Is convergence a reality?

October 2011 Integrated Solutions

How far are we down the road to true convergence of physical and logical security? Are businesses aware of the benefits around convergence? Is the technology affordable for smaller businesses? These are some of the questions Hi-Tech Security Solutions posed to Kevin Monk and Brendon Hall.

A company’s physical and logical information networks and user interfaces have been completely separate for years. Building access/physical security systems are typically put in place by either the owner of the building or, in the case of larger businesses, by the business’s security department while network and data security/logical security systems are the domain of the IT department. Each one was developed separately within the organisation.

There has been a lot of hype around the convergence of the physical and logical security environments and the market has seen varying degrees of success in application. From the outset it is important to acknowledge that if one wants to combine these different, yet symbiotic offerings it will be necessary to implement both cultural and technological changes in an organisation.

Kevin Monk, technical director at the Bidvest Magnum Group which provides integrated security solutions, said: “I believe that companies are becoming more aware of the convergence of the functions of the IT department and the facilities (risk assessment and/or security) department. Currently though, they seem to be addressed primarily from an access control system standpoint. Typically, a biometric reader controls access of people and information from various locations is assimilated via a centralised database instead of a number of disparate databases at different branches or locations.”

Kevin Monk
Kevin Monk

Brendon Hall, MD of Pentagon Distributors (a division of Elvey Security Technologies) agreed that there is a growing awareness and acceptance of convergence. “Companies are now becoming more demanding as the benefits of what convergence can achieve are made more apparent. Not only are they requesting convergence, but they are very clear that it has to take place at the highest technological level that their CAPEX allows.”

Brendon Hall
Brendon Hall

Hall is excited about the rapid advance of technology and the increasing need to bring the two faculties together in order to provide companies with a highly sophisticated building and security management system. “I believe there is a huge possibility that in some ways we are more advanced than some of the global players. This has a lot to do with the fact that our customers in South Africa do not just want a one-size-fits-all solution – they are demanding and driving customised systems. This can be attributed to the fact that they have been exposed to the various technology offerings on the market and want systems geared around maximum operability and benefit.”

Coming to the party

According to Monk, the majority of systems integrators claim to be implementing converged systems. “However, this certainly does not imply that they are all doing installations at the same level. We are seeing a huge variance in terms of sophistication and quality. Many of the players were exposed to the start of convergence with the introduction of traditional building management systems (BMS) and the more recent physical security information management (PSIM) both of which include the integration of HVAC, intercoms, alarms, access control, CCTV surveillance and PA systems.”

For the logical aspect it is important that there are firewalls in place to prevent hacking of the systems once convergence takes place. “Imagine how devastating it could be if someone hacked into your security system via the IT infrastructure. An advantage of convergence, however, if it is properly instituted and controlled, is that companies will now have an audit trail for all their actions, specifically from a legal perspective.”

He continued that it is mainly the larger companies, with similarly large budgets, who are able to implement fully converged systems. Most of the clients that have gone this route fall into the category of the big multinationals due to the fact that this level of technological sophistication comes at a premium. However, this does not mean that the smaller companies are not also joining the party. They merely budget for simpler systems that do not have all the bells and whistles. In these instances, these smaller companies often outsource their IT component and it would behove them to ask for suitable solutions.

Hall said that they are seeing a lot of convergence action from the tertiary institutions, banks and centralised retail distribution centres. “These clients know what they want, ask the appropriate questions and demand suitable solutions. In general they already have decentralised systems in place and wish to bring control back to a central point.”

He explained that Pentagon has entered into a collaborative agreement with Cengence International to provide clients with product-agnostic PSIM technology. “Cengence is an integration platform with centralised intelligence capacity that undertakes data and product integration, as well as data and pattern analysis. This assists with the proper execution of plans, strategies and tasks in accordance with standard operating procedures, thereby raising efficiencies and containing or eliminating risks.”

