Information Technology
Historically, physical security systems and information technology systems dwelt in different silos. Chief security officers and chief information officers ran their respective domains without input from the other. But rapid adoption of IP-based security devices spurred the convergence of physical and information security, bringing the two spheres together. SIA is dedicated to managing disciplines within this convergence.
SIA New Member Profile: BCDVideo
Welcome aboard, BCDVideo! As a new member of the Security Industry Association (SIA), BCDVideo, Northbrook, Illinois, adds the power of a leading video surveillance storage manufacturer for security integrators to our ranks. We chatted with BCDVideo CEO and President Jeff Burgess to explore the company’s background and motivations. For more about the company, visit www.bcdvideo.com.…
Keep Reading »How IoT Allows for Physical Access Integration into 6 Layers of IT Systems
Physical security and IT systems are better together—as explored in this post. But until recently, a specific concept on how to approach the obvious on a technical level was missing. In this blog, we explore the concept of physical security running like an app on the IT infrastructure and what that would mean in terms…
Keep Reading »SIA New Member Profile: Cisco Meraki
The Security Industry Association (SIA) welcomes aboard Cisco Meraki, video surveillance innovators who made a big splash at ISC West 2017 last week. To learn more about the company and its history, SIA chatted with Emily DeSimone, Cisco Meraki Event Marketing Coordinator. How did you get into the security industry? Cisco Meraki is focused on…
Keep Reading »The Real Benefits of Artificial Intelligence
How ‘Computer vision’ powered by AI could radically change video surveillance When people think of artificial intelligence (AI), they tend to think of either Skynet – a dark, malicious entity – or C-3PO – a bumbling though harmless droid. But both images misunderstand the concept of AI and what it means to the world.…
Keep Reading »By the Power of Ethernet
PoE gives smaller facilities more access control options Physical electronic security for non-enterprise applications is now as simple as tapping into the nearest Ethernet connection to power and control doors via web browser and low-voltage access and egress devices. There are a variety of cost-effective, code-compliant, low-power solutions for electronic access control of door openings…
Keep Reading »More than Just a Silver Lining
Using the cloud for access control enhances scalability, availability, resiliency, flexibility and security The power of the public cloud has become a catalyst for a dramatic shift in the information systems and security worlds. On-premises solutions no longer exist in many domains, from customer relationship management to expense management to human resources systems to learning…
Keep Reading »Getting on the Path
Shortest Path Bridging can enhance network performance and efficiency Darren Giacomini, BCDVideo As the world of surveillance evolves, the introduction of multi-sensor and megapixel cameras presents a dynamic shift in industry accepted standards. For years, we have known the limitations of pan-tilt-zoom (PTZ) cameras, often finding them looking in one direction, only to miss critical…
Keep Reading »How Hackers Attack Physical Access Control Systems
As physical access control system (PACS) technologies continue to advance, so do attackers. While card cloning can be effective, entry isn’t always gained with this method alone. Attackers are beginning to move beyond the card to the technology that supports it. At ISC West on April 6 from 12:30-1:30 p.m., Valerie Thomas, Executive Security Consultant…
Keep Reading »Can Your Security System Be Used Against You?
As of 2015, nearly 300 million IP cameras have been installed around the world. Many of these cameras have been installed with default usernames and passwords and can be accessed from anywhere in the world. For years, the question has been: How secure is the video that a system produces? But, that question is changing.…
Keep Reading »5 Questions That Cybercriminals Don’t Want You to Ask
All leadership in business has a fiduciary responsibility to protect their company, its shareholders, employees and customers. Part of this responsibility includes detecting cyber-risks and mitigating those risks. To protect your organization, you must take a proactive and comprehensive approach to this quickly increasing risk. At ISC West, a panel discussion led by PSA’s Cybersecurity…
Keep Reading »