Prepare for Identity Management in Physical Security to Change Drastically

Mobile Keys Pic

Smartphones & Big Data

Many of our everyday online activities are leveraging authenticating digital identities, cloud data resources and mobile convenience. As all of us come to depend more on smartphone functionality (pay at the pump, ATM’s, building access, network access, etc.), the digital credential and logical access via cloud apps will eventually replace the physical card.

It is easy to overlook the complexity that convenience may add to physical security planning. In the very near future, the C-Suite will demand that security professionals find strategies to allow the convenience of these new technologies, WHILE MANAGING THE SECURITY VULNERABILITY.

If you have not already begun the research into this new technology, start now:

Our Greatest Security Challenge

This will be the greatest challenge the security industry has faced in the last 20 years. Big Data and The Cloud will be our society’s future and the C-Suite will demand it. You think not? All of us will demand it. Whether it is employees, consumers, clients… we will all come to expect the convenience of managing/controlling both Internet-of-Things (IoT) connected devices and Cloud apps from our smartphone.

If you don’t think technology convergence is happening in the security space today, think again. Information Security (InfoSec), Network Security (IPSec) and Physical Security (PhySec) will all bleed together, because they must! In order to protect our assets (people, places, things) in this new emerging world, these disciplines will lean on each other to develop strategies that don’t exist today. I hope we are all up for the challenge and enough of us see the future to remain relevant in this changing landscape.

Why Ring the Bell Now?

After reading the article below, I decided it was time for me to emphasize this message. I didn’t think CIO’s were ready to accept this technology yet and deal with the vulnerabilities it brings, but ATM’s are too mainstream. The future is closer than I realized. Take a look…

If you would like to discuss this, or other security topics, please contact Doug via LinkedIn. Also, take a look at his LinkedIn Discussion Board Security Convergence, or his Twitter feed @DLIPTech.

This site is maintained by Douglas Levin. It is intended to be a personal professional blog. The content reflects my personal opinions and observations regarding the Physical Security industry and Technology Sectors. The opinions expressed herein reflect my personal viewpoint/ideas and do not in any way represent the position of any other person, organization or company.

About Doug Levin

Doug is a certified (PSP, AHC, LEED AP), experienced business development professional with a focus on the physical security industry. With a diverse background that includes delivering products & services through multiple channels (manufacturing, distribution, specialty & general contracting), he brings a broad industry perspective that adds greater value for his clients. Having decades of experience with sales engineering and design-build of low-voltage automated systems, he also offers a strong emphasis on technical knowledge and consulting services. His career has included responsibility for: profit & loss, operations and sales management with front-line experience in estimating, sales/marketing, project management and developing security design documents & spec writing.
This entry was posted in Big Data, Cybersecurity, Data Security, Identity Management, Information Security, Physical Security, Technology and tagged , , , , , , , , , , , , , , , . Bookmark the permalink.

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s