Examining Convergence

Merging worlds of physical security, IP networks will open opportunities

THE convergence of physical security and IP networks opens up opportunities for security operations personnel to better protect assets and people. But to take advantage of the opportunities, security operations must do away with fear, uncertainty and doubt that often surround running physical security on a IP network.

Myth Busters
Myth 1: The network will get overloaded. Network bandwidth limitations represent one of the greatest mythical arguments against convergence. In reality, many physical security system devices, such as access control badge readers, consume a negligible amount of bandwidth. The technology requires, at most, a few kilobits per second on a LAN, which can support 10,000 times that amount of traffic.

When it comes to surveillance video, even the modest Ethernet switches used by millions of small and medium-sized businesses can support thousands of MPEG4-compressed video streams. If an organization has numerous cameras, there is a good chance it will use even larger and faster Ethernet switches, which can support tens of thousands of video streams.

Transporting video to or from a remote location using a WAN is more challenging because bandwidth is less plentiful across longer distances. However, it is significantly more feasible than using an analog-based CCTV system. Video compression helps minimize bandwidth usage, as does reducing frame rate and resolution. In addition, IP network equipment offers quality of service mechanisms that can be used to prioritize event-driven and latency sensitive video.

Myth 2: Placing physical security information on the network will leave it vulnerable to the masses. The switches and routers that form the basis of IP networks already segment network resources, allowing and restricting access to confidential data based on employee and other profiles. That capability is what prevents most people from accessing their companies’ confidential human resources and financial databases using corporate networks. Security operations can take advantage of the same segmentation methods to restrict unauthorized employees from viewing video surveillance data or files.

Myth 3: Surveillance and security data will be prone to computer viruses and hacks. The worry is justifiably a cause for concern. However, many incidents are a result of poor password management or simply not using security features built into network devices. When network security best practices are used, the information transmitted remains secure. Consider financial networks, banking and stock transactions secure.

Myth 4: The IT department will take over. If this were the case, human resources, finance, sales, manufacturing and almost every other networked application user group would cease to exist. Physical security will continue to exist regardless of what box or wire type is used for prevention and monitoring. Will you really miss troubleshooting a connectivity problem or performing general system maintenance? These mundane tasks can be performed by the IT group, which already handles them for other departments.

Facing Facts
Fact 1: Network devices bring higher system uptime to physical security. IP networks provide redundant transmission links and special protocols that allow failover, or a backup device, to instantly take over the operations of a device that fails. The networks also can send real-time notifications of connectivity loss to security operations personnel. The attributes help keep security applications available with a high degree of resiliency, giving users more time to focus on the safety and security of an organization’s assets and people.

Fact 2: Convergence offers greater authorized accessibility to security video and data. Safety and security monitoring and alarm/event notification are no longer limited to a local central operations center. By using various network security features, users can retrieve video and receive event notifications from anywhere with network access using a variety of wired and wireless devices, even cell phones. Users also can provide first responders with access to critical security information during an event, allowing for much more effective collaboration.

Fact 3: Convergence drives greater interoperability for best-in-class security. While many analog physical security devices use vendor-proprietary signaling running through a disparate infrastructure, IP devices are more open and standards based. So, multi-vendor, best-of-breed security installations can be built based on what is deemed appropriate. IP gateways, such as encoders and decoders, even allow hybrid analog and IP security applications to be deployed. As a result, network becomes the platform for communication and collaboration between physical safety and security applications, along with devices and users. Physical security convergence will drive down the cost of deployments.

Fact 4: Convergence enables tight integration between security and other systems. While video and access control applications are an obvious integration opportunity, at some point, fire alarms and other safety systems benefit from information generated by the access control application. For example, the employee’s badge swipe or other credential verification event can be used to light the path from entry to the employee’s office and turn on the heater, rather than activating lights and HVAC fans on an entire floor for power conservation during weekends and holidays.

By tying physical security access control and its logs into network access authentication and enforcement systems, a company can set a policy that all employees must badge-in or provide other credentials at a building’s entrance to gain electronic access to network resources and gain physical access. When the network becomes aware of an individual’s physical presence in a building, physical security policies and posture become another layer of defense for network security. As a byproduct, unauthorized entry/tailgating into buildings also can be curtailed when every employee has to swipe their badge to obtain network access.

The use of video surveillance by new user groups also is enabled through convergence. Physical security operations, such as retail loss prevention, can provide retail store management with access to live and recorded video. Users can monitor the length of checkout queues and redeploy idle sales associates. Dwell times in front of displays, customer and vehicle counts and traffic flow can be analyzed by merchandising and other groups. Network convergence transforms physical security systems into business tools.

Converged physical security provides greater alignment with organizational goals and represents a new business tool—not just an operational expense item. Networked physical security not only offers greater flexibility to security operations personnel, it makes them more productive and allows them to focus on the core responsibility: protecting assets and people.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.