Information Technology

Historically, physical security systems and information technology systems dwelt in different silos. Chief security officers and chief information officers ran their respective domains without input from the other. But rapid adoption of IP-based security devices spurred the convergence of physical and information security, bringing the two spheres together. SIA is dedicated to managing disciplines within this convergence.
Augmented Reality is for More than Capturing Pokémon
When combined with IoT, the technology could have a big impact on security In 2016, Pokémon GO captured the mobile gaming world by becoming the most popular application in both the Apple and Android app stores, with more than 100 million downloads within the first few weeks of its public release in early July. The…
Keep Reading »A Laser Focus on Enhanced Security
New scanners can improve the accuracy and reliability of intrusion detection systems The electronic physical security industry has done a good job with advancing technology over the past 100-plus years. Current systems are smarter than ever, and that intelligence brings new features and benefits. As more systems migrate to a digital format, larger amounts of…
Keep Reading »Intelligence Cycle: Tips and Tricks
Risk monitoring, brand management, executive protection, crisis events, and more all depend on effective intel—uncertainty paralyzes action. Having the right intelligence, in real-time, is critical to mitigating risk and protecting your assets. Corporate security professionals can gain vast amounts of intel by gathering results from location-based intelligence. This three-part blog series will explore how organizations…
Keep Reading »Talking Security at Home, in the Office and In-Between
Recently, a member of the SIA Cybersecurity Advisory Board contributed to a roundup discussion in an independent supplement to USA Today, Talking Security at Home, in the Office and In-Between, produced by Mediaplanet in April 2016. John Bartolac, Senior Manager, Industry Segments Team, North America Cyber Strategy, Axis Communications Inc.; Advisor, Security Industry Association (SIA)…
Keep Reading »SIA Applauds Senate Commerce Passage of DIGIT Act
The bill would direct the Secretary of Commerce to convene a governmental working group to address the federal government’s role in the proliferation of the Internet of Things. Silver Spring, Md. — The Security Industry Association (SIA) welcomed unanimous approval by the Senate Commerce Committee Wednesday of S. 2607, the Developing Innovation and Growing Internet…
Keep Reading »SIA Working Group Contributions Reflected in CSI MasterFormat
Panel’s recommended overhaul of Division 28 included in document Silver Spring, Md. — The 2016 edition of MasterFormat from the Construction Specifications Institute (CSI) and Construction Specifications Canada (CSC), which contains extensive recommendations from a Security Industry Association (SIA) working group, is now available. MasterFormat provides an organizational structure that is an important tool in…
Keep Reading »Protecting Data a Lot Like Raising Children
Having a computer-based infrastructure is a lot like having kids. Both are very smart—too smart for their own good in many cases—and need a lot of planning to keep them safe and secure. You child-proofed your home before your child was born, and you probably still worry for your kid even now when they are…
Keep Reading »Creating a Cybersecure Physical Security Enterprise
Simplicity and convenience are the enemies of security This article is intended for executive and management personnel who may not have the technical expertise to fully evaluate physical security system installations, but who are nevertheless responsible for the installation and performance of these systems. All organizations that have any kind of physical facility must be…
Keep Reading »Beginner’s Guide to Product and System Hardening
From the SIA Cybersecurity Advisory Board The SIA Cybersecurity Advisory Board recommends a few basic safeguards to help protect security products, systems and services against cyber attack. This is by no means an exhaustive list. Cybersecurity processes and technologies are constantly evolving along with the threats; the following can serve as the beginning for a…
Keep Reading »Raising the Standards
Physical access control can benefit from adopting an IT-centric approach The convergence of physical and logical access is certainly not a new phenomenon. Ever since security systems and related peripheral devices made the jump to IP, there has been a desire to combine the two functions to derive greater intelligence and value from these solutions.…
Keep Reading »