Smartphones & Big Data
Many of our everyday online activities are leveraging authenticating digital identities, cloud data resources and mobile convenience. As all of us come to depend more on smartphone functionality (pay at the pump, ATM’s, building access, network access, etc.), the digital credential and logical access via cloud apps will eventually replace the physical card.
It is easy to overlook the complexity that convenience may add to physical security planning. In the very near future, the C-Suite will demand that security professionals find strategies to allow the convenience of these new technologies, WHILE MANAGING THE SECURITY VULNERABILITY.
If you have not already begun the research into this new technology, start now:
Our Greatest Security Challenge
This will be the greatest challenge the security industry has faced in the last 20 years. Big Data and The Cloud will be our society’s future and the C-Suite will demand it. You think not? All of us will demand it. Whether it is employees, consumers, clients… we will all come to expect the convenience of managing/controlling both Internet-of-Things (IoT) connected devices and Cloud apps from our smartphone.
If you don’t think technology convergence is happening in the security space today, think again. Information Security (InfoSec), Network Security (IPSec) and Physical Security (PhySec) will all bleed together, because they must! In order to protect our assets (people, places, things) in this new emerging world, these disciplines will lean on each other to develop strategies that don’t exist today. I hope we are all up for the challenge and enough of us see the future to remain relevant in this changing landscape.
Why Ring the Bell Now?
After reading the article below, I decided it was time for me to emphasize this message. I didn’t think CIO’s were ready to accept this technology yet and deal with the vulnerabilities it brings, but ATM’s are too mainstream. The future is closer than I realized. Take a look…
This site is maintained by Douglas Levin. It is intended to be a personal professional blog. The content reflects my personal opinions and observations regarding the Physical Security industry and Technology Sectors. The opinions expressed herein reflect my personal viewpoint/ideas and do not in any way represent the position of any other person, organization or company.