- Access control and surveillance should be part of ICT management.
- Unmanaged physical security devices pose a significant risk.
- ISO compliance is another critical component of integration worldwide.
The Genetec Report, State of Physical Security 2025, gives a comprehensive overview of the state of physical security based on a global survey of 6000 physical security professionals.
End users are focusing on leveraging existing technology like cybersecurity tools, data analysis, and improving departmental collaboration.
Datacom’s General Manager of Protective Services, Jennifer Shadbolt, says the migration of physical security into IT environments is driven by the realisation that these systems are now true IT platforms, that require structured IT management disciplines and procedures to ensure they are secure and embedded into your organisations identity management.
Migration involves moving physical security systems from isolated networks into IT environments, implementing structured cybersecurity rules, and establishing proper support disciplines.
Shadbolt says, traditionally, physical security systems operated in isolation, often managed by electricians rather than IT professionals.
However, this approach is rapidly changing as businesses recognise the need for robust cybersecurity measures and efficient management of these systems.
"Traditionally, physical security sat to one side, isolated, on its own network, potentially within an OT [operational technology] environment. Often it was a PC running a very old version of Windows in a cupboard somewhere and managing access control and/or CCTV. It sat there with an air gap, so no connection to the Internet," she says.
This isolation often led to poorly managed systems that were not cyber secure or adequately maintained.
“Now we are seeing a lot of mature businesses, especially critical infrastructure organisations, reviewing how their environments are managed, realising there are devices which are essentially minicomputers talking on their networks, with little to no management, dedicated to physical security which need to be managed as IT assets.”