Fischer, Halibozek and Walters (12) define security convergence as the act of combining two types of security functions that are historically different. IT security and physical security are usually merged to form an integral and coherent platform for risk management. Security convergence is based on the principle of corporate risk management. It is imperative to note that the past physical security tools required ample protection effort similar to the modern platform of information technology. Physical security measures face challenges due to unprotected information (Anderson 4). Therefore, information technology security is largely perceived as the solution to prevailing problems since it assists in reinforcing critical security programs. This paper describes how physical security and Information Technology (IT) security are converging and their impacts on corporations within the security industry.
Convergence of IT security with physical security
Physical security has been used in corporations for a long time. IT security is a recent development. Physical security entails the use of security men, security dogs, electric fences and alarms. The use of CCTV surveillance cameras is among the latest IT technology platforms being used along with physical security. Computers have also been widely embraced for several decades to record and monitor information. Currently, the use of IT security is less intensive in terms of manpower (Fischer et al 34). As it stands now, IT security has made it possible to detect the occurrence of disasters. It is important to note that videos can be used to detect faces, fire, and smoke.
The impacts of security convergence in corporations and the security industry
Fischer et al (17) highlight that security convergence benefits corporations beyond the basic tenets of security. In fact, it has eased down the operations of organizations. For example, warehousing and shipping operations have been simplified through CCTV surveillance (Anderson 5). Remote monitoring saves time and reduces other operating costs since the management does not have to be physically present at a site to ensure that everything is running smoothly (Anderson 6). Using management cameras in offices and biometric-based control systems help managers to monitor employees. It also assists in taking attendance records. Human resource officers are able to view cameras and video records in order to assess and verify the effectiveness of their employees at the workplace (Fischer et al 41).
Anderson (7) elucidates that in some instances, it is cumbersome to quantify budget expenditures incurred for extending security networks. IT security is capable of delivering multiple roles such as training, monitoring operations and enhancing safety. Therefore, it is challenging for security providers to determine the charges due to multiple benefits. This has led to the introduction of installation bills, costs for upgrades and maintenance (Anderson 7).
It is pertinent to admit the fact that security convergence has resulted into conflicts in the security industry. For instance, a new security system demands adequate skills and knowledge (Pittolo and Tonello 144). Besides, electronic security system is perceived as a threat to physical security. The physical security systems have limited non-security benefits as compared to IT security. Hence, corporations that are relying on physical security have to incur extra cost to install IT security in spite of challenges such as deployment, budgeting and procurement.
In conclusion, physical and IT securities have converged rapidly since the advent of the 21st century thereby making it easy to manage risks associated with insecurity. IT security has numerous non-security benefits. Nevertheless, conflicts are arising since IT technology is gradually replacing the physical security system.
Anderson, Kent. “Convergence: A holistic approach to risk management.” Network Security 2007: 4-7. Print.
Fischer, Robert, Edward Halibozek, and David Walters. Introduction to security. New York: Butterworth-Heinemann. 2012. Print.
Pittolo, Alberto, and Andrea Tonello. “Physical Layer Security in Power Line Communication Networks: An Emerging Scenario, Other Than Wireless.” IET Communications 8.8 (2014): 1239-1247. Print.