Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Security Convergence – The Future can be found in the Past

March 1, 2010

What is the future of physical security as adoption of IP and Ethernet interfaces become more pervasive? Many of you are implementing IP technologies at an astronomical pace. In addition, new solutions are now utilizing IT security systems and information to expand your recognition and response capabilities. In a nutshell, the future of physical security hardware and software is moving towards a convergence with both the IT infrastructure (networks, servers and telecommunications) and IT security devices, IDs and policies. What does this mean for you and your staff? Will you be gobbled up into the IT department? Or will you become part of some new merged or converged entity whose role is entirely security – IT and physical?

I don’t think so. A complete blending of the IT department and physical security, access and life-safety will not happen. The two organizations core functions just do not fit together as tightly as that of IT and the old telecommunications group. Think back to the not too distant past, when those two were separate. The telecommunications group dealt with all things involving telephony and telephony based circuits, including voice circuits, PBX’s, 9.6kb lines for mainframes, x.25 networks, and fractional T-1/T-1 lines for the IT department’s bridges/routers. What caused these two to merge, blend and converge?

First was the decentralization of computing resources (away from the glass house of the mainframe) and into the bright world of LAN based distributed servers. Put the server as close to the user as possible to decrease response time and increase flexibility, while off-loading more of the operational costs directly to the user organizations. This required more circuits, more control over the circuits and faster response to ever changing circuit needs.

Next came the paradigm shifting killer application: Voice Over IP (VoIP). VoIP was first implemented as trunk line convergence. Link an enterprise’s inter-PBX trunk lines over the existing data network telecom circuits and bypass long distance charges. Next was the expansion of VoIP to the handset and office desk. As this propagated, the differences in skill sets of the IT LAN engineers and voice engineers blended. IT LAN people needed to learn and understand telephony circuit based communications; they moved into understanding telephony and vice a versa for the telecommunications engineers. The two core functions of these organizations were closely related and not extremely different that the cross pollination of knowledge sets was too difficult.

Now, look at IT and the world of physical security (IP video, access control, life-safety and so forth). The core functions are extremely different and much more complicated to make a full merging/converging as viable as telecommunications and IT.

However, take a look at some trends within the IT world with regards to cyber security. What is happening is the IT security group is being separated out of the core IT group and moved into a functional group under a lead security manager/officer. This is to ensure and limit the possibility of conflict of interest and accountability with regards to Information Security (InfoSec) within the digital world of a LAN/MAN/WAN. These InfoSec groups have a defined role of protecting and preserving the digital information of the enterprise. The physical security organization has a defined role of protecting and preserving the physical property and employees (human life) of the enterprise. Where and how these two come together is in the blended use of knowledge and resources. As more and more IP based surveillance is used, the video (live streams, stored and stored stream retrieval), smartcard use to gain access to buildings, campuses and just to use a computer is going to rely heavily on the enterprises data network.

This sharing or converging of the physical security tools and equipment adds to the potential for a greater ROI (elimination of multiple closed systems). In addition, as the physical systems become more IP open and integrated into the security framework of the network infrastructure, new innovative security (physical and IT) applications will emerge.

In the end, the core competencies of physical security personnel do not easily translate into the core competencies of the InfoSec personnel. What does translate or merge is the core job role of physical security and InfoSec personnel: to preserve and protect. Sometimes to preserve and protect an enterprise’s digital information, a locked door and a camera is just as powerful as a complex password and a random number generator. These two fit together into a common team with a shared goal, just not necessarily in overlapping dual roles like in Telecom/IT. The future of the security organization – physical and IT – can be found in the past, just with a slight twist.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Internet of Things

    Transformative Leadership: The Past Can Predict The Future

    See More
  • flooding in europe causes billions in economic losses

    Over the past 20 years, the EU can attribute 77 billion in monetary losses to natural disasters

    See More
  • Social Media, Mobility and the Future of Security Convergence

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing