Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Software Solutions Drive Convergence

By Cynthia Freschi
July 1, 2007


There seem to be two different perceptions of and definitions for “convergence” in the industry.

Physical security professionals, for the most part, define convergence in terms of integrating previously disparate security systems such as video surveillance and access control with other facility related systems such as RFID tracking systems or fire safety systems.

IT-based personnel have evolved a different, often more complex definition of convergence that takes integration of security systems to a higher level by incorporating IT applications such as human resources and traditional IT security into the model.

In either case, it’s apparent that software is driving convergence on both fronts.

Business In Charge

This is clearly not a trend driven by technology (for technology’s sake) as we’ve often seen with other developments that sweep an industry like digital recording. Today’s users are looking for increased integration between operations to meet compliance regulations, reduce costs and improve security at their facilities. Unlike just a few years ago, security is a top priority in every private and public sector. Homeland defense, the gaming industry, Fortune 1000 companies and a handful of other market categories are steering security system suppliers onto a new course for systems product development that is shifting away from hardware-driven solutions to convergence through the implementation of more highly integrated software-driven solutions.

The roadmap to convergence is just starting to come to fruition on a practical level with software solutions that truly integrate video surveillance and access control systems (e.g. card access, visitor management and badging systems) along with other key security applications. We are also seeing the implementation of more sophisticated software-based solutions that integrate more traditional IT applications on the enterprise level in an effort to create one identity for employees that can be used globally. Big stuff, but the jury is still out on the “interoperability” of these enterprise level solutions – the new industry buzzword of the month.

Practically speaking, security systems are already being updated to perform complex integrated operations. Today’s digitally-driven and networked systems allow much more sophisticated levels of interoperability whereby they can perform complex operations simultaneously and automatically. However, the level of integration varies depending on the specific software-driven function that crosses platforms enabling a much broader range of applications. As more powerful software solutions are written, system designers can integrate security and IT applications onto a single control platform.

Everything’s Together

By bringing together security applications such as access control, video surveillance, object video, biometrics and fire/alarm/event monitoring, with the business applications such as point-of-sale (POS), human resources, physical asset management and RFID tracking – security and IT management will be able to control all system operations as a single entity. This level of system control makes the management of electronic data extremely efficient. More specifically for video surveillance applications, a central database provides the ability to organize, match and retrieve recorded data and images by correlating live and/or recorded video to the data associated with a specific event.

This is a highly sought attribute of newer software-driven, network-based technologies since systems can be programmed to react to specific scenarios or “policies” established by corporate management. One of the initial applications for this level of integration is the integration of POS devices with video surveillance systems. If an event occurs which matches any pre-defined scenarios, the control platform will archive transaction data along with the multiple video feeds of the event. All pertinent information can then be simultaneously sent to security personnel for review.

But even as this software revolution takes hold, the need for hardware still exists. For example, today’s virtual matrix switching systems promise to provide enhanced levels of functionality, but they have yet to offer the proven performance and capabilities afforded by today’s leading switching systems. How these systems are connected and interfaced with other security systems is another issue, and again, software is at the core of the solution.

The fact is – the security industry has just started to really concentrate on the implementation and upgrades to the new software-centric, server-based enterprise level system solutions. Regardless of which model of convergence you have embraced, don’t throw away your hardware-based video switching systems just yet. Instead I suggest you get up to speed on new server/software developments so you’re ready to make the move to a more fully integrated software-driven control platform when the time is right.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Cynthia Freschi is president of North American Video, with fully staffed offices located in five states. Her firm is an SDM Magazine Top Systems Integrator.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Software Sets the Course for New System Solutions

    See More
  • The Next Wave of Integration:IP as a Backbone for Systems Convergence

    See More
  • Safe Convergence Bet

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing