Is convergence a reality?

October 2011 Integrated Solutions

How far are we down the road to true convergence of physical and logical security? Are businesses aware of the benefits around convergence? Is the technology affordable for smaller businesses? These are some of the questions Hi-Tech Security Solutions posed to Kevin Monk and Brendon Hall.

A company’s physical and logical information networks and user interfaces have been completely separate for years. Building access/physical security systems are typically put in place by either the owner of the building or, in the case of larger businesses, by the business’s security department while network and data security/logical security systems are the domain of the IT department. Each one was developed separately within the organisation.

There has been a lot of hype around the convergence of the physical and logical security environments and the market has seen varying degrees of success in application. From the outset it is important to acknowledge that if one wants to combine these different, yet symbiotic offerings it will be necessary to implement both cultural and technological changes in an organisation.

Kevin Monk, technical director at the Bidvest Magnum Group which provides integrated security solutions, said: “I believe that companies are becoming more aware of the convergence of the functions of the IT department and the facilities (risk assessment and/or security) department. Currently though, they seem to be addressed primarily from an access control system standpoint. Typically, a biometric reader controls access of people and information from various locations is assimilated via a centralised database instead of a number of disparate databases at different branches or locations.”

Kevin Monk
Kevin Monk

Brendon Hall, MD of Pentagon Distributors (a division of Elvey Security Technologies) agreed that there is a growing awareness and acceptance of convergence. “Companies are now becoming more demanding as the benefits of what convergence can achieve are made more apparent. Not only are they requesting convergence, but they are very clear that it has to take place at the highest technological level that their CAPEX allows.”

Brendon Hall
Brendon Hall

Hall is excited about the rapid advance of technology and the increasing need to bring the two faculties together in order to provide companies with a highly sophisticated building and security management system. “I believe there is a huge possibility that in some ways we are more advanced than some of the global players. This has a lot to do with the fact that our customers in South Africa do not just want a one-size-fits-all solution – they are demanding and driving customised systems. This can be attributed to the fact that they have been exposed to the various technology offerings on the market and want systems geared around maximum operability and benefit.”

Coming to the party

According to Monk, the majority of systems integrators claim to be implementing converged systems. “However, this certainly does not imply that they are all doing installations at the same level. We are seeing a huge variance in terms of sophistication and quality. Many of the players were exposed to the start of convergence with the introduction of traditional building management systems (BMS) and the more recent physical security information management (PSIM) both of which include the integration of HVAC, intercoms, alarms, access control, CCTV surveillance and PA systems.”

For the logical aspect it is important that there are firewalls in place to prevent hacking of the systems once convergence takes place. “Imagine how devastating it could be if someone hacked into your security system via the IT infrastructure. An advantage of convergence, however, if it is properly instituted and controlled, is that companies will now have an audit trail for all their actions, specifically from a legal perspective.”

He continued that it is mainly the larger companies, with similarly large budgets, who are able to implement fully converged systems. Most of the clients that have gone this route fall into the category of the big multinationals due to the fact that this level of technological sophistication comes at a premium. However, this does not mean that the smaller companies are not also joining the party. They merely budget for simpler systems that do not have all the bells and whistles. In these instances, these smaller companies often outsource their IT component and it would behove them to ask for suitable solutions.

Hall said that they are seeing a lot of convergence action from the tertiary institutions, banks and centralised retail distribution centres. “These clients know what they want, ask the appropriate questions and demand suitable solutions. In general they already have decentralised systems in place and wish to bring control back to a central point.”

He explained that Pentagon has entered into a collaborative agreement with Cengence International to provide clients with product-agnostic PSIM technology. “Cengence is an integration platform with centralised intelligence capacity that undertakes data and product integration, as well as data and pattern analysis. This assists with the proper execution of plans, strategies and tasks in accordance with standard operating procedures, thereby raising efficiencies and containing or eliminating risks.”

Monk agrees that what is needed are open protocol systems which can be integrated into a large number of vendor products. “This will in turn open up the prospect of convergence to many more businesses.”

Convergence for all companies is imminent since most security systems now run on TCP/IP. “It is rare to find a system that does not link straight onto a network and as the technology evolves and becomes more affordable, it will be considered the de facto standard.”

