Information Technology
Historically, physical security systems and information technology systems dwelt in different silos. Chief security officers and chief information officers ran their respective domains without input from the other. But rapid adoption of IP-based security devices spurred the convergence of physical and information security, bringing the two spheres together. SIA is dedicated to managing disciplines within this convergence.
Security Monitoring Trends to Watch in 2017
As a company that integrates with a wide variety of security monitoring solutions—traditional physical security devices to business risk systems—SureView Systems obtains a unique perspective of the trends in the security monitoring arena. Looking ahead in 2017, here are five security monitoring trends we foresee. VMS Move to the Cloud Each of the major video…
Keep Reading »Talking Digital Certificates with IdenTrust’s Debra Spitler
When she was a college student at Arizona State University earning her B.S. in Marketing, Deb Spitler had a chance as part of her scholarship funded by Honeywell Home and Building Control to get a free lunch with Honeywell execs. “What college student turns down a free lunch?” jokes Spitler. That free lunch turned into…
Keep Reading »Examining Video Surveillance Total Cost of Ownership
How do you calculate the total cost of ownership (TCO) for video surveillance, and why is it important to communicate to your customers? Join Dean Drako, President and CEO of Eagle Eye Networks, at ISC West, April 6, 2017, from 10-11 a.m. for a discussion on video surveillance TCO, including the framework and core financial…
Keep Reading »Why Secure Buildings Matter to Future Smart City Planners
At ISC East, Doug Haines, MPSE, presented a session for SIA Education@ISC, Why Secure Buildings Matter to Future Smart City Planners. In this blog, he summarizes one of the talking points of his presentation in New York City from November. By shaping the built environment, smart city planners can create neighborhoods where people want to…
Keep Reading »SIA Renews Support for Bipartisan DIGIT Act
Private sector input essential to guiding policy on the Internet of Things, says SIA. Silver Spring, Md. — The Security Industry Association (SIA) today announced its continued support of the bipartisan Developing and Growing the Internet of Things (DIGIT) Act, reintroduced in the Senate Tuesday in the U.S. Senate by the Internet of Things (IoT)…
Keep Reading »SIA New Member Profile: Siklu Communication
The Security Industry Association (SIA) recently welcomed Siklu Communication Ltd., with US headquarters in Fort Lee, New Jersey, as a new SIA Member! Siklu created the first mass-produced millimeter wave radio, and the company continues to innovate in millimeter wave wireless communications. We chatted with Alex Doorduyn, Siklu Director of Business Development, Security, and Surveillance,…
Keep Reading »SIA RISE Profile: Tim Wenzel of Facebook
Read our interview with Tim Wenzel, CSPM®, Program Manager, Special Projects & Residential Security, Facebook, as the Security Industry Association (SIA) spotlights a young professional on the RISE! Are you a young security professional under 40? We want your story! Contact Bryan Miller at bmiller@securityindustry.org to be featured in a monthly profile! What first got…
Keep Reading »SIA RISE Profile: Joel Hosino of Microsoft
Read our interview with Joel Hosino, Security Project Manager, Microsoft, as the Security Industry Association (SIA) spotlights a young professional on the RISE! Are you a young security professional under 40? We want your story! Contact Bryan Miller at bmiller@securityindustry.org to be featured in a monthly profile! What first got you interested in security and…
Keep Reading »Making Sense of Where Physical Security and Cybersecurity Meet
When stepping back and taking a broad view of the security market, I find one of the greatest opportunities in our space is to simply translate technology to nontechnical groups, or to translate real pain points to entrepreneurial solutions crafters. One such case in point is the connectivity between physical and cybersecurity. Even the most…
Keep Reading »Encryption Technology Provides Strong Network Defense
It is said that when Julius Caesar sent messages to his close acquaintances, he didn’t trust the messengers. To ensure privacy, he encrypted the message by replacing every A with a D, every B with an E, and so on through the alphabet and only someone who knew the “shift by 3” rule could decipher…
Keep Reading »