Just as SeeView can apply security technologies to impact business goals and security needs, Xcel Energy, a major energy producer headquartered in Minneapolis, prides itself on using innovative methods to reliably produce and deliver power to its 3.4 million electricity and 1.9 million natural gas customers in eight Western and Midwestern states.
Just as some integrators focus on certain vertical markets, some security service firms are focusing on data center security for government and other clients.
One example from the recent ASIS International: Salient Systems’ new CompleteView Cloud is a hosted video surveillance service powered by Dell OEM Solutions.
Government activity can mandate security activity at numerous types of enterprises. At London-based CMC Markets, security technology from Avigilon covers all egress access points throughout the office, lobby, main coffee area and seminar room, client areas, IT rooms and, of course, the data center.
Software as a Service (SaaS) is a delivery model in which applications are hosted at an outsourced data center and sold to the enterprise security or IT user as a monthly subscription. With the physical security industry increasingly shifting to this approach, it is crucial that government buyers understand what security factors to consider when looking for a SaaS provider, according to Steve Van Till of Brivo Systems.
The U.S. Department of Defense (DoD) has incorporated fingerprint biometrics and facial images into its common access cards (CAC), which control entry to DoD facilities and information systems including data centers, according to a background briefing by Security and SDM magazines with HID Global experts.
Current background screening pushes criminal, educational, credit and federal tax reports back until after an applicant is actually hired, instead of before.
Since HSPD-12 was announced back in 2004, state and local government agencies as well major federal contractors have felt pressure to start incorporating FIPS-201 compliant cards and readers into their access control systems. Sometimes, these cards are called something else – for instance, they are referred to as CAC cards by the military.