Ask The Expert

This month's expert answers one of today's most popular questions: "How do I converge?"

OVER the past couple of years, security professionals have had to learn to work in a very different world -- one that includes professionals from the IT department. Rapid changes in technology have brought about a convergence of physical security and IT security that would have been difficult to imagine a decade ago.

This subject is being addressed in this magazine and others in the industry as convergence makes the move from an interesting idea to a reality. But where does this leave the corporate end user who suddenly faces blending two disparate departments within the organization? What steps can you take to make the transition work? And if you look to outside help, how can you be sure that you are getting what you need?

ISSUE: Can convergence be handled in-house?

SOLUTION: Before IT staff members agree to allow security data on the network, they will want to know what equipment is involved, what demands it will place on the infrastructure and who will be overseeing the project from the security side.

That means that an in-house security staff may have to learn a new set of skills. And with many staff members coming to the job with a law enforcement background, computer skills may be in short supply. It may make sense to send security staff members to classes for training on IT issues. But it may take weeks or months to bring them fully up to speed.

An outside security system integrator, whose livelihood depends upon keeping current on technology, may be the best bridge between the security and IT departments.

IT staffs are generally cautious and skeptical about adding new systems to the corporate network. This is a proper approach, given the importance of the information being moved along the data highway. Finding an integrator that can inspire confidence with the IT folks is a good first step in beginning the convergence of security and IT.

ISSUE: How can a security integrator prove competence in the IT world?

SOLUTION: A skilled integrator with an IT background will be able to show one or more industry-recognized credentials that help to demonstrate knowledge. Among these are Microsoft-Certified Professional, Microsoft-Certified Systems Engineer and Cisco-Certified Network Administrator.

There also are certifications, such as Certified Protection Professional and Physical Security Professional, awarded by industry associations that also can demonstrate competency. And an employee with a four-year degree in computer engineering or other related field should be reassuring.

ISSUE: Are there any alternatives to security and IT sharing the corporate network?

SOLUTION: The advantages of having security systems on the network are too strong to turn away from at this point. But one alternative beginning to surface is the creation of standalone IP networks that are just for security. This arrangement involves the same type of equipment and standards of wiring, but does not use the regular corporate bandwidth. Security data will be shared via a parallel network isolated from the enterprise network.

While separate pipelines for physical security functions can work well, many times getting adequate network space comes down to the fine art of negotiation between the IT and security staffs.

Look for ways to minimize conflict. For instance, the security department can consider things like sending out smaller packets of data (for IP video) during peak activity periods. A knowledgeable, experienced systems integrator should be able to help negotiate an arrangement that will keep everyone happy and sharing in the benefits of technology advances.

This month's question from a reader asks:

ISSUE: I am a security director for a retailer with stores across several northern states. We operate a large warehouse in Minnesota, where the winters can be extremely cold and windy. The outdoor camera housings we use have had problems. If the heater stops working, we have to replace the entire housing. Also, the housings don't seem to be entirely airtight. Is there any advice you can give on a type of fixed and dome camera housing that might work best in our climate?

SOLUTION: Most CCTV manufacturers design exterior enclosures to withstand varying environments. Temperature, humidity, precipitation and sunlight are considerations that all CCTV manufacturers factor when designing camera enclosures and domes. Factory- and field-installed accessories typically include blower, heater, window defroster, sun shroud and thermal insulation.

Wind chill and ice storms are the two most difficult factors that impact your CCTV enclosures. Wind chills that exceed -60 degrees Fahrenheit can play havoc with your PTZ camera. The mechanical components of PTZ are not designed for these conditions. You must ensure when purchasing PTZ cameras for extremely cold environments that your units are insulated and contain heat strips with maximum wattage output.

Most pan/tilts have stepper motors that generate heat. This is a great by-product to help keep the unit warm. It also dictates the constant running of a blower motor to help circulate air during the summer months. This helps preserve the life of your unit's circuitry when things heat up. The constant movement of air helps keep the enclosure or dome's plexiglas defogged.

Don't hesitate to ask your security systems integrator to ensure that he or she has properly sealed your dome after opening the unit for a preventative maintenance check. Room temperature vulcanizing is a silicone that works great when resealing your dome. Technical support recommends that you apply RTV not only to the dome seal, but also to the last two to three threads of the mounting bracket as it mates to the dome.

What's on your mind? Do you have a question or a topic that you'd like addressed in Ask The Expert? If so, please e-mail it to [email protected].

Featured

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.