Historically, physical security systems and information technology systems dwelt in different silos. Chief security officers and chief information officers ran their respective domains without input from the other. But rapid adoption of IP-based security devices spurred the convergence of physical and information security, bringing the two spheres together. SIA is dedicated to managing disciplines within this convergence.

data privacy
, ,

New SIA Resources to Help You Navigate Data Privacy Regulations

With the California Consumer Privacy Act (CCPA) and the European Union’s (EU’s) General Data Protection Regulation (GDPR) in effect, take advantage of these two new guidance documents from SIA to help your firm navigate these regulations’ impact on your business. Both reports are available exclusively for SIA members; your firm’s SIA membership gives you access.…

Keep Reading »
, , ,

Introduction to Cloud-Based Access Systems

As the security industry expands to keep up with modern businesses’ needs, new technology is modernizing and improving access control. While current access control solutions are still satisfactory for many companies, cloud-based access control systems are steadily growing in popularity. Many access control experts are predicting a sharp increase in the number of customers who…

Keep Reading »
cloud
, ,

Moving to the Cloud: Key Questions for Integrators to Ask Cloud Providers

Off-premises solutions can provide multiple advantages to integrators When systems integrators embrace cloud technology, they enable a long-term solution that allows a transitional approach with many options available to customers. While preparing an integration business to provide cloud services for video, access control and other solutions can be a challenging and uncomfortable transformation, it is…

Keep Reading »
STI FAll 2019
, , , , , , , , , ,

SIA Technology Insights – Fall 2019

In every issue of SIA Technology Insights, we try to look to the cutting edge (and sometimes even to the bleeding edge) of security technology, to ensure you stay current with the steady whir of technology change. This edition examines the new world of security, where everything is online, machines are learning to perform tasks and threats can come from anywhere in the world.

Keep Reading »