Criminal cyber activity evolves at an incredible pace. Today’s cybercriminals are constantly on the lookout for security gaps that will give them access to your facilities or a wide range of important, private and sensitive information. In our increasingly interconnected world, the potential avenues of exploitation seem greater than ever.
Security directors are no stranger to the necessity of blending legacy physical security devices and software with newer products and services. Whether you are a retail business in search of higher resolution camera technology for more accurate images, or you’re the head of a multi-location organization that wants to leverage new access control card reader technology with existing hardware without installing completely new door controllers, card readers and wiring, retrofits are a large percentage of installations, encompassing many of our industry’s technologies.
Measuring a return on investment (ROI) for security infrastructure is challenging. Most organizations primarily view security investments as a must-have capital expenditure. They know security systems are fundamentally necessary to protect people and assets and keep operations running smoothly. So while these technologies fulfill objectives and successfully help security teams prevent incidents, organizations oftentimes will ask: How can we truly quantify the value of a breach that never occurred?
Though many security managers tend to have tunnel vision on the techy aspects of building a SOC, often the most important things to consider are the most basic and in a command center environment, that begins with an operator-centric design.
AMAG Technology’s Symmetry Access Control Software V9 comes with a new installation method, which installs over the previous version, eliminating the need to uninstall the earlier version, saving time and money.
In late 2015, Advance America – the largest payday lender in the U.S. with 2,050 locations across 29 states – wanted to see what other security integrators could do for their branches’ alarm services and security video.
With estimates hovering around the $1 trillion mark for security products and services spending in the next five years, according to Cybersecurity Ventures’ Cybersecurity Market Report, it’s no wonder security executives are on the lookout for best practices for global integration. The best approach is for security systems integrators to invest in and embed with their global customers to provide consistency and serve as their single point of contact for all their systems integration needs.
This month, Security magazine highlights John McClurg, Senior VP and CISO at Blackberry, and the evolving role of the CISO. Also, we highlight Tim McCreight, Acting CSO for the city of Calgary, Alberta, and discuss if civilians can truly Stop the Bleed and how to calculate ROI for better security. Industry leaders discuss public references and their impact on security careers, information security frameworks and convergence trends in 2020.