K68F-23 3
Strategic Imperative
Source: Frost & Sullivan
• Over the last decade, the security industry touted the ongoing convergence between the typically separate
realms of physical, logical, and cyber solutions that would soon become packaged offerings for complete,
end-to-end security operations. Despite the rise of IT integration, introduction of Internet of Things (IoT)
devices and connectivity, and growth of physical security information management (PSIM), security
operations center (SOC), and security information and event management (SIEM) solutions to create
supposed single-pane-of-glass security solutions, significant coverage gaps remained and operators still found
that they were blind to intelligence that crossed between the various systems.
• Increasing connectivity across security systems also has exposed more attack surface within an organization,
particularly if the systems are connected through basic integrations and are not used to the attack vectors
typical in more IT-based solutions. This can lead to security teams leaving systems vulnerable to intrusion
simply to gain additional security function.
• Integration among security teams has remained a challenge throughout security operations for decades.
While connectivity across IT, physical, and organizational systems was touted as a means to bring about more
integrated security operations, it has only led to more restrictive silos among security systems, possession
challenges over data and data sets, and an inter-team rivalry for resources, budget, and new technology
procurement.
• Without a truly holistic approach to integrated security that can deal with more diverse, multi-vector attack
types, security teams will quickly find themselves in the dark and outmanned against potential threats.