Questions and Answers From the Top

A conversation with Ajay Jain

AS the security industry continues to grow larger each year, convergence still dominates the topic of conversation. Numerous solutions are beginning to hit the mainstream market to help businesses handle the ever-changing and growing task of bringing disparate systems together. We talked to Ajay Jain, Quantum Secure founder and CEO, about his company’s definition of convergence and some of the upcoming trends companies need to address.

Q. What is Quantum Secure's definition of convergence?
A.
In the realm of security, the word convergence has been used in a number of ways—mainly referring to physical security coming together with IT. For Quantum Secure, the picture is even bigger. Corporations, especially at the enterprise level, run a wide variety of diverse physical security systems, including physical access control, video surveillance, sensors related to HVAC and fire/carbon monoxide detection. Our definition of convergence is to first integrate these disparate systems so the technologies become interoperable, interdependent and controllable from a single, browser-based dashboard, with the ability to establish and implement policy-driven operations. We then enable this homogenized physical security infrastructure to integrate and interoperate seamlessly with corporate IT security. Finally, we enable the business processes of the IT and physical security domains to interconnect with each other, under a common policy paradigm, to generate a new level of operational efficiencies and holistic security.

While many businesses have been edging towards this goal, there have been obstacles. Typically, all these systems have been installed and deployed separately and do not communicate with one another. Ultimately, what is needed to facilitate communication is a software layer that covers every event, operation and transaction across all corporate locations. The goal has been elusive up until now, as no product has emerged to accomplish this on the scale necessary to make it a reality. This has been the mission of Quantum Secure—to provide an off-the-shelf solution to accomplish true convergence as we define it. Thousands of man-hours have gone into this development, and the end result is our SAFE solution.

Q. Products have changed rapidly within the last few years. What do you see as the source of this acceleration?
A.
A number of serious events occurring in the last few years have had a tremendous impact on the way government and businesses view risk. The fields of risk management and corporate governance really stem from four sources—the growing importance of the Internet in commerce and communications, the attacks of Sept. 11, 2001, the Enron scandal and hurricanes Katrina and Rita. The Internet made it possible for businesses to communicate electronically within facilities and between facilities. In some ways, this made business operations much easier, but with it came the associated risk of infiltration, security breaches, information loss and theft. This was the genesis of IT security, an industry born from the need to protect sensitive information.

Hundreds of companies suffered a complete break in business operations on 9/11. From that day, there has been an understanding of the need to plan for risk management and business continuity. The physical security, video surveillance and access control industries received a wake-up call, as businesses hurried to make the premises more secure. For those who sought to capitalize, there were now opportunities for criminal behavior with crimes like identity theft and counterfeit access cards. While 9/11 was a terrorist attack, the aftermath of hurricanes Katrina and Rita in 2005 made it clear that interruptions in business operations also could come from natural disasters.

Corporate and personal liability became a front-of-mind issue after the fall of Enron and other corporations due to fraud. Sarbanes-Oxley, HIPAA and a fleet of other regulatory laws were passed by the government, and businesses were compelled to stay clean, keep business practices transparent and maintain compliance and best practices under penalty of severe liability.

Q. What specific pain points do you feel it is most important to address?
A.
We see the pain points of corporations defined as four specific needs. First, corporations need to standardize rules and policies within and across the physical security environment. Most corporations have very location-specific physical security applications and tools. Active access cards may not be usable across worldwide locations while terminated employees' cards may still be usable remotely. Physical security events and emergencies do not trigger global policy changes such as restricted access, camera response or alarm activation.

Next is the need to automate processes across the enterprise. With most business operations handled manually due to non-interoperating technologies and vendors, there is tremendous opportunity for human error, in addition to higher operation and maintenance costs. Corporate management needs to be able to review and oversee what is actually happening across all of its locations from one console so any needed rule or policy changes can be made.

Third is the need to integrate disparate systems using a single protocol that crosses multiple platforms. We see this as the ultimate definition of convergence. There should be one single GUI designed to be intuitive, easy to use and allows the user to monitor systems and set policies in real time.

