ISG Blog

4 Steps to Faster Security & IT Convergence

Re-posted with permission from Identiv and edited.

There’s an inherent trend in the security industry these days: security solutions are providing value to the entire enterprise, and in turn, getting budget buy-in from non-traditional business units. But that means some significant shifts in how security manufacturers and integrators interact with end-users and organizational leaders.

In a recent panel discussion during ISC East 2019, ISG partner Identiv weighed in on this trend, stressing the idea that decision-makers must consider far more than security when investing in physical and/or logical access solutions.

A New Way of Thinking

1. Clearly Define Your Needs
So many integrators and manufacturers approach customers from the lens of wanting to sell them a solution. Obviously, this is the end goal, but this approach is the wrong way to go about it. In order to truly form a partnership and provide value for their investment, these entities need more. “You have to ask questions of your customers to find out where their pain points are. You can’t start with a solution; you have to start with a problem, then identify how you can best work to solve the issues they face,” said Scott Sieracki, Identiv VP of Sales.

2. Ditch the Siloed Approach
Traditionally, security has operated in a vacuum. Until IP video really made its way onto the scene, IT and security departments operated very independently of each other — and sometimes as a result, incorporating networked security technology was not as seamless as it needed to be. In recent years, the manufacturers that are most successful have found a way to unify with IT teams to benefit the entire enterprise. “This convergence shouldn’t be a hurdle, it should be inherent to what we do,” said Sieracki. “Security manufacturers must be able to evolve to incorporate IT best practices into their products and work with others in the industry to achieve this level of integration.”

3. Start Thinking Like IT
As the convergence of physical security and IT departments continues, it becomes more and more important for security manufacturers to align accordingly. “What we’re finding is that IT behaves very differently and to truly meet the needs of the organization, we have to behave similarly, taking cybersecurity and network connectivity seriously,” Sieracki said. For example, in today’s enterprise, an organization’s physical access control should adhere to the same standards and deployment models than any other IT application would. The benefits are numerous: when any cybersecurity or operating system-level patches need to be installed, the work can be done on the server in real-time, under the same policies and practices as other IT systems, and the IT department can trust that the security of the network is top of mind. In that, the value exists.

4. Invest for Greater Value
One of the biggest hurdles for many organizations in capital investments of updated or new security technology is budgetary, which is why “value” is at the core of many C-level conversations. The bottom line is: if you can provide the value, they will find the money. One way to achieve value is in the gathering of data for use in delivering more business intelligence to the organization. For example, using video and access control data to determine how many people are in a building and control HVAC systems or lighting in an effort to save costs provides significant value for facility managers. The cost savings can also be communicated to an organization’s CFO, which demonstrates a value add. This return on security investment can really drive decision-makers to think bigger as security solutions do more to deliver greater value to each sector of the business.

When it comes down to developing security solutions for the customer, the total cost of ownership (TCO) and perceived value are at the forefront of many conversations with customers. As a result, it is critical to align with customer goals to work effectively together in a cohesive approach to overall physical and logical security.

Get Integrated Solutions from the ISG

At the ISG, we deal with a phenomenal combination of customer needs, especially in organizations that mix physical security with logical access, and other systems like IT, for their own client services, such as hospitals, schools, colleges and government facilities. We understand how complex it can be to get the exact solution needed for very specific access rights and reporting requirements. From door access control to biometric scanning, mobile credentials to video surveillance, and so much more, the ISG is here to help you get it right the first time.

Contact us today!

Identiv ISG ad


Want to receive automatic email notifications whenever we have a new story in a specific category of interest?

CLICK HERE to subscribe to subscribe the ISG Blog today!