The Benefits of OT, IT Collaboration

The Benefits of OT, IT Collaboration

It is no secret: OT and IT are converging.

Physical security devices that were previously air gapped or standalone are now connected to a network, and with physical security devices more affordable than ever, the number of connected devices continues to grow. However, just because the technology itself is converging, that does not mean the human side of OT and IT are following suit.

Security cannot wait for anything, and in the meantime, organizations need a vendor provided device management platform to bridge the gap between OT and IT. Without proper management of devices, cybercriminals can take advantage of gaps in the network.

No matter the size of the organization or the attitude towards their network and the devices on it, a device management platform from the vendor will keep all the necessary ducks in their proverbial row.

With a device management system in place, both OT and IT employees can collaborate to keep firmware up to date, stay on top of necessary decommissioning and replacement, and most importantly, have visibility into all global locations. Without a device management system, you might not notice a device has gone offline until you need the data the device should have been recording.

Device management systems are also particularly critical as replacement strategies and can be configured to meet the various needs across organizations. For instance, some organizations replace a device as soon as the warranty is expired, which can account for up to 20% of their devices a year. On the other hand, some organizations simply never replace devices until they cease to function.

There is also the middle ground of replacing a device when it is no longer supported by firmware updates. In all these scenarios, the vendor-provided device management platform will serve as the reminder for replacement, regardless of what that replacement benchmark may be.

All About Attitude
While those of us in the security industry think about what it means to be utterly secure, not all organizations are security oriented, and even less have a balanced approach to both physical and virtual security.

Fewer organizations than you may think genuinely care about cybersecurity, and the “security” for an organization usually refers to the people hired to protect the physical space: picture the guy sitting in the room with all the camera feeds on display as opposed to the person responsible for the cameras producing those feeds.

Typically, security hires are not the actual IT staff responsible for configuring and maintaining the devices – they simply manage the systems with the dashboard that they are given. However, as IT has had to get more involved with every step of the device lifecycle, organizations are starting to slowly pay more attention to the potential cybersecurity issues, which means that OT and IT are on the same team.

OT and IT convergence on the human side has increased exponentially from even five years ago; a change driven in part by large organizations who have more to lose. This convergence has complicated things on multiple levels. For instance, when thinking about budget areas and responsibilities, clear divisions have become muddied. If an organization needs a new physical security system, but that system will require IT installation and maintenance, does the money for that system come out of an OT budget or an IT budget?

If one party “owns” the entire thing, does that mean the other party has no say in configuration? This results in a confusion not only about how the devices are initially configured, but also how they are maintained throughout their lifecycle. In essence, though an organization may be one big happy “family,” each family member may have different perceptions or attitudes about how things should be done.

A vendor-provided device management system can bring this “family” together by providing a simple, informative dash for OT while simultaneously helping IT with APIs, connected systems, and reports. Especially for large organizations, this system needs to be user friendly while still being able to manage complex IT infrastructure needs, which is a task daunting enough that many organizations have been postponing it.

This is no longer a task that can be sidestepped, though. At this point, organizations will be doing their employees a dangerous disservice by not giving them an effective way to collaborate. If all parts of an organization get in on the ground floor together, you will never have a situation where an employee is confused or playing catchup.

Organizations are more successful when IT is involved with physical security early, so that if there is ever a problem, they do not have to first understand the entire network before finding a solution. On the other side, if OT works alongside IT to get a network set up, then they can more easily define an issue as soon as it pops up rather than waiting for something disastrous to occur.

The Third Teammate: Device Management
A device management system not only facilitates the collaboration between OT and IT professionals and ensures the coherence and security of an organization's network regardless of whether the employee monitoring it is on their first day or later in their career. A device management system also acts as an impartial reminder for replacements, regardless of individual benchmarks between different departments.

The attitude of organizations toward security is a crucial factor that shapes the effectiveness of the partnership between OT and IT. Organizations should always be prioritizing security and making choices that lead to a system that secures physical sites, as well as virtual ones. This shared goal brings OT and IT onto the same team, blurring traditional boundaries and prompting collaboration.

While human factors may inevitably present challenges, a device management system serves as the critical link between these two worlds, allowing for effective collaboration and streamlined operations. In an era where the boundaries between physical and digital security are rapidly eroding, if they are not gone completely, organizations that embrace this convergence and empower their employees with the right tools will be better poised to navigate the challenges and opportunities that lie ahead.


  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Busy South Africa Building Integrates Custom Access Control System

    Nicol Corner, based in Bedfordview, Johannesburg, South Africa, is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. This is the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption. Nicol Corner (Pty) LTD has developed a landmark with sophisticated design and unique architecture by collaborating with industry-leading partners and specifying world-class equipment throughout the project. This includes installing a high-spec, bespoke security and access control system. Read Now

  • Only 13 Percent of Research Institutions Are Prepared for AI

    A new survey commissioned by SHI International and Dell Technologies underscores the transformative potential of artificial intelligence (AI) while exposing significant gaps in preparedness at many research institutions. Read Now

  • Survey: 70 Percent of Organizations Have Established Dedicated SaaS Security Teams

    Seventy percent of organizations have prioritized investment in SaaS security, establishing dedicated SaaS security teams, despite economic uncertainty and workforce reductions. This was a key finding in the fourth Annual SaaS Security Survey Report: 2025 CISO Plans and Priorities released today by the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

Featured Cybersecurity


New Products

  • ResponderLink


    Shooter Detection Systems (SDS), an company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3