my audience is around the topic of systems integration. Automated Buildings readers you’re in luck! Today I am going to give you a high-level overview of my 8-step process for systems integration.

The Systems Integration Model
Using this process I have personally done some of the most complex integrations in the smart building space.

OPC integration bringing 13 different Building Automation systems AND THEIR DATABASES into a single front end. Check!
Tying together Lighting, Physical Security, Video Management, BAS, Maintenance Management Software, and Google Calendars for scheduling. Check!
Writing applications that consume XML data feeds from clinical systems and then convert this data into a BAS system. You Bet!
What you are about to read may seem high-level, but I promise if you follow these steps you will take your skills to the next level. Let’s begin.

Step #1: Define the Business Challenge 
This may seem like an odd step especially for technical folks. The reality is without defining the business challenge you will never get adoption and support from all of the different stakeholders.


Step #2: Create the Use Case 
Now that you have defined the business challenge you need to create the use case. I prefer to use the UML modeling method for my use cases but you can use whatever method you and your customer are comfortable with. The key point is to:

·         Capture what the outcome is
·         How the outcome is reached
·         Who is taking the action
·         What action they are taking

Step #3: Identify the Systems 
You now have a functional use case. We will now begin to dive into the technical aspects of integration. It is here that you will go and dig into the use case and identify the systems that are being used. You need to be very detailed in this step. Often times there will be systems that are being used that are not called out in the use case. You want to:

·         Identify the systems in the use case
·         Identify any systems required but not detailed in the use case
·         Identify any people in the use case

Step #4: Detail out the Data Flows
Now that we have the systems detailed out we need to define our data flows. Where is data flowing? I like to use Crow’s Foot notation to show how my data flows are laid out. Essentially what you are trying to do at this point is to detail out:

·         Who is the master system and who is the slave system
·         Which way data flows in the integration
·         If the data will be one-to-one, one-to-many or many-to-many

Step #5: Build the Data Model
Great! We know which way data is flowing. Now we need to detail out our data model. 

What points do we need from each system? 
How will the points be formatted? 
What protocol will the points use? 
It is here that we detail out our “data model”. For this I like to use the UML class diagram. It may seem like overkill but a class diagram is a great tool to avoid having systems that won’t map to one another.

In the class diagram I map out:
·         The points that will be available at each system
·         How the points are formatted
·         The frequency of the points being sent

Step #6: Map out the Network Connections
Naturally we need to send data to and from our systems. The way we do this is via the network. Now you may be wondering why I waited to do a network map until now.

The reason I waited is because I wanted to know which systems needed to talk with one another. By first detailing out my data models and my data flows I defined who really has to talk to who. 
Many folks will look at the use case and immediately start mapping out their network connections. This results in people missing key systems that the use case did not actively mention.

Step #7: Prepare the Physical Integrations
It is at this point that we will want to begin to prepare the physical integrations. Here we will setup any integration cards, protocol gateways, etc. At this point in the process you should have a clear path to finishing your integration. This step usually includes:

·         Setting up any integration gateways
·         Configuring IP addresses
·         Working with IT to get any routing setup

Step #8: Implement the Integration
This almost isn’t a step! You simply need to implement your network map and data model. Really at this point you simply need to show up and coordinate the other vendors. It’s funny to me because this is the step so many people try to do first and then they wonder why this step is so hard. 

Honestly, if you’ve done each of the steps up to this point this step should be a non-event.
Artical Publish by Safe Secure Magazine in May 2019 edition.