Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Bless this Union

August 1, 2005
Building automation may be the place where physical security and IT security converge.
A recent analyst report from Forrester Research of Cambridge, Mass. stated that North American private-sector firms will spend $191 million on IT and physical security convergence projects, and that government will contribute another $500 million toward broader convergence programs in 2005. Several leading security companies are either scrambling to create new technology or looking for partners to handle the demand.

Millions of dollars are lost each year due to stolen or damaged physical assets or the unavailability of mission-critical systems. The convergence of physical and IT security is a well-accepted trend that has already taken root in many organizations. But a less-noticed trend that is also gaining traction is building automation controls systems integrators providing integrated physical security (HVAC and security integrated on one console).

Trends converge

Two complimentary convergence trends are influencing the adoption rate and preferred suppliers as physical and IT security converge:

An end user convergence that includes the security decision maker(s), the facilities decision maker(s) and the IT decision maker(s) collectively making the decisions and acting interdependently.

A supplier convergence that includes security functionality, building automation controls (HVAC) and integration with IT network management systems being integrated from one supplier.

Some independent building automation controls manufacturers are sourcing IP-based access control, video surveillance and environmental monitoring solutions to their independent systems integrators today. Independent controls manufacturers and suppliers must offer security functionality to compete with the larger industry giants that have acquired security companies to offer a one-stop shop solution.

Building automation controls system integrators are better positioned today to be the premier and preferred supplier of integrated security and HVAC solutions to support physical and IT security convergence. The building automation controls manufacturers and controls systems integrators have a distinct advantage over the security dealers and the combined controls/security industry giants:

No internally owned legacy and/or proprietary products to hamper their solutions.

They embraced native IP-based technology as early as 1999, while the first security deployments of IP-based systems used grafted-on-thick clients and gateways to offer an IP-based enterprise security solution.

They have learned security and offer native IP-based security.

Offerings already integrated with their HVAC solutions – for example: one integrated console for security and HVAC that can interoperate with an IT console.

Local incumbents offering a level of personal and on-the-premises services that build trusted relationships.

?Business requirement to integrate access control to support energy management application.

Security dealers are not in a position to learn HVAC and offer integrated solutions.

IT departments are not in a position to learn physical security because of workload and a lack of standards in the physical security space.

Convergence can also mean connecting the processes for granting and revoking IT access and building access.

Assertions

It is widely acknowledged that convergence between physical security and IT security (cyber security) is happening, albeit at a slow rate. This is a convergence of services at the end-user level. This does not necessarily mean that IT will run or absorb physical security.

A second convergence has been happening for over five years, and is gaining momentum, at the physical security and building automation controls supplier level. This is a convergence at the supplier level.

Truly open standards, based on thin-client IP browser-based technology, will be required by IT departments as they take an even more active role in the decision-making process to ensure they adequately manage risks, leverage their skills and become accountable for the converged network availability.

How does it happen?

In 2004, 20 percent of respondents to a survey by Agility PR on behalf of Axis Communications (U.K.) Ltd. “found that security buying patterns are changing. More than a quarter (28 percent) believed that the physical security buying decision was not in the hands of the IT director and his senior management as against 20 percent last time.”

The magic question: Who will provide the open, IP-based (designed, not bolt-on) solutions that integrate with the IT network management systems and fulfill the requirements of the security department and the facilities manager?

According to the survey, the ultimate providers will be a combination of:

Highly skilled building automation systems integrators – 75 percent probability.

Large government and IT systems integrators that subcontract to the building automation system integrators for controls and physical security, deployment, support and maintenance – 70 percent probability.

Security systems integrators that offer the same IT-friendly systems for standalone opportunities – 75 percent probability

Industry giants will re-architect their proprietary solutions that use bolt-on, thick clients and/or Lantronix RS-232 to IP converters to an open, IP-based solution that rides the technology cost curve – 30 percent probability.

The Forrester Research report – “Security Convergence Gets Real” – bulleted four areas of cost-cutting convergence.

Consolidate credentials for IT and physical access onto a single card. A smart card can serve as an ID badge for building access and can also store IT credentials like passwords and digital certificates.

Connect the processes for granting and revoking building and IT access. Linking the processes for managing employees’ IT access rights with those for managing their building access will get people productive quicker and will improve security.

Correlate security events across the physical and IT realms. Security event management systems, presently used to monitor and respond to IT-related events, should incorporate events from physical security systems. An alert should trigger if, for example, the VPN signals an employee logging in remotely while the badging system indicates that he is inside the corporate office.

Unify the auditing of physical and IT rights and events. By assessing authentication and authorization processes and controls across IT and physical facilities, organizations will find many opportunities for improved efficiencies and security. For example, Forrester recently performed an audit that showed ways in which one company could streamline processes of employee and visitor badging by integrating existing identity management systems.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Person using ATM

    Breach exposed information of more than 500,000 credit union members

    See More
  • Credit Union and MasterCard Announce First U.S. Biometric Payments Pilot

    See More
  • Devon Bryan

    Devon Bryan named CISO for MUFG Union Bank

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing