Criminal cyber activity evolves at an incredible pace. Today’s cybercriminals are constantly on the lookout for security gaps that will give them access to your facilities or a wide range of important, private and sensitive information. In our increasingly interconnected world, the potential avenues of exploitation seem greater than ever.
Security directors are no stranger to the necessity of blending legacy physical security devices and software with newer products and services. Whether you are a retail business in search of higher resolution camera technology for more accurate images, or you’re the head of a multi-location organization that wants to leverage new access control card reader technology with existing hardware without installing completely new door controllers, card readers and wiring, retrofits are a large percentage of installations, encompassing many of our industry’s technologies.
Measuring a return on investment (ROI) for security infrastructure is challenging. Most organizations primarily view security investments as a must-have capital expenditure. They know security systems are fundamentally necessary to protect people and assets and keep operations running smoothly. So while these technologies fulfill objectives and successfully help security teams prevent incidents, organizations oftentimes will ask: How can we truly quantify the value of a breach that never occurred?
Though many security managers tend to have tunnel vision on the techy aspects of building a SOC, often the most important things to consider are the most basic and in a command center environment, that begins with an operator-centric design.
AMAG Technology’s Symmetry Access Control Software V9 comes with a new installation method, which installs over the previous version, eliminating the need to uninstall the earlier version, saving time and money.
With estimates hovering around the $1 trillion mark for security products and services spending in the next five years, according to Cybersecurity Ventures’ Cybersecurity Market Report, it’s no wonder security executives are on the lookout for best practices for global integration. The best approach is for security systems integrators to invest in and embed with their global customers to provide consistency and serve as their single point of contact for all their systems integration needs.
Since its establishment in 2001, video surveillance manufacturer Hikvision has grown rapidly to have the largest global market share for its segment. However, the company’s space in the industry spotlight has not come without challenges, including being vulnerable to the Mirai malware attack in March 2017 and skepticism from end users and other vendors about the Chinese video surveillance company.
Security magazine recently set some of these questions to Hikvision USA’s President, Jeffrey He, who responded to some recent allegations and end users’ concerns.
This month in Security magazine, we explore how Corning's global security group ensured business continuity and employee safety during the global COVID-19 pandemic. Also, we highlight the global security team at Uber and their recent security programs and initiatives. Industry experts discuss travel safety programs, career hackers, working for terrible bosses, group attribution error and more.