Is convergence a reality?

October 2011 Integrated Solutions

How far are we down the road to true convergence of physical and logical security? Are businesses aware of the benefits around convergence? Is the technology affordable for smaller businesses? These are some of the questions Hi-Tech Security Solutions posed to Kevin Monk and Brendon Hall.

A company’s physical and logical information networks and user interfaces have been completely separate for years. Building access/physical security systems are typically put in place by either the owner of the building or, in the case of larger businesses, by the business’s security department while network and data security/logical security systems are the domain of the IT department. Each one was developed separately within the organisation.

There has been a lot of hype around the convergence of the physical and logical security environments and the market has seen varying degrees of success in application. From the outset it is important to acknowledge that if one wants to combine these different, yet symbiotic offerings it will be necessary to implement both cultural and technological changes in an organisation.

Kevin Monk, technical director at the Bidvest Magnum Group which provides integrated security solutions, said: “I believe that companies are becoming more aware of the convergence of the functions of the IT department and the facilities (risk assessment and/or security) department. Currently though, they seem to be addressed primarily from an access control system standpoint. Typically, a biometric reader controls access of people and information from various locations is assimilated via a centralised database instead of a number of disparate databases at different branches or locations.”

Kevin Monk
Kevin Monk

Brendon Hall, MD of Pentagon Distributors (a division of Elvey Security Technologies) agreed that there is a growing awareness and acceptance of convergence. “Companies are now becoming more demanding as the benefits of what convergence can achieve are made more apparent. Not only are they requesting convergence, but they are very clear that it has to take place at the highest technological level that their CAPEX allows.”

Brendon Hall
Brendon Hall

Hall is excited about the rapid advance of technology and the increasing need to bring the two faculties together in order to provide companies with a highly sophisticated building and security management system. “I believe there is a huge possibility that in some ways we are more advanced than some of the global players. This has a lot to do with the fact that our customers in South Africa do not just want a one-size-fits-all solution – they are demanding and driving customised systems. This can be attributed to the fact that they have been exposed to the various technology offerings on the market and want systems geared around maximum operability and benefit.”

Coming to the party

According to Monk, the majority of systems integrators claim to be implementing converged systems. “However, this certainly does not imply that they are all doing installations at the same level. We are seeing a huge variance in terms of sophistication and quality. Many of the players were exposed to the start of convergence with the introduction of traditional building management systems (BMS) and the more recent physical security information management (PSIM) both of which include the integration of HVAC, intercoms, alarms, access control, CCTV surveillance and PA systems.”

For the logical aspect it is important that there are firewalls in place to prevent hacking of the systems once convergence takes place. “Imagine how devastating it could be if someone hacked into your security system via the IT infrastructure. An advantage of convergence, however, if it is properly instituted and controlled, is that companies will now have an audit trail for all their actions, specifically from a legal perspective.”

He continued that it is mainly the larger companies, with similarly large budgets, who are able to implement fully converged systems. Most of the clients that have gone this route fall into the category of the big multinationals due to the fact that this level of technological sophistication comes at a premium. However, this does not mean that the smaller companies are not also joining the party. They merely budget for simpler systems that do not have all the bells and whistles. In these instances, these smaller companies often outsource their IT component and it would behove them to ask for suitable solutions.

Hall said that they are seeing a lot of convergence action from the tertiary institutions, banks and centralised retail distribution centres. “These clients know what they want, ask the appropriate questions and demand suitable solutions. In general they already have decentralised systems in place and wish to bring control back to a central point.”

He explained that Pentagon has entered into a collaborative agreement with Cengence International to provide clients with product-agnostic PSIM technology. “Cengence is an integration platform with centralised intelligence capacity that undertakes data and product integration, as well as data and pattern analysis. This assists with the proper execution of plans, strategies and tasks in accordance with standard operating procedures, thereby raising efficiencies and containing or eliminating risks.”

Monk agrees that what is needed are open protocol systems which can be integrated into a large number of vendor products. “This will in turn open up the prospect of convergence to many more businesses.”

