The impact of information technology on new security strategies

Апр 29, 2024
fe13ba7a6e4006a1080b98f89b31fde4

The most important trend in security today is convergence.

Convergence includes the merging of physical and computer security, as well as the increased participation of IT vendors, IT departments and personnel in the manufacture, acquisition and operation of security equipment .

The next generation of hardware and software combines control and management of physical and computer security.

One ​​of The goal of convergence is to ensure that all workers use only one identifier to access premises and equipment.

For example, about 39% of enterprises worldwide (according to RNCOS) consider it necessary to integrate access control and other security systems.

Another important element of convergence is the use of open IT standards to develop comprehensive security systems.

The end result These actions are standardized technology platforms that enable businesses to eliminate redundant systems, tools and data.

This allows physical/IT security personnel to address issues once and adopt common approaches when responding to threats, be they physical or logical. Convergence also creates clear responsibilities for handling security threats and promotes close collaboration between IT and physical security professionals working together.

While convergence is helping to streamline security systems, processes and procedures, the complexity of security tasks and the costs of these tasks continue to increase.

Fortunately, IT employees who have been working with IT/IP-based non-physical assets for many years can manage new security systems based on these technologies. As convergence evolves, security and IT employees can form teams to collaborate on activities such as managing employee rights, conducting investigations, and building infrastructure.

As ​​a result, the enterprise realizes significant cost savings.

Converged systems also allow companies to meet the security needs shaped by the global political climate and legislation, such as HIPAA, GLBA and Sarbanes-Oxley.

Senior management and boards of directors are under great pressure to keep companies operating safely and ensure that their business meets all legal requirements.

The Evolution of Security

Until convergence becomes completely IT-centric, a company's security will be a balance between IT, physical security, and operations.

Previous generation security systems, which traditionally rely on panels and power supplies, are connected by miles of wires to physical access points (PAPs) such as doors.

These installations are now being replaced by IP-based identity management systems that connect to IP-based cameras, gateways and intercom systems at physical access points.

The driving force behind the evolution of security in the United States was a presidential directive issued in 2004. The purpose of Federal Information Processing Standards Publication 201 (FIPS 201) and the accompanying Personal Identification Verification (PIV) card directive is to standardize the verification and issuance of ID cards to all government employees and contractors, and to provide them with standardized smart cards for computer access and building.

In addition to standardizing ID cards and issuing them, the use of PIV cards will combine many separate systems into a single one.

This major undertaking will require the assistance of security vendors who have deep knowledge of smart cards, network security and identity authentication.

While the success of previous security systems has largely depended on the ability and skill of the installer in the field of electrical wiring, the use of new generation systems requires in-depth knowledge in the field of IT. Today, access hardware is an advantage and software is the key to success.

Sales Trends

Since the sale of security systems touches many areas of the company — operational, legal, financial, HR, IT, maintenance, security — all of which are a one-stop shop for integrators.
Successful integrators demonstrate excellent IT and networking knowledge, as well as senior management level sales experience and skills.

First and foremost, the integrator's sales team must convince the prospect that they, and their company, truly understand networking and integration. They must also provide references and certificates to support this application.

The integrator must demonstrate knowledge of security aspects such as the placement of cameras and door hardware, as well as a thorough understanding of the hardware and software products that are offered for installation.

The sales team should also have knowledge of the IT products that security systems will work with, such as databases, identity management systems, report generators, etc.

In addition, good pre- and post-sales support and the ability to develop working relationships with both the IT and security departments is important, which will contribute to the efficient and unified management of the company outside depending on whether its offices are located in one or more places.

Мы используем cookie-файлы для наилучшего представления нашего сайта. Продолжая использовать этот сайт, вы соглашаетесь с использованием cookie-файлов.
Принять