Operational Security Technology: Principles, Challenges and How to Achieve Mission-Critical Outcomes Leveraging OST

OST report cover

Download the Report

Supported By:

Allegion, M.C. Dean, ONVIF, Wesco

About the Report

SIA is pleased to present an impactful resource – Operational Security Technology: Principles, Challenges and Achieving Mission-Critical Outcomes Leveraging OST. Authored by cyber-physical security experts John Deskurakis and Chris Lynch, this in-depth SIA report explores prominent types of operational security technology (OST) and their corresponding challenges, as well as best practices and strategies for optimal delivery.

This report serves as beneficial reading for anyone who is installing security systems, as well as end users of security systems, including corporate security practitioners and business managers who are thinking about their security investments and want to gain a greater understanding of OST.

Key focus areas and elements of the report include:

  • A look at the growing global market demand for operational technology
  • The connection between operational technology, information technology and physical security
  • Definitions and key concepts within OST, including the types of OST that may be connected, integrated and automated within security
  • Common components and key elements of physical access control, video surveillance, detection, perimeter and environmental security and security management systems
  • Key considerations and questions for businesses to consider when rolling out new OST solutions

The report also cites a robust array of further recommended reading, including reference material relating to OST and physical security, OST best practices and strategy recommendations for managing OST systems.

Operational Security Technology: Principles, Challenges and Achieving Mission-Critical Outcomes Leveraging OST is available to download for free thanks to the generous support of our sponsors.

Download