We have been hearing about the “convergence” of physical and cyber security for years, but even today there are still debates about whether it has happened yet (spoiler alert: it hasn’t). Part of the challenge might be that the word convergence itself can apply to more than one kind of activity – for example, some believe it applies to the linkages or integration of IT and security systems, while others believe it applies to IT and security organizational structures and teams.
A Ponemon Institute study has found that 73 percent of respondents believe their organization’s IT security functions are typically understaffed due to the difficulty in attracting and retaining qualified candidates.
The latest version of this unified IP security platform offers a new disaster recovery mode, enhanced levels of authentication and encryption, augmented video archiving and export management capabilities, and new choices of supported access control software.
This integrated server, switch and software platform is designed in a compact form factor, and the unit is ruggedized to withstand temperature conditions from -40ºC to 60ºC (-40ºF to 140ºF) without the need for additional heating or air conditioning.
Launched in 2007, Operation Shield is an initiative of the Atlanta Police Foundation and the Atlanta Police Department (APD) to generate effective communication between the APD and both the public and private sectors and create a force multiplier for crime prevention and emergency preparedness. Through the Operation Shield Video Integration Center (VIC), APD officers are able to use software to monitor video feeds from both public and private sector cameras.
Start the New Year off right by upgrading your security system to the latest technology. Analog has been going out of style over the past few years because it is easier than ever to migrate to an IP solution.
Risk management too often is perilously fragmented and insufficiently funded. Managing the overall risk equation is assuredly a CEO-level and management team obligation. But the design and execution of effective strategies to identify and moderate risk is, of necessity, complex and typically spread among numerous organizational silos.
It’s a mishmash of letters – PSIM – but what it stands for isn’t mishmash at all. PSIM, or Physical Security Information Management, is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface.
Our June issue cover article features “Security Leadership: Women in the Spotlight”.
Also in June, video is becoming a fundamental component of a quality security plan. How can CPTED strategies lead to better physical enterprise security? And discover How David Espie, Director of Security, secures Mayland's Seaports.