“The prediction model is the next logical step. This will ascertain exactly what should be done with information gathered, for example, ‘predict the behaviour of people using CCTV surveillance and allow or disallow access based on the information feedback’. The system would therefore look for exceptions in predetermined rule sets and act accordingly,” said Hall.

Cautionary notes

From a budgetary perspective, it makes sense to try to use and integrate with

pre-existing systems. However, this is naturally dependent on the ability of add-on solutions to successfully interface with older technology. Solutions need to recognise both the physical and logical sides of security convergence and ensure that they can both use the resulting converged solution.

The solutions that do not require extensive changes to resident IT and building access technology systems will be the easiest to adopt and therefore the most probable to be adopted.

Clear communication of intentions needs to be carefully orchestrated in order to ensure the full cooperation of both the IT and security/risk departments. “There will naturally be some level of concern from, specifically, the security managers that their jobs are at risk. This need not be the case as both departments have vital roles to play in the ongoing success of convergence,” said Monk.

The bottom line is that in order to provide the optimal level of incident detection, physical and logical security solutions have to converge. The extent and speed of execution, however, are dependent on the attitude of management towards this convergence; the buy-in and cooperation from both the IT and risk assessment/security departments; and the allocated budget.

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Smart water management
Axis Communications SA CCTV, Surveillance & Remote Monitoring Integrated Solutions
South Africa is currently facing a water crisis, with scarcity and inefficient water management posing significant challenges to sustainable, consistent access to water. Smart technology and powerful partnerships may offer a proactive solution to SA's water crisis.

Empowering Istanbul’s public transportation
Dahua Technology South Africa CCTV, Surveillance & Remote Monitoring Integrated Solutions
Dahua's intelligent transportation solution, using technologies like DSM and AI-based passenger flow counting, has facilitated an intelligent system upgrade for nearly 6 400 minibuses and electric buses in Istanbul.

Collaboration delivers integrated and holistic security
Guardian Eye CCTV, Surveillance & Remote Monitoring News Integrated Solutions
Guardian Eye and Lytehouse have partnered to integrate their speciality solutions and provide a holistic security offering that overcomes the fragmentation of security systems and services.

Smart obsession: Cities within security
Business Connexion Integrated Solutions IT infrastructure
Rebatho Madiba, from BCX, explores the security and connectivity considerations that define the development of smart city foundations, naturally, with connectivity and security the most important considerations.

Project services to best-practice standards
Mustek Security Technologies Integrated Solutions
Mustek Security Technologies is dedicated to providing security solutions and distributing the full spectrum of blue-chip surveillance solution-driven products, primarily for the government and corporate arena.

Rapid deployment video surveillance
Blacklight Group CCTV, Surveillance & Remote Monitoring Integrated Solutions
Kelly McLintock explores the importance of implementing rapid deployment video surveillance systems on construction sites to enhance safety, minimise losses, eliminate downtime, and promote productivity.

Cultivating safer and smarter cities
CCTV, Surveillance & Remote Monitoring Integrated Solutions
As a provider of video management software (VMS) and physical security information management (PSIM) solutions, AxxonSoft enables cities to anticipate and respond swiftly to security threats through advanced video analytics and intelligent surveillance capabilities.

Overcoming resistance to changing your current operating model
Editor's Choice Integrated Solutions
Business survival goes beyond cutting costs and driving efficiency, it’s about using data and technology as strategic assets to develop speed, agility and resilience, keep up with customer demands, beat the competition and grow the business.

Access to sustainability
Gallagher Integrated Solutions
With access control and mobile solutions rapidly advancing, businesses have an unprecedented opportunity to exceed expectations with frictionless experiences, while also cutting costs on energy efficiency and supporting sustainability efforts.

Cloud for security and operational optimisation
Secutel Technologies Retail (Industry) CCTV, Surveillance & Remote Monitoring Integrated Solutions
With the abundance of services available to retailers, SMART Security Solutions asked Andre Vermeulen, GM at Secutel Technologies about what the company’s SecuVue cloud services can do for this market.