ASIS 2017: The Importance of Physical Security to Enterprises

With the start of the ASIS 2017 Conference, organizations from around the world will be turning to the top global security leaders to identify new ways to approach security within their business. While IT and cybersecurity threats are growing, it is important for companies to not neglect their physical security strategy.

Organizations with widely dispersed assets should be cognizant of the overall protection of confidential resources. Although many companies often focus on the technical and administrative elements of security, physical security is intended to protect the assets and facilities of an organization with the preeminent responsibility of safeguarding employees and facilities. Without protection from a physical security breach, all other security measures would be useless.

A couple of different factors can affect physical security, including unintentional natural disasters or intentional malicious groups. Natural disasters such as a flood or fire can destroy data or make it very difficult to recover, while malicious groups such as hackers, thieves or terrorists can lead to the misuse of highly classified information.

Attackers often have an easy opportunity to exploit data and gain unauthorized access to penetrate networks. To maintain strong physical security and help slow down criminals from bypassing layers of security, enterprises should consider:

  • Cameras
  • Access Control
  • Sensors
  • Building Management
  • Alarms
  • ID management
  • GIS Mapping
  • Perimeter security such as mantraps, fences, gates and turnstiles
  • Safe locks
  • Store backup devices in a secure place with authorized access only

As physical security becomes more challenging than ever with the increase in sensitive devices that make data much easier to steal, implementing a Converged Security and Information Management (CSIM) software platform can help organizations with a large physical footprint through geo-spatially aligning information and assets into a single user interface.

Vidsys software is programmed to identify and present potential situations for evaluation by the command center operator, and the organization’s approved con-ops are automatically provided on-screen to ensure compliance and swift resolution. So when a threat occurs, it can be resolved accurately, efficiently and consistently.

If you will be at ASIS this year, sign up to attend our Intelligent Global Security Operations Center demo with Micro Focus. Learn more and sign up here.

Micro Focus Guest Blog: Faster And Better Decisions With Real Threat Awareness

Vidsys is partnering with Micro Focus for our Intelligent GSOC at the ASIS 2017 Conference next week. As we count down to ASIS, we’re sharing this blog post from Joe Leung, Micro Focus Analytics Marketing Manager, about generating real-time, data-backed decisions in response to threats.

“If only I knew that” is probably one of the most dreaded phrases to be uttered. This is especially true in the world of security where the stakes could be unimaginably high. Decisions such as locking down a school campus, shutting down a major event, or closing an airport terminal are serious ones with significant consequences. These consequences vary as they depend upon how quickly such a decision is made, and how effective the decision is in mitigating the risk. The challenge is to get as much relevant information about the threat as quickly as possible. So how do we tackle this information trinity – comprehensiveness, relevancy, timing – in security decision making?

Comprehensiveness – Are we tapping into all the data sources available to us so a real understanding of the threat can be established? CCTV is a well-established source where a diversity (human, vehicle, scene) of images may be available for threat analysis. Are we taking full advantage of all these different types of images? What about audio sensors? Would the sounds of glass breaking, people screaming or gun shots indicate a higher level of threat? What about communications in public (protest organization in social media) or in private (threatening email messages)? Would these communications be another critical piece of the threat puzzle?

Relevancy – Find what truly matters from the noise in the face of massive volume of diverse data is daunting. While a truck parked illegally may just constitute a minor traffic infraction, if the license plate does not match the make and model of the truck, and the truck driver’s face matches a picture on a watch list, these three individual incidents collectively provides highly relevant information that may call for a security response, which could be very different from responses for the individual incidents.

Timing – In a world where every second counts, any delay may mean a rapid escalation of potential carnage and/or damage. While it is hard to argue against the need to get all the relevant data for an intelligent decision, the disparate data sources, the varying data formats and the tsunami-like data flow are overwhelming the traditional human operator centric surveillance systems. Not only does the system have to spot a real threat in real-time, it must be able to alert the appropriate parties so the responders don’t miss a beat in addressing the threat.

The partnership between Vidsys and Micro Focus (formerly Hewlett Packard Enterprise) is laser-focused on addressing ALL of the above in one joint solution so security operators don’t have to compromise on either speed or effectiveness of their actions. If you are attending ASIS 2017, please register here to attend a reservation-only briefing on the big data analytics powered Intelligent GSOC, and to meet in-person the architects behind the solution.

See the original post on the Micro Focus blog here, and if you’ll be at ASIS, make sure to sign up to come to one of our demos here.

