Story image

Survey: Rising role of IT in physical security provides opportunities

10 Sep 18
Sponsored

While departments have suspected it, new research has confirmed IT’s increasing involvement in physical access control.

A survey from HID Global found that IT departments now play a prominent role in an organisation’s physical access control decisions and implementation, with 55 percent of the respondents reporting IT as primarily responsible or having shared responsibility for access control within their organisation – and that number is expected to grow.

This means in addition to protecting company network and cybersecurity-related issues, IT departments are having to adapt to spearhead those set forth by the physical security department to protect employees, visitors, and assets from internal and external threats.

The purpose of the survey was to gain insight into the relationship between an organisation’s physical security and IT departments, how the two work together, and how investments in new technology are made.

HID Global has provided access to the whitepaper that delves into these findings and more to determine how they can be applied in today’s digital world, providing actionable insights that will increase collaboration between IT and physical security.

Read this whitepaper to learn:

  • Why IT is becoming more involved with physical access control
  • How budgets for access control are moving to IT
  • What pain points IT encounters with access control systems
  • Best practices in building relationships between IT and physical security

Click here to access the HID Global whitepaper.

AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
'DerpTrolling’ faces jail time for Sony DoS attacks
A United States federal court has charged a 23-year-old man for the hacks on Sony Online Entertainment and other major companies back in 2014.
Dropbox strengthens security with raft of new partnerships
Integrations will keep customer content protected and secure with tools for controlling identity access, governing data, and managing devices.