Converge With Caution

Converge With Caution. Check it out:
(Access Control & Security Systems Integration Via Thomson Dialog NewsEdge) The security industry is entering a new and exciting evolution. Security convergence into the IT world has opened up many possibilities for solutions and integration, but are we jeopardizing the integrity of our security solutions in the process? Are we more vulnerable to system downtime and loss of information? What are the pros and cons of full convergence onto the IT network?



Deploying physical security initiatives on the IT network can indeed open up concerns for the integrity of security programs.

The first concern would be for system reliability, back-up and recovery. The network itself needs to be evaluated for reliability and for redundancy of the network infrastructure. Many of today's corporate networks are plagued with downtime and poor architecture. Networks have a tendency to fail and run into bandwidth and collision issues. While these issues may not seem to be as prevalent in state-of-the-art enterprise networks, in the small/medium business (SMB) environment, IT budgets and maintenance are not keeping up with the need for reliable networks. Thus, a good audit of the network should be the first step when considering a converged security project.

The next issue, which has been a problem even when security systems stand alone as silo solutions is the quality of computers and servers. In the case of access control, manufacturers suggest minimum specifications, and it seems these solutions end up running on the cheapest computers available. Most of these access control computers never get updated or maintained through their life cycles, causing even more issues and potential problems, such as system downtime. Also, the DVR has been almost a fear factor in many security operations. The same problem exists here as vendors sometimes build computers in-house while cutting costs by using the least expensive processors, motherboards, controllers and hard drives. As these systems are connected to the networks for remote client access, it has made them vulnerable to viruses and worm attacks. Thus, an inexpensive solution could cost more in the long run.

We have entered a new era in video surveillance for the enterprise, as Network Video Recorders (NVRs) now enable security or IT managers the choice of what server and storage can be used. It puts the end-user in control over the equipment that has to be supported and the level of fault tolerance or fault-resilient servers are used in the security application. This level of servers can ensure uptime and protect the solution as a whole. NVRs also let the end-user determine the quality and quantity of storage for a video solution, allowing the ability to capture, store and achieve exactly the amount of video needed in the application.

So what about viruses and worms? Any time computers are attached to a network either a LAN or WAN there is a risk of viruses, so adequate protection should be implemented, and virus definitions should be kept up to date.

The concerns don't stop there. Almost every network video system DVR or NVR and some access control systems allow for users to log in remotely. This capability leaves holes for others to try to enter and gain control over the security systems. Web access or secure VPN (virtual private networking) ensures adequate firewalls, and these systems should have authentication and credentials needed to access these systems. A good hacker with enough time can gain at least some level of access. But what about the hacker who sits outside the security director's residence and monitors his activity and home wireless network until he learns the needed access codes to the corporate network?

These are just some of the security concerns that may come up when considering deploying a converged physical security solution. But there are steps to mitigate some of the risk. Many proactive enterprises are already using them.

It takes a converged effort between the security and IT departments to deploy an IP-based security solution. Unifying the effort helps to gain the resources to effectively unify the overall risk management perspective. By integrating the security initiatives, organizations gain the perspective of the IT personnel, who tend to focus on intrusion prevention and risk management. While IT focuses on network stability, redundancy, backup and recovery, physical security looks at perimeters, incidents and violations and the safety of personnel. All these disciplines need to be synchronized and managed to effectively deploy and operate a converged physical security solution.

In the past, IT was often reluctant to cooperate or interact with other departments; but security and IT have, in many instances, received a corporate mandate to converge physical security into the network infrastructure. This trend is becoming commonplace.

Looking at the potential of implementing a physical security solution, there are decisions to make. The solutions available in a truly converged security program create many advantages over a more traditional approach, including:

higher levels of security, both physically and logically;

efficiencies in response time of an incident;

higher levels of reliability and redundancy;

more flexibility and capabilities;

cost effectiveness and reduction: potential for ROI (Return on Investment); and

more self-sufficient security operations.

How can a security solution riding on the corporate network do all this? Being attached to the network enables security to look at the information from the edge devices or servers as data and analyze this data through algorithms. This can help them make certain decisions based on predetermined rules, taking some of the human factor out of the equation. More efficiency can be achieved by using databases to enroll and unsnarl users from multiple systems in a credential application. Convergence offers one point of control of information for systems like administration, finance, POS (point of sale), access control loyalty programs, logical access and many more.

Security convergence into the IT infrastructure helps make security solutions bullet-proof. Using servers that are fault-tolerant ensures system uptime and performance. Also, the fact that servers and devices are on the network allows security to monitor the health of these systems and devices, thus creating a huge advantage over more traditional silo security applications.

As far as flexibility and cost, organizations can use this data for just about anything the user, integrator or vendor can think of, creating the ability to go far beyond the current state of security. Not to mention, by using the network infrastructure, organizations can save substantially over stand-alone security systems. IT can now be a resource for the physical security department minimizing the need for outside support of the security program.

In short, the benefits are well worth the risks.

ABOUT THE AUTHOR

James Gompers is founder and President and CEO of Gompers Inc., which is made up of Gompers Technologies Design Group (GTD Group), Gompers Technologies Testing and Research Group (GTTR Group) and the Gompers Alliance. The Gompers Alliance pools talent from top consulting firms in the security, communications and data industries to provide total solution plans and services to clients in North America and around the world. He has more than 20 years of experience in the security industry. Want to share an example of your own integration experience? E-mail questions or comments to him at [email protected]

Copyright 2006 by Prism Business Information. All rights reserved.www.prismb2b.com
The opinions and views expressed in comments, blogs, etc. are those of the authors alone and not necessarily those of TMC, TMCnet, or its editors. TMCnet reserves the right to edit, delete, or otherwise make changes to the content that appears on these pages at its own discretion and as it deems necessary.

Listed below are links to sites that reference Converge With Caution:

Around TMCnet Blogs

Latest Whitepapers

TMCnet Videos