Convergence for all companies is imminent since most security systems now run on TCP/IP. “It is rare to find a system that does not link straight onto a network and as the technology evolves and becomes more affordable, it will be considered the de facto standard.”

“The prediction model is the next logical step. This will ascertain exactly what should be done with information gathered, for example, ‘predict the behaviour of people using CCTV surveillance and allow or disallow access based on the information feedback’. The system would therefore look for exceptions in predetermined rule sets and act accordingly,” said Hall.

Cautionary notes

From a budgetary perspective, it makes sense to try to use and integrate with


pre-existing systems. However, this is naturally dependent on the ability of add-on solutions to successfully interface with older technology. Solutions need to recognise both the physical and logical sides of security convergence and ensure that they can both use the resulting converged solution.

The solutions that do not require extensive changes to resident IT and building access technology systems will be the easiest to adopt and therefore the most probable to be adopted.

Clear communication of intentions needs to be carefully orchestrated in order to ensure the full cooperation of both the IT and security/risk departments. “There will naturally be some level of concern from, specifically, the security managers that their jobs are at risk. This need not be the case as both departments have vital roles to play in the ongoing success of convergence,” said Monk.

The bottom line is that in order to provide the optimal level of incident detection, physical and logical security solutions have to converge. The extent and speed of execution, however, are dependent on the attitude of management towards this convergence; the buy-in and cooperation from both the IT and risk assessment/security departments; and the allocated budget.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Dynamic Dashboard enhances security and operational efficiency
Suprema neaMetrics Products & Solutions Integrated Solutions Residential Estate (Industry)
In today’s data-driven world, security systems are overwhelmed by an unprecedented volume of data, from video surveillance and access control logs to intrusion alerts and a variety of IoT sensor data.

Read more...
HELLO visitor access management
Products & Solutions Access Control & Identity Management Integrated Solutions Residential Estate (Industry)
HELLO is an on-premises visitor and contractor access management solution designed to be fully integrated and complementary with smart, on-trend technologies, securing estates and businesses alike.

Read more...
Using KPIs to measure smart city progress
Axis Communications SA Residential Estate (Industry) Integrated Solutions Security Services & Risk Management
United 4 Smart Sustainable Cities is a United Nations Initiative that encourages the use of information and communication technology (including security technology) to support a smooth transition to smart cities.

Read more...
Enhancing estate security, the five-layer approach
Fang Fences & Guards Residential Estate (Industry) Integrated Solutions Security Services & Risk Management
Residential estates are designed to provide a serene and secure living environment enclosed within gated communities, offering residents peace of mind and an elevated standard of living.

Read more...
Creating employment through entrepreneurship
Technews Publishing Marathon Consulting Editor's Choice Integrated Solutions Residential Estate (Industry)
Eduardo Takacs’s journey is a testament to bona fide entrepreneurial resilience, making him stand out in a country desperate for resilient businesses in the small and medium enterprise space that can create employment opportunities.

Read more...
The importance of physical security in data centres
OPTEX Perimeter Security, Alarms & Intruder Detection Integrated Solutions
In today's digital age, data centres serve as the backbone of the global economy, and ensuring the security of these facilities is paramount, not only to protect data from cyberthreats, but also to safeguard against physical intrusions.

Read more...
MySecurityApp for SME security firms
Surveillance Integrated Solutions
Solution House Software has introduced MySecurityApp, a platform that expedites security operations management for startup and growing security companies by delivering a comprehensive and user-friendly mobile app designed to simplify setting up and growing security companies’ operations.

Read more...
MySecurityApp for SME security firms
Surveillance Integrated Solutions
Solution House Software has introduced MySecurityApp, a platform that expedites security operations management for startup and growing security companies by delivering a comprehensive and user-friendly mobile app designed to simplify setting up and growing security companies’ operations.

Read more...
Card tapping turns expensive with new scam
Integrated Solutions
The ability to tap-and-go makes life easier and more convenient, but Richard Frost, Product Head at Armata, warns that it may cost consumers more than they bargained for.

Read more...