Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Convergence’s Deafening Definitions

November 1, 2005
There’s no doubt that convergence is a hot button. There are myriad definitions, often based on the perspective of an end user or the market focus of a vendor.

Here is an interview with Michael Cation, CEO of NovusEdge, Austin, Texas, which provides one valuable viewpoint.

“Convergence should meet business needs to reduce costs, share resources and improve efficiency, and at the same time, meet the standards-based requirements of the IT department,” says Michael Cation.

ZALUD REPORT: What do today’s security professionals need to know about the convergence of physical security, IT and building automation systems?

CATION: History has shown that business economics, coupled with IT technology’s rate of change, will drive ever improving and converged solutions. One example of that trend is the convergence between physical security and IT “cyber” security. However, we believe that is only one part of the convergence story. There is a parallel and complimentary convergence between physical security and building automation, which will drive a consolidation of previously isolated solutions. The value added possibilities for such a consolidation include common access cards, shared video surveillance, energy management, integration with IT business processes, one corporate-wide security policy, etc. There are two major implications to security professionals for such a change:

Security professionals will soon be expected to manage integrated solutions that serve the needs of security, facilities management and IT professionals.

The solutions will need to be built on an open, standards-based architecture.

ZALUD REPORT: Why is it important to offer a product based on an open architecture vs. a closed proprietary system?

CATION: Only a security solution that is truly open can integrate with existing building automation consoles, corporate IP networks and IT network management systems.

ZALUD REPORT: How does using a distributed physical asset protection solution superior to a solely centralized approach improve an overall security efforts?

CATION: By distributing the control and intelligence for physical asset protection at the point of need, the system responds to alerts automatically and in real-time. Not only does this increase the speed of response, this approach is more reliable as compared to centralized, server-bound solutions. In addition, by utilizing the existing IP network as the backbone for the system, it can be managed and monitored from anywhere simply by using a browser. This increases the quality of security as well as significantly reducing the cost.

ZALUD REPORT: Explain the new role of the system integrator in responding to the demand for open standards and converged security systems?

CATION: One if the biggest changes is the expanding challenges being faced by facility managers today. A recent survey identified increased security as one of the most important issues affecting the jobs of facility managers – second only to the impact of computers. This trend has affected the supplier/channel side in two ways: first, the facility manager, faced with reducing costs, reducing liabilities and increasing productivity is now demanding an integrated building automation and security solution. Second, the facility manager is looking to the incumbent, trusted, local provider of the building automation system to provide an integrated solution that includes access control, video and environmental monitoring. The building automation system integrators benefited from understanding and embracing Internet networking and are uniquely positioned.

ZALUD REPORT: What types of technologies and products are essential to bring about complete convergence?

CATION: The key to complete asset protection is to provide a system that integrates access control, video surveillance and environmental monitoring. The system must be open and standards-based in order to connect with all card readers, cameras, sensors or management consoles. In addition, the system architecture should be IP-based in order to distribute the application and intelligence at the edge of the network while connecting to backend management consoles – ideally one that integrates security, building automation and IT operations.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Homeland Security Has Too Many Definitions

    See More
  • Software Solutions Drive Convergence

    See More
  • It’s the Business Basics with ID Convergence

    See More

Related Products

See More Products
  • threat and detection.jpg

    Surveillance and Threat Detection

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing