Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Growing Security Complexity and Network Interdependence

By Keven Marier
July 1, 2011

Widespread adoption of IP network-based solutions within the physical security industry is creating an increasing interdependency upon an infrastructure, which in most cases is owned and operated by a department outside of physical security. This mirrors current and historical trends within video conferencing and voice communication systems. The challenge for these systems, and security executives overseeing them, is to understand the choke points, the quality of service requirements and the backup operations that are in place. If these areas are not well understood the possibility increases for minor infrastructure issues to create cascading service interruptions to a facility, or worse an entire organization. As an industry, we are building upon these technical complexities and creating interdependencies and vulnerabilities that could go unrecognized until a major failure occurs.

 

Infrastructure Assurance

Waiting for a disaster before taking action is not an acceptable strategy. We have a responsibility as an industry to develop a set of security best practices that increase our competency and capabilities with IP networking technologies. These best practices should focus on developing new risk management processes that define policies regarding infrastructure assurance. These processes of assurance should include:

  • Prevention
  • Mitigation
  • Incident Management
  • Recovery

 

Prevention

Prevention of network service outages is a critical component to include in the planning and design of physical security systems and interdependent network infrastructure. If these systems are not designed with the intention of preventing downtime, vulnerability is introduced that places increased importance on other risk management processes. New IP network-based physical security systems are frequently selected without a competent physical security system designer conducting infrastructure analysis. In addition, slow growth in the number of designers with these capabilities is outpaced by increased marketplace adoption of new technologies. This situation is creating a gap, which only time and experience can fill. Short-term strategies, such as partnering with IT departments will help, but physical security must be vigilant about identifying and understanding how the IP network design impacts the physical security systems and operations.

Mitigation

Mitigation of network service outages is more than preparing for the next accident or natural disaster. Physical security operations must develop strategies covering IP network assurance by integrating the management, monitoring and maintenance performed by network owners and operators with that of the physical security systems. Unplanned service interruptions are typically either a result of poor management and maintenance procedures, or a lack of communication. Change management procedures must be designed and implemented across departmental lines to facilitate transparency, information sharing and strict management controls.

 

Incident Management

Management of network service outage incidents, and resulting communications with physical security operations, are critical to quickly uncovering the root cause of the interruption. This enables both departments to prepare a proper incident response. Without integrated incident management processes between network infrastructure and physical security owners and operators, a lot of wasted resources can be spent trying to recover.

 

Recovery

Recovery of network service outages must be planned in advance to minimize the impact on physical security.  If a recovery plan with well-defined procedures is not followed, time and resources will be lost trying to determine root cause and ownership of the problem. Important system checks must be developed to identify the outage impact, the expected length of the outage and the interdependent security operations, which are impaired. 

 

Shared Responsibility

Rising complexity and interdependence create new vulnerabilities, shared threats and shared responsibilities between IP network owners and operators and those in the physical security department. The industry must develop the capability to apply end-to-end, or system-wide, analysis with defined responsibilities. This should include policies covering service accountability and preservation of reserve capacity. Network Convergence plus new technologies, produces better security services at lower costs and increase operational efficiency. However, in order to realize the benefits of convergence, we must assure that the network infrastructure is capable of supporting physical security.  

KEYWORDS: IT departments and security security network security risk mitigation

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Keven Marier is the founder and CEO of Connex International, Inc. He has a 20-year background in technology consulting, publishing and educating within the physical security technology and enterprise IT industries. Connex International Inc. is a 55-person global professional services company providing services to security manufacturers, distributors, systems integrators and end-users in 14 different languages.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Why the High-End Camera Market Keeps Growing

    See More
  • Adapting Surveillance for Security-as-a-Service

    See More
  • How Remote Monitoring Can Combine Services and Surveillance

    See More

Related Products

See More Products
  • Career Network (60 days)

  • Career Network (30 days)

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing