ContemporaryIssues in Security Management
Mostorganizations in the contemporary society have converged theirphysical and IT systems to operate as independent structure, thoughthey belong to totally different departments. The informationtechnology security system controls access to information throughdatabase applications, mail servers, web servers and the internet.The physical security system provides access to systems of lifesupport including CCTV and the door access into buildings (Dabbagh,Hamdaoui, Guizani & Rayes, 2015).
Thispaper seeks to study the advantages and disadvantages of merging ITand physical security functions in a medium to large-size firm withcomplex IT system requirements and a global footprint.
Comparisonand Contrast of the Pros
Mergingof the IT and physical security functions in a medium is significantin improving efficiency of the security system. It promoteseffectiveness in the management of employees’ credentials where onedata is used to enter into the system once, reproduced anddistributed to the entire organization. This allows commonadministration for users in both IT and physical department. Itenhances compliance to the regulations and policies thereby improvingresponse time to security threats. Similarly, convergence of the ITand physical security system in a large-sized with complex IT systemrequirements and a global footprint would improve efficiency byminimizing complexity of the system and promote compliance thusenhance security (Dabbagh,Hamdaoui, Guizani & Rayes, 2015).
Theconvergence of the two systems in a medium would also contribute tothe reduction of costs by eliminating the need for local securityguards. The guards have been put in charge of monitoring the securitysystems in a specific area through the use of a central location.Furthermore, a centralized data repository enhances efficiency in themonitoring systems. The convergence as well provides both systemswith a more versatile staff. It achieves this by conductingcross-training of the agents in an organization thus improvingcoordination and security. Similarly, integration of physical and ITsecurity system in a large-sized with complex IT system requirementsand a global footprint would streamline the flow of securityactivities and make the complex requirements simpler for employeesthus improving their performance and coordination that contributes toimproved security (Dabbagh,Hamdaoui, Guizani & Rayes, 2015).
Comparisonsand Contrast of the Cons
Integratingthe IT and physical security in a medium generates various challengesincluding improving a patchwork of physical access systems, joiningthe heterogeneous systems and combining the two systems. Eachorganization consists of a patchwork of physical access systems thatoccur at different maturity stages. Moreover, most organizations lackthe equipments to support egress badging that people use to badge outon their way out of the building. Also, integrating the user’snetwork and physical locations poses challenges (Dabbagh,Hamdaoui, Guizani & Rayes, 2015).
Onthe contrary, converging integration of physical and IT securitysystem in a large-sized with complex IT system requirements and aglobal footprint generates challenges. Combining these systems on aglobal scale means changing both the culture and technology of anorganization to meet the international standards. This is a challengebecause the cultural and technological changes would take a longertime thus compromise the security system of the organization(Dabbagh,Hamdaoui, Guizani & Rayes, 2015).
Convergingof the physical and IT systems has both benefits and challenges. Thebenefits of integrating these systems include, it improves efficiencyof security, it reduces costs and makes employees become moreversatile thus improving security operations. The disadvantages ofcombining the IT and Physical security system include challenges inmerging heterogonous systems and changes in culture and technology ofan organization that might affect its security functions.
Dabbagh,M., Hamdaoui, B., Guizani, M., & Rayes, A. (2015).Software-defined networking security: pros and cons. IEEECommunications Magazine,53(6),73-79.