ASIS 2017: 3 Steps to Create an Enterprise Security Risk Management Program

At ASIS, one of the key themes will be how global organizations can create an effective security risk management program. But where should they start?

Businesses today are faced with a multitude of risks due to the complexity of technologies, regulations, system vulnerabilities, security threats and more. As your company’s information flows through networks, applications, databases and servers, it must be readily available, free from tampering and confidential to those only with authorized access.

To manage this complex environment of information, installing an intelligent software platform can convert your large amounts of unorganized, unstructured data to valuable, actionable information through correlations based on time, location, duration, frequency and type. An enterprise security risk management program should have the ability to integrate to other systems and subsystems, so that the software enables users to focus on managing situations rather than managing disparate technologies.

When implementing an enterprise security program to benefit your entire organization, follow these 3 steps for a holistic approach to IT security.

1. Prepare for challenges

Vulnerabilities, risks and threats all pose potential complications and can serve as a source of danger to your company’s information assets. Weaknesses or flaws in the system can lead to a security breach and can exist not only in technologies, but in people and business processes as well, and risks, such as loss of network connectivity, can result in devastating outcomes for your business. To prepare for these challenges, list out and categorize pertinent threats, assess vulnerabilities based on potential impact to the company, and prioritize risks based on likelihood and impact.

2. Manage outside your business

An enterprise security risk management program often entails dealing with third parties like vendors and suppliers. It is crucial for businesses to select trustworthy third-party companies, as those with unsecure networks or corner-cutting practices can create vulnerability and subsequent security threats. Be sure to know what security measures these companies have set in place, list out all of the third-party companies your business deals with, and then prioritize based on information overlap and criticality.

 3. Enable security controls

Effective IT security includes non-technical controls set in place for management and operational protocols, and technical controls implemented as a safeguard incorporated into hardware, software and firmware. As CIOs begin to establish these security controls such as deciding which monitoring and filtering technologies to purchase, they must work with other parts of the company to make business decisions collaboratively as the technology will have an impact on employees and processes.

As an organization’s ecosystem of information grows increasingly complex, information security becomes a critical factor to the entire company. By implementing a strong enterprise security risk management program, your entire organization will benefit.

Want to talk with one of our in-house security experts? Come to our Intelligent Global Security Operations Center demo with Micro Focus. Learn more and sign up here.

ASIS 2017: Global Responses to Global Threats

During the ASIS conference this year, one of the panels will be focused on the importance of information sharing and collaboration among policing and intelligence community partners (federal, state, and local) to successfully combat terrorism and protect communities worldwide.

At Vidsys, we provide converged security for global organizations and major cities across the globe, and understand the importance of collaboration in protecting businesses and communities. While this panel specifically focuses on federal and state and local governments, we see an increasing need for enterprises to address global threats as well.

As companies expand regionally, nationally and globally, being prepared for global threats is crucial. See below for ways to heighten your organization’s security and create a strong base for organizational safety, efficiency and success.

Build a customized GSOC

A Global Security Operations System (GSOC) is designed to empower security personnel with a platform delivering ongoing prevention, detection, protection and mitigation of threats to a company’s virtual and physical assets. This system can uncover weak areas, respond to potential threats and address any incidents, virtually or physically, occurring within your organization. While many companies believe an advanced operations center is too expensive to actualize, organizations can lower risk, increase operational efficiency and situational awareness without a major cost increase through proper planning and technology.

Manage data

Converged Security and Information Management (CSIM) provides a central operations dashboard where decision makers can see their organization’s data in an intelligent way. This technology platform assembles a common operating picture of all organizational asset data. Through tailored rules and regulations, organizations can set boundaries for what should be flagged as a risk. Warning signs for risk often begin with unusual activity virtually on an IT system. By collecting data from disparate sensors, devices, systems and subsystems, software tools are able to identify patterns that are unusual on any monitoring or sensor device

Integrate systems

Security sensors and video footage can help keep an organization physically secure, but businesses can leverage powerful technology to integrate data and receive automated, intelligent information that cuts out the risk of human error and facilitates the security process, saving an organization time and money and increasing employee safety. CSIM gathers video data and other information from access control systems, sensors, alarms, ID management, GIS and other data sources to create situational awareness and provide appropriate actions.

Whether your organization is already a global entity or you are currently expanding, consider your company’s approach to your operations, data management platform and various system structures to ensure that your organization is ready for if – or when – a global threat might strike.

If you will be at ASIS this year, sign up to attend our Intelligent Global Security Operations Center demo with Micro Focus. Learn more and sign up here.