The Road to Convergence

From three security pros: 6 best practices for physical and data security convergence.

The Road to ConvergenceTIP #1: Assess the Cable Plant

Before you can put data and physical security on the same network, make sure your network is running into every building on campus, and that the network has enough bandwidth to carry the additional load, advises Phil Mullendore, president of the Institute for Campus Safety, a consulting firm in Blue Jay, CA. Many campuses skip this important step, he notes, only to find out (after spending tens of thousands of dollars on convergence) that they needed to upgrade their infrastructure at stage one. "You can't bring together different kinds of security on one network if the network can't support converged security in the first place," he warns. The solution: an up-front network assessment to compare capacity with potential demand.

TIP #2: Choose Wisely

Just because you've decided to converge data and physical security doesn't mean you should blend every aspect of both. Peter Beardmore, product marketing manager at RSA, the security division of worldwide integrator EMC, says it's important for administrators to think twice about which aspects of logical and physical security they wish to merge, and for technologists to remember that some systems and applications may be more effective on their own. In particular, Beardmore suggests technologists seek to create a situation where users are issued a single credential when they log on-- and that credential provides both access to data, and physical access to areas of the campus, as well. "You want a system that ensures there's role-based information that can proliferate out to each individual application," he says. "If you can't provide that, you may want to keep some applications separate."

TIP #3: Be Patient

Converging different flavors of security onto one network doesn't happen overnight; in many situations, particularly at large public schools with tens of thousands of users, the process can take years. "Even in well-planned implementations, you have to allow for unexpected hurdles and obstacles," Beardmore stresses. "These are never onesize- fits-all, set-it-and-forget-it types of things." He adds that every implementation is different, so the step-by-step process that worked for one institution might not work for yours. To overcome these obstacles, Beardmore says it's always a good idea for technologists to employ a graduated implementation plan that establishes project milestones from inception, and builds in time for surprises, whatever they might be.

The Road to Convergence

Benefits to having data and physical security running over the same network are indisputable.

TIP #4: Engineer for High Availability

The benefits of having data and physical security running over the same network are indisputable: increased efficiency, cost savings, and more. If the network goes down, however, the entire institution could be in a boatload of trouble. Stephen Northcutt, president of the SANS Technology Institute, a postgraduate information security college in Bethesda, MD, says every school that opts to converge disparate kinds of security must engineer for high network availability, and develop a contingency plan should the network fail. "Redundant power supplies and asymmetrical routing are even more critical when everything is riding on the same network," he says. "You can never be too careful."

TIP #5: Test, Test, Test

Once you've blended data and physical security, it's critical to test the converged network to make sure it works. Northcutt says this process should be painstakingly comprehensive, since securing the organization's assets is perhaps the most important task facing technologists today. "Testing the network should go well beyond ordinary quality analysis," he says, suggesting that network security administrators should perform a literal battery of tests to make sure the network can withstand every kind of attack. Northcutt notes that in many cases, it may behoove an institution to hire an outside organization or consultants to perform these tests. Another option: ethical hackers, people employed by the school to find holes in network defenses before truly nefarious users do.

TIP #6: Don't Forget the Humans

In the world of security, even the most sophisticated technologies can't substitute for human intuition. Mullendore insists that the most important factor in security is monitoring, and that no automated system-- no matter how bleeding-edge it might be-- possesses discretionary decision-making on a par with that of a human being. "Whatever kinds of security you've got on your network, a living and breathing person has to receive each alarm and make the decision to send somebody or ignore it," says Mullendore, a former campus security officer who also serves as executive director of the California College and University Police Chiefs Association. "Whatever you're spending on your security network, never underestimate the importance of people."

About the Author

Matt Villano is senior contributing editor of this publication.

Featured

  • glowing brain, connected circuits, and abstract representations of a book and graduation cap on a light gray gradient background

    Snowflake Launches Program to Upskill 100,000 People in Data and AI

    Cloud data platform Snowflake is embarking on an effort to train and certify more than 100,000 users on its AI Data Cloud by 2027. The One Million Minds + One Platform program will provide Snowflake-delivered courses, training materials, and free access to Snowflake software, at no cost to learners.

  • two abstract humanoid figures made of interconnected lines and polygons, glowing slightly against a dark gradient background

    Microsoft Introduces Copilot Chat Agents for Education

    Microsoft recently announced Microsoft 365 Copilot Chat, a new pay-as-you-go offering that adds AI agents to its existing free chat tool for Microsoft 365 education customers.

  • hand touching glowing connected dots

    Registration Now Open for Tech Tactics in Education: Thriving in the Age of AI

    Tech Tactics in Education has officially opened registration for its May 7 virtual conference on "Thriving in the Age of AI." The annual event, brought to you by the producers of Campus Technology and THE Journal, offers hands-on learning and interactive discussions on the most critical technology issues and practices across K–12 and higher education.

  • Three cubes of noticeably increasing sizes are arranged in a straight row on a subtle abstract background

    A Sense of Scale

    Gardner Campbell explores the notion of scale in education and shares some of his own experience "playing with scale" — scaling up and/or scaling down — in an English course at VCU.