A new SIA resource examines guiding principles, challenges and mission-critical outcomes for IT, operational technology and security.
Image courtesy of Security Industry Association
Created by cyber-physical security experts with support from Allegion, M.C. Dean, ONVIF and Wesco, the report explores prominent operational security technology (OST) types, details related challenges and presents best practices and deployment strategies.
The association says the guide offers valuable insights for anyone installing or using security systems, from corporate security leaders to business managers evaluating their security investments and seeking deeper OST knowledge.
“SIA is proud to present this new report on the critical area of operational security technology,” says SIA CEO Don Erickson.
“Having a strong operational tech stack is key to mission success and this thorough resource offers industry professionals and security technology consumers a deeper understanding of these systems, which will help them grow their situational awareness, address gaps and prevent common mistakes,” he says.
Key areas covered in the report include:
- Growing global demand for operational technology
- The interplay between operational technology, information technology and physical security
- Definitions of OST and how various solutions connect, integrate and automate within security systems
- Core components of physical access control, video surveillance, detection, perimeter and environmental safeguards, plus security management platforms
- Important questions organizations should address when rolling out new OST deployments
The analysis highlights how OST interacts with traditional IT and physical security infrastructures, defines important OST concepts and identifies the types of solutions that can be linked, integrated and automated to strengthen overall security posture.
The report also provides an extensive bibliography of additional reference materials covering OST, physical security and strategic management recommendations.
It also outlines critical considerations and questions businesses should ask when selecting and deploying OST solutions to prevent implementation missteps.
Operational Security Technology: Principles, Challenges and Achieving Mission-Critical Outcomes – Leveraging OST is available as a complimentary download.