:Finally, there is a need to comply with corporate governance standards. Corporate heads are well aware of strict new regulations requiring disclosure and transparency to prevent fraud. Systems integrators and installers must follow specific methodology in the design and deployment of new physical security infrastructure. Audits can be called at any time, and sophisticated data forensics can mine every transaction and occurrence within a system. Without complete control at the top, it is exceptionally difficult for a business to stay fully compliant with Sarbanes-Oxley and other regulations. \

Q. Are corporations able to respond to these critical problems?
A.
Most businesses have responded by deploying physical security solutions incorporating myriad systems, including multi-brand, multi-vendor building lighting, HVAC, fire/physical access control and video surveillance systems. Disaster event management and business continuity plans have been written and put into place with new personnel brought on board to facilitate and monitor systems.

Still, these actions do not provide a complete solution. Most systems are fragmented across and within locations and do not interoperate. Adverse events are not communicated automatically to all locations in real time, so remote locations have no knowledge of a breach or other situation that might require a response, unless it is reported manually. The lack of centralized control, organization and management of disparate systems results in tremendous exposure to risk and liability.

The enlistment of IT into physical security operations has been the primary route corporations have taken to achieve interoperability. This seems to make sense, as the IT backbone runs across all facilities and operations at an enterprise level. IT also has gained involvement in many business units, including human resources, communications and document management. Manufacturers and vendors in the security space have responded with a flood of IP-based products to replace legacy systems. Yet, these products generally are not capable of communicating with one another due to multiple protocols and platforms. It is far beyond the scope or capabilities of a typical IT department to create the software needed to implement this solution. As a result, the risk of an event negatively impacting a corporation and putting business continuity into peril grows exponentially every time a new system is put into place.

Q. What, in your opinion, is the big-picture solution to this issue?
A.
Many companies in the physical security arena are beginning to talk about convergence on a smaller scale. But the ultimate solution will be big-picture convergence, accomplished by creating a software layer that wraps around and unites myriad diverse systems across all locations of a corporation. This was the impetus driving the development of Quantum Secure's SAFE, a robust and fully functional software product addressing the four pain points.

We have already put this solution into place in some of the largest enterprise-level corporations in the IT world, with highly-sensitive and diverse portfolios of physical and electronic products, along with sophisticated and multi-layered security systems. This issue will only grow in importance as time passes, and the cost of doing business without centralized operational control become more evident. Businesses incorporating a full convergence solution will see an immediate ROI to go along with vastly increased peace of mind, as risk management will be both simplified and optimized.

This article originally appeared in the issue of .

Featured

  • Survey: 60 Percent of Organizations Using AI in IT Infrastructure

    Netwrix, a cybersecurity provider focused on data and identity threats, today announced the release of its annual global 2025 Cybersecurity Trends Report based on a global survey of 2,150 IT and security professionals from 121 countries. It reveals that 60% of organizations are already using artificial intelligence (AI) in their IT infrastructure and 30% are considering implementing AI. Read Now

  • New Research Reveals Global Video Surveillance Industry Perspectives on AI

    Axis Communications, the global industry leader in video surveillance, has released its latest research report, ‘The State of AI in Video Surveillance,’ which explores global industry perspectives on the use of AI in the security industry and beyond. The report reveals current attitudes on AI technologies thanks to in-depth interviews with AI experts from Axis’ global network and a comprehensive survey of more than 5,800 respondents, including distributors, channel partners, and end customers across 68 countries. The resulting insights cover AI integration and the opportunities and challenges that exist with regard to security, safety, business intelligence, and operational efficiency. Read Now

  • SIA Urges Tariff Relief for Security Industry Products

    Today, the Security Industry Association has sent a letter to U.S. Trade Representative Jamieson Greer and U.S. Secretary of Commerce Howard Lutnick requesting relief from tariffs for security industry products and asking that the Trump administration formulate a process that allows companies to apply for product-specific exemptions. The security industry is an important segment of the U.S. economy, contributing over $430 billion in total economic impact and supporting over 2.1 million jobs. Read Now

  • Report Shows Cybercriminals Continue Pivot to Stealthier Tactics

    IBM recently released the 2025 X-Force Threat Intelligence Index highlighting that cybercriminals continued to pivot to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined. IBM X-Force observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied heavily on to scale identity attacks. Read Now

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.