Story image

Survey: Rising role of IT in physical security provides opportunities

10 Sep 2018
Sponsored

While departments have suspected it, new research has confirmed IT’s increasing involvement in physical access control.

A survey from HID Global found that IT departments now play a prominent role in an organisation’s physical access control decisions and implementation, with 55 percent of the respondents reporting IT as primarily responsible or having shared responsibility for access control within their organisation – and that number is expected to grow.

This means in addition to protecting company network and cybersecurity-related issues, IT departments are having to adapt to spearhead those set forth by the physical security department to protect employees, visitors, and assets from internal and external threats.

The purpose of the survey was to gain insight into the relationship between an organisation’s physical security and IT departments, how the two work together, and how investments in new technology are made.

HID Global has provided access to the whitepaper that delves into these findings and more to determine how they can be applied in today’s digital world, providing actionable insights that will increase collaboration between IT and physical security.

Read this whitepaper to learn:

  • Why IT is becoming more involved with physical access control
  • How budgets for access control are moving to IT
  • What pain points IT encounters with access control systems
  • Best practices in building relationships between IT and physical security

Click here to access the HID Global whitepaper.

Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.