Tag Archives: Identity Management

Innovation – Are You Listening?

What is Innovation? Is innovation simply developing NEW products? We are told, new products are the result of the innovation process. So, how does this thinking apply to the Security Industry? True innovation requires insight, vision and APPLICATION! The insight … Continue reading

Posted in Cybersecurity, Data Security, Identity Management, Information Security, Integration, Physical Security, Technology | Tagged , , , , , , , , , , , , , , , , , , , | Leave a comment

Prepare for Identity Management in Physical Security to Change Drastically

Smartphones & Big Data Many of our everyday online activities are leveraging authenticating digital identities, cloud data resources and mobile convenience. As all of us come to depend more on smartphone functionality (pay at the pump, ATM’s, building access, network … Continue reading

Posted in Big Data, Cybersecurity, Data Security, Identity Management, Information Security, Physical Security, Technology | Tagged , , , , , , , , , , , , , , , | Leave a comment

76 Percent of Organizations Breached in 2015

  This figure was both a surprise… and not. The majority of cyber attacks are not reported, for good reason. It is embarrassing for private enterprise to publicly report a data security breach. There is an obvious negative impact on … Continue reading

Posted in Cybersecurity, Data Security, Identity Management, Information Security, Physical Security, Technology | Tagged , , , , , , , , , , , , | Leave a comment

The Most Basic Physical Security Vulnerability

Mechanical Key Override I am so often amazed to see Security Integrators uninterested in the end-user/owner’s decision how to manage a mechanical key override solution for electronic access control. This is the most severe, easily recognized vulnerability in the entire … Continue reading

Posted in Identity Management, Integration, Physical Security, Technology | Tagged , , , , , , , | Leave a comment

Maintaining Relevance in a Dynamic Landscape

Now, there’s the rub! Is the consultant addressing topics relevant to the client’s perceived need, or just addressing his/her area of expertise? We live in a world where organizations face a diverse array of threats. The daunting task of the … Continue reading

Posted in Cybersecurity, Data Security, Information Security, Physical Security, Technology | Tagged , , , , , , , , , , | Leave a comment

Security Fears vs. Awareness

I had an interesting conversation last year with a Data Security Consultant, Mark Turturo, CISSP. I have been working since then to better understand the mission of these professionals and their relevance to the physical security specialist. I operate in … Continue reading

Posted in Cybersecurity, Data Security, Physical Security, Technology | Tagged , , , , , , , , , | Leave a comment

Differentiating System Integration as a Service

Professional Services Role in Physical Security I find it interesting to note that most manufacturers in the security industry call their channel partners “Security Integrators”, rather than Security Contractors. It represents a fundamental misunderstanding of system delivery business models. Does … Continue reading

Posted in Integration, Physical Security, Technology | Tagged , , , , , , , , , , , , | Leave a comment

Secure Data and Identity Management Solutions

As automated building systems become more dependent on shared network infrastructure, I.T. (Information Technology) Directors and CISO’s (Chief Information Security Officers) are beginning to realize these systems are adding significant vulnerabilities and risks to their network and sharing this realization … Continue reading

Posted in Cybersecurity, Physical Security, Technology | Tagged , , , , , , , , , , | Leave a comment

Convergence of Physical and Information Security

As mentioned in previous posts, all data paths eventually converge via LAN/WAN… so how will physical security evolve to accommodate this reality? Technology has one and ONLY ONE purpose in the physical security space: improving the effectiveness and/or efficiency of … Continue reading

Posted in Physical Security, Technology | Tagged , , , , , , , | Leave a comment