Sept-Oct 2018

Multiple Products Family 5689x4528
Asset and GPS Tracking

HID Location Services

Aug. 21, 2020
Provides actionable occupancy data that scales based on the need of the facility
Act365 Ipad
Hosted/Managed Access Control

Vanderbilt ACT365 Cloud-based Access Control and Video Management

Vanderbilt ACT365 is a complete cloud-based access control and video management solution that enables end users to manage their security system from any device at any time. The...
NWK11M Kit 5b80434982a25
Data Transmission Equipment

ComNet NetWave NWK11m Wireless Ethernet Solution

Designed for applications where existing media or the installation of new copper or fiber media is not cost-effective
Figure 1: This risk funnel represents how Enterprise risk is managed and evaluated by professional services companies. The wide section at the top indicates all of the risk that must be managed and mitigated; the narrow section at the base represents a reduction in risk due to the application of governance. Security and the risks present from threats are typically evaluated topically without any converged, overall risk score.
Information Security

The New Paradigm of Converged Security and Risk

Sept. 20, 2018
How the convergence of IT, OT and physical security will improve risk assessment and mitigate organizational liability
Photo Courtesy of iStock
The interdependence of America’s power grid, and the geographic concentration of America’s refineries creates a vulnerability that certainly attracts the attention of terrorists; indeed, many experts think that energy systems are an attractive target to cyber-criminals/terrorists
Access Control

America’s Critical Infrastructure: Threats, Vulnerabilities and Solutions

Sept. 20, 2018
Security managers must grasp the interface between physical and cyber threats

More content from Sept-Oct 2018

Photo Courtesy of BigStock.com
Public, private and government sectors face a race against time in ensuring the critical infrastructure of the nation's technology, business and energy assets are secure.
Access Control

Government and the Private Sector Share Responsibility for Secure Infrastructure

Sept. 20, 2018
How to effectively manage risk for the protection of facilities, technology assets and business operations
The NIST Security and Privacy Controls for Information Systems and Organizations encompass a comprehensive assessment methodology that can be applied to specific types of organizations, manufacturers, industrial control systems, defense and US Federal contractor protection of confidential and unclassified information, etc.
Security Industry Services

Cybersecurity Assessments: An Overview

UL and NIST provide options for system manufacturers and Integrators, so which should you choose?
Photo Courtesy of BigStock.com
In today’s modern, interconnected world, the potential impact of inadequately securing ICS can be catastrophic, with lives at stake, costs extensive and corporate reputation on the line.
Access Control

Steps to Control Your Industrial Control Systems

Sept. 20, 2018
Organizations must take a risk-based approach to ICS security
Geospatial systems allow for real-time map-based representation of a surveillance system’s sensor and alarm locations.
Video Analytics

Geospatial Awareness Could Be the Next Big Thing for VMS

Sept. 20, 2018
Sensor devices gather input from across the map to provide security personnel actionable data
Photo Courtesy of VidSys Inc.
Situational awareness data from external sources provides dynamic reporting that provides a more comprehensive understanding of where these threats are happening and how they could potentially impact operations.
Sensors & Detectors - Combination Sensors

How CSIM Can Facilitate Crisis Communications

Sept. 20, 2018
Technology blends a common operating picture with situational awareness to create actionable mitigation
Clyde Hewitt, CISSP, CHS is vice president of security strategy at CynergisTek. He brings more than 30 years of executive leadership experience in cybersecurity to his position with CynergisTek, where his many responsibilities include being the senior security advisor and client executive, thought leader and developer of strategic direction for information and cybersecurity services, nationwide business development lead for security services, and contributor to CynergisTek’s industry outreach and educational events.
Information Security

The Top 5 Mistakes Made When Apps and Data Move to the Cloud

We don’t have resources to invest in that new server farm, so let’s move it to the Cloud. Have you ever heard that from your C-Suite?New applications or significant upgrades to...
Photo Courtesy of Magos Systems
When it comes to deploying radar, many external and physical factors should be considered. When looking to install radar onsite, it is best to work with a systems integrator with a proven track record of accurately assessing substation environmental conditions and effectively configuring radar solutions to fit the needs of the individual property.
Physical Hardening

Radar Proves an Effective Security Option to Protect the Grid

Sept. 20, 2018
Many security professionals have viewed radar as a military tool but commercial applications abound
Photo: iStock
Ensuring cybersecurity of Cloud offerings is a shared responsibility of both the client and practitioner.
Information Security

Cyber Tech: How-To Secure Microservices and Containers

Sept. 20, 2018
With the rapidly growing need for security, teams need to understand the full set of requirements for a successful implementation
Write to Ray about this column at ConvergenceQA@go-rbcs.com. Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities. Ray is an active contributor to the educational activities ASIS IT Security and Physical Security councils. For more information about Ray and RBCS go to www.go-rbcs.com or call 949-831-6788. Ray is also a member of the Content Expert Faculty of the Security Executive Council (www.SecurityExecutiveCouncil.com). Follow Ray on Twitter: @RayBernardRBCS
Integrated Security Management Systems & PSIM

Convergence Q&A: Smart Buildings and Security Technology

Smart buildings are now a reality and bring new concepts to the table for thinking about security technology in a smart building environment.Q: Our company is considering building...
Mc Cumber, John 10515218
Information Security

Cool as McCumber: Lessons from Hacker Summer Camp

Sept. 20, 2018
I just returned from what is euphemistically called Hacker Summer Camp. Three popular conferences all take place within a two-week period each summer in Las Vegas: BlackHat, BSidesLasVe...
Photo: Yubico
The YubiKey enables two-factor network authentication with the touch of a finger.
Information Security

Tech Trends: Protect Your Login Process

Sept. 13, 2018
Summer tech finds: A closer look at an effective method of two-factor authentication and more
dahua cam 5bac87f5d2650
Night-Vision, Thermal & Infrared Cameras

TPC-SD8420-B Hybrid Thermal Network PTZ camera from Dahua

Sept. 11, 2018
Provides cost-effective, long-range surveillance in a rugged all-in-one package
Image Courtesy of BigStock.com
IoT devices can provide great benefits through accessing more information and facilitating that information’s use. This can be used to benefit physical security solutions.
Access Control

Physical Access Control Confronts a New World

Aug. 10, 2018
How the emergence and expansion of IoT devices is and will impact conventional physical access control
230XBadBoys 5b85734f64516
Locks

Multi-Point Lock from Detex

March 13, 2017
GSX 2018 Booth #2851