How the Race to the Bottom Hurts Your Clients, Your Installations, and Your Reputation
As a security integrator, I see it every week: security bids get compared like they’re all the same product. A camera is a camera. A card reader is a card reader. An alarm panel is an alarm panel. But security isn’t a commodity. It’s a professional service that has to be designed, installed, configured, and […]
Wiegand vs. OSDP: Why Your Reader-to-Controller Wiring Matters
If you’re planning an access control upgrade, it’s easy to focus on readers, credentials, and software. But one of the biggest security (and reliability) decisions often hides in plain sight: the communication path between the reader at the door and the controller in the panel. That’s where the Wiegand vs. OSDP conversation matters. In simple […]
Legacy Access Credentials: The Hidden Risk Lurking in Your Access Control System
If your building still uses 125 kHz proximity (“prox”) cards or fobs, you may have an access control problem that’s bigger than “old tech.” You may have credentials that can be cloned quickly, cheaply, and without advanced skills—putting your people, property, and data at risk. This isn’t a scare tactic. It’s a reality many organizations […]
The Importance of Security Systems in Your Business: Reduce Risk, Support Insurance, and Protect Operations
Business security isn’t just about stopping theft. A properly designed security system helps you reduce operational risk, document incidents, and protect day-to-day operations. In many cases, it can also support better insurance outcomes—because insurers price policies based on exposure, controls, and claims history. Below is a practical guide to what matters, what to install, and […]
Cybersecurity for Access Control Systems: VLANs, Firewall Rules, Least-Privilege, Credentials & Technologies
Access control systems are IP-connected devices on your network—often with persistent server connections, remote administration, and integrations into video, HR, and identity systems. That makes them a real cybersecurity surface area. Below are the practical basics that reduce risk fast: segmentation (VLANs), tight firewall rules, least-privilege access, plus the credential technologies and security features that […]
Software House iSTAR Panels Offline? What You Need to Know About the February 18 TLS Certificate Expiration
Over the past week, we’ve been inundated with calls from end users and integrators alike. The common denominator: limited familiarity with Software House / C•CURE 9000 architecture—and sudden, widespread panic over iSTAR panels dropping offline. If this sounds like what your facility is dealing with right now, you’re not alone. What Happened on February 18, […]
Is Your MSP Legally Licensed to Install Security Cameras in New Jersey? Often, No.
At Systems Integrations, we speak with new clients every week who are unknowingly putting their businesses at risk. The scenario is usually the same: a business needs new video surveillance cameras or data cabling, and they ask their Managed Service Provider (MSP) to handle it. It makes sense on the surface. Modern security cameras are […]
Navigating Access Control Compliance in New Jersey (ADA, NJ UCC, and the Barrier Free Subcode)
Access control in New Jersey isn’t just about choosing the right card reader or electrified lock—it’s about installing it in a way that passes inspection, supports safe egress, and meets strict accessibility requirements. For commercial properties across South Jersey and the Delaware Valley, compliance typically comes down to three overlapping frameworks: Below is a practical, […]
Access Control 101: Mobile Credentials vs. Key Fobs—Which Is Right for Your Office?
If your office is still using older key fobs or proximity cards, you may be relying on credential technology that’s easy to copy with inexpensive tools. We’ve seen more businesses across South Jersey and Southeast Pennsylvania assume “access control is access control,” only to learn that not all credentials offer the same level of protection. […]
CCURE 9000: Default TLS 1.2 Certificate Expiration and iSTAR Panels Offline? Here’s What to Do
If you found this post because your iSTAR access controllers suddenly went offline, you’re not alone. A common cause is the expiration of the default certificate used for TLS 1.2 communications between C•CURE 9000 and iSTAR controllers. In many cases, customers weren’t proactively warned—until doors, events, and controller communications started failing. Systems Integrations is here […]