There are approximately three million data centers scattered across the United States. These facilities house organizations’ networked computer servers that collect, store, process and provide access to large amounts of data for millions of users each day. Today, these server farms have become critical to the essential functioning of government entities, financial institutions, large enterprises, social network organizations and smart cities.
No matter how many drills, practices and training exercises an enterprise runs through, nothing can truly prepare security staff for the chaos that results during a security incident such as an active shooter event, which, on average, can last for 12.5 minutes. Given this reality, it only makes sense for the security department to develop standard operating procedures (SOPs) for security staff and operators to follow in an active shooter or other crisis situation.
Not too long ago, security operations centers (SOCs) and the enterprise security executives and the staff who ran them were relegated to airless basement offices with little security equipment that did no more than monitor video and manage guards.
By presenting a single view of the most critical events and automating workflows for others, Immix Command Center from SureView Systems makes it easier for security operators to manage all security incidents.
New PSIM solutions are changing perceptions in the professional security industry as they continue to prove how pragmatic and highly efficient they can be in improving the overall effectiveness and efficiency of security operations.
Risk management too often is perilously fragmented and insufficiently funded. Managing the overall risk equation is assuredly a CEO-level and management team obligation. But the design and execution of effective strategies to identify and moderate risk is, of necessity, complex and typically spread among numerous organizational silos.
It’s a mishmash of letters – PSIM – but what it stands for isn’t mishmash at all. PSIM, or Physical Security Information Management, is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface.
If 2013 was the year for grappling with a slow economy, 2014 will be the year where security technology makes a resurgence, and not just for what it can do in the control room, but in a number of other ways. Here’s my prediction for nine critical physical security trends for 2014.
Our June issue cover article features “Security Leadership: Women in the Spotlight”.
Also in June, video is becoming a fundamental component of a quality security plan. How can CPTED strategies lead to better physical enterprise security? And discover How David Espie, Director of Security, secures Mayland's Seaports.