Why Zero Trust Should Matter to Physical Security Integrators

Sept. 13, 2024
Not only can it protect your customers’ systems, but the concept offers a clear path to RMR and more managed services

This article originally appeared in the September 2024 issue of Security Business magazine. Don’t forget to mention Security Business magazine on LinkedIn and @SecBusinessMag on Twitter if you share it.

In the past decade, physical security has undergone a revolution driven by the explosion of digital technology. Cybersecurity has moved from being a very peripheral consideration in discussions on physical security to now being a basic concept, with zero-trust architecture moving right to the center.

Zero trust is based on the model “never trust, always verify” – underlying the assumption that threats could come both from outside and inside the network. That change of attitude has critical importance in safeguarding modern, interlinked security systems.

As physical security continues to evolve, the integration of zero-trust principles will gain importance over time, which creates both a challenge and an opportunity for integrators.

Physical security needs to commit to a converged approach with cybersecurity defense, where zero trust will become a weapon to maneuver this landscape effectively. Through strategic partnerships and keeping up on the latest technological trends, integrators can put themselves at the forefront of this quickly changing industry.

By accepting zero-trust and marketing it as part of a full security solution, integrators will not only create a package for security enhancements within their clients’ systems but also ensure that a business model emerges that is sustainable and viable.

Zero Trust: What it Means and Why it Matters

Zero trust is definitely not a “buzzword” term in the cybersecurity environment; rather, it is a complete sea of change toward how one should approach security.

In the past, users – and to some degree, devices – were trusted by default when they were inside a network; however, the current threat landscape means this security model no longer works. Whether devices, humans, or their related connections, zero trust means that all of them must be verified; thus, guaranteeing and ensuring that only authenticated and authorized entities access critical systems.

A zero-trust approach can be used to create profitability for integrators. Services could range from regular system audit reports, real-time response to threats, and updating systems.

For physical security integrators, complying with zero trust principles means installing strict access controls and ensuring that every component of the security system – from video surveillance to access control – is built along these lines.

Thus, zero-trust principles have high relevance to the current landscape of physical security, since most security systems – such as video surveillance – are integrated with IT infrastructure, and hence are vulnerable.

With the increase in the use of artificial intelligence and machine learning in video analytics, the reasons for a strong security framework become even more compelling. AI-based systems shift video surveillance from being reactionary to proactive, identifying threats and offering real-time responses; however, this also widens the attack surface – making zero trust implementation all the more critical.

Integrators must focus on proven technology that complies with industry standards, such as NIST 800-171 and 800-53; ensuring that the deployed systems are not only secure in functionality but also resilient to evolving cyber threats.

Managed Services and Zero-Trust

Managed services offer one of the strongest ways in which an integrator can provide zero trust.

The key to managed services is ensuring that integrators continuously monitor, detect threats, and update systems; in so doing, security will have been delivered to their clients sustainably over time. Managed services also unlock potential new monetization avenues for integrators by ensuring ongoing support rather than service stopping at installations.

Putting zero-trust principles into managed services is more than just technology; it requires expertise. Integrators should focus on bringing cybersecurity professionals into the fold – whether by hiring them or by outsourcing these services to specialized third-party providers (ideal for smaller integration firms). These professionals are capable of assessing and improving the security of their clients’ infrastructures.

Monetizing Zero-Trust

The principles of a zero-trust approach can also be used to create profitability for integrators. The higher awareness by businesses on the need for cybersecurity also drives the need to invest in solutions that will bring all-around protection to these businesses.

This, therefore, places integrators as professionals with differentiated service provision within both physical and cybersecurity – bringing in new business opportunities.

Recurring revenue models, for example, subscription-based managed services, provide a reliable revenue stream while building long-term relationships with clients. Such services could range from regular system audit reports, real-time response to threats, updating systems, and ensuring that clients’ systems are updated against the newest threats.

About the Author

Pierre Bourgeix | CEO of ESI Convergent

Pierre Bourgeix is Chief Executive Officer of ESI Convergent, a management consulting firm focused on helping companies assess and define the use of people, processes, and technology within the physical security and cybersecurity arenas. He has spent 30 years as a global security consultant and innovator through his experience with Rand Corporation, U.S. State Department, ADT/Tyco Security, HySecurity, Wallace International, SecureState, and Boon Edam.

https://www.esiconvergent.com

Eric Van Egeren, generated by Adobe Firefly/AI, iDea24Club | Generated by AI | 914598846| Adobe Stock
By offering data analysis as a service, integrators can take advantage of RMR and monetization while creating stickier customers empowered to improve their organizations with business intelligence.