No matter lessons learned from previous incidents, healthcare facilities continue to embarrassingly report laptops and flash drives containing patient information misplaced, lost and stolen, even in the face of increased regulatory procedures demanding more and better security through the Health Insurance Portability and Accountability Act of 1996 and the more recent Health Information Technology for Economic and Clinical Health Act.
Security officers are generally regarded as the face of security. Officers present a professional appearance at company entrances, patrol and tour facilities and grounds. But without tools, how effective is that officer? What value is a security officer’s presence bringing to the organization? And when cutbacks hit an organization’s security department, how can security directors maintain the same physical presence with fewer faces?
Facial recognition and video based biometrics continue to be a hot topic with security professionals. While shows like CSI, Law & Order and 24 make it seem that technologies exist that can pick a terrorist out of a crowd in Times Square or spot a criminal the moment he steps foot on the street, the reality is that we're not quite there...yet.
Whether it’s a church door, an entrance into a high-tech Internet company or admission to a local police station, enterprise security leaders often view the application of access control technology one door at a time.
A prox card is a card is a card unless you do more things with it. And that’s what is happening as radio frequency identification (RFID) in its many increasingly powerful forms becomes a diverse security and business tool to apply to people, vehicles, assets and even processes. Active or passive, more or less intelligent, contact or contactless, with ranges from inches to feet, RFID is suddenly the super solution.
Global Security Operations Centers (GSOCs) are a valued necessity to support an enterprise’s global business goals and operations today, but building one requires buy-in, organization and insight from the enterprise’s internal and external customers, including its GSOC operators.