Monk agrees that what is needed are open protocol systems which can be integrated into a large number of vendor products. “This will in turn open up the prospect of convergence to many more businesses.”

Convergence for all companies is imminent since most security systems now run on TCP/IP. “It is rare to find a system that does not link straight onto a network and as the technology evolves and becomes more affordable, it will be considered the de facto standard.”

“The prediction model is the next logical step. This will ascertain exactly what should be done with information gathered, for example, ‘predict the behaviour of people using CCTV surveillance and allow or disallow access based on the information feedback’. The system would therefore look for exceptions in predetermined rule sets and act accordingly,” said Hall.

Cautionary notes

From a budgetary perspective, it makes sense to try to use and integrate with

pre-existing systems. However, this is naturally dependent on the ability of add-on solutions to successfully interface with older technology. Solutions need to recognise both the physical and logical sides of security convergence and ensure that they can both use the resulting converged solution.

The solutions that do not require extensive changes to resident IT and building access technology systems will be the easiest to adopt and therefore the most probable to be adopted.

Clear communication of intentions needs to be carefully orchestrated in order to ensure the full cooperation of both the IT and security/risk departments. “There will naturally be some level of concern from, specifically, the security managers that their jobs are at risk. This need not be the case as both departments have vital roles to play in the ongoing success of convergence,” said Monk.

The bottom line is that in order to provide the optimal level of incident detection, physical and logical security solutions have to converge. The extent and speed of execution, however, are dependent on the attitude of management towards this convergence; the buy-in and cooperation from both the IT and risk assessment/security departments; and the allocated budget.

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

31 percent of all IoT SIMs managed with third-party IoT CMPs
News Integrated Solutions
Berg Insight recently released new findings about the market for IoT connectivity management platforms (CMPs), a standard component in the value proposition from mobile operators and IoT MVNOs around the world.

Creating a safe, smart city environment
Integrated Solutions
As more governments around Africa start embracing the smart city concept, significant investments will be required to strengthen the underlying infrastructure essential to keep systems and data safe.

Smart car parking solution eases traffic flow
Dahua Technology South Africa CCTV, Surveillance & Remote Monitoring Integrated Solutions Products
Ethiopia’s first smart parking lot, designed to improve traffic flow and management efficiency, has been built and installed using Dahua Technology’s smart parking solutions.

VMS 7.2 supports the investigation process and adds cloud capabilities
CCTV, Surveillance & Remote Monitoring Integrated Solutions Products
Qognify has launched the second release of its VMS, including extended support for body-worn video, additional functionalities to support investigations, and a new web client architecture. VMS 7.2 addresses the increasing use of body-worn video (BWV) across many sectors.

Hytera and KZN Police Service roll out digital call handling system
Government and Parastatal (Industry) Asset Management, EAS, RFID Integrated Solutions
Hytera Communications announced that the municipality of Ray Nkonyeni in the KwaZulu-Natal province of South Africa is now using its digital call handling system for the reporting and recording of crimes.

Cyber resilience is more than cybersecurity
Technews Publishing Editor's Choice Cyber Security Integrated Solutions IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Johnson Controls releases IQ4
Perimeter Security, Alarms & Intruder Detection Integrated Solutions
New lower cost panel leverages Qolsys IQ Platform targeting residential, SMB, builder, MDU/multi-family and wellness market segments.

SuperVision biometric access control
Integrated Solutions Access Control & Identity Management Products
SuperVision is a time & attendance (T&A) biometric access control system Fourier IT has been developing and enhancing for 18 years.

Shift to online driving retail transformation
Retail (Industry) Integrated Solutions
There is a growing demand from retail for an end-to-end solution that helps their digitisation process, integrating finance, procurement, warehouse management, pricing, stock management, point of sale and more.

AI in video analytics
CCTV, Surveillance & Remote Monitoring Integrated Solutions
AI (artificial intelligence), has been developed and debated ever since the first computers were invented, and while the most revolutionary incarnations are not yet here, AI-based technologies are widely used today.