1.1.6. Integrating with External Security Systems