Skip to content

What happens when logical and physical securities converge?

GSX2019-socialshareimage

Managing security is tough. It’s not just because the stakes are getting higher while the resources are getting tighter.  The plethora of tools needed and skills required are overwhelming. Not to mention the pressure of validating threats in real-time to minimize oversight and false alarms.  While cyber and physical breaches may be different in nature, they both warrant attention. With so much data coming in fast from everywhere: CCTV, sensors, network infrastructure, social media, alarms, access control, utilities, etc., security professionals need an automated way to get that 360 picture in real-time regardless of the threat origins so risks can be managed holistically.

At IFSEC 2019, a premier security conference which took place in London just a month ago, the topic of ‘Converged Security’ took center stage. “Change is the only constant, and the way to deal with that is by converging physical and cyber security, which have operated in separate silos in the past,” said Sarb Sembhi, certified information security manager (CISM) and CISO at Virtually Informed.  “To cope with the constant changes in the world around us, we need bring physical and logical security together in a single security operations center (SOC) to provide a single view,” he added.   The vision of a converged SOC is now a reality as demonstrated at the conference.

 

 

Note: this post originally appeared on Micro Focus’ IM&G community blog. 

 

Intelligent GSOC is a joint solution developed by Vidsys and Micro Focus that combines data aggregation, analytics, workflows and visualization into one easy to use platform. Join us at the upcoming Global Security Exchange (GSX) conference, September 10-12 in Chicago. Stop by Booth #242 to learn more about how this solution can help your organization simplify situation and risk management; or visit our Events Page now to schedule a live 1-on-1 demo with a Converged Security expert during the show!

Facebook
Twitter
LinkedIn
Pinterest

By using this site you acknowledge our use of cookies. Read about how we use cookies, your privacy rights, and our data practices in our privacy policy.