Realizing the cost benefits for small- and medium-size businesses
By Don Campbell
Feb 01, 2017
Physical identity access management (PIAM) solutions have changed the way leading organizations approach security. In recent years, advances in PIAM software and related technologies have not only improved the accuracy and capabilities of these powerful systems, but they have also brought the cost within reach of small- and medium-sized businesses. Now, mobile access and management of PIAM systems capabilities are opening up a new way for organizations to further increase their productivity and speed up responses to system alerts. Continue reading at Security Today.
Physical Security Continues To Support Cybersecurity Aims
By: Don Campbell
January 5, 2017
At the end of last year, we anticipated that data gathering and analysis would continue to be a strong trend, and that certainly proved to be the case in 2016.
More and more organizations are seeing the value of the intelligence provided by diverse systems’ data. The number and variety of networked systems and devices – both security and non-security – continued to grow steadily in the last year, and the data these disparate sources create has proven highly useful in identifying statistical patterns and trends that may indicate the likelihood of incidents occurring. More data leads to more complete intelligence, allowing organizations to more easily identify threats or business opportunities, make more informed decisions and create better outcomes in general. Continue reading at sourcesecurity.com.
Detecting and Mitigating
Search for the key that will minimize risk
By Don Campbell
January 1, 2017
Insider threat has become an increasingly prevalent concern for organizations, and the damage from breaches caused by current or former employees, contractors or partners misusing access credentials can be devastating.
Despite the very real risk, many organizations are not certain whether the policies and processes they employ, such as candidate screening and background checks, are adequate for identifying potential problems. While they recognize the risk presented by insider threat, they may not be confident in their ability to detect, or what solutions are the most effective for prevention. Some organizations may also be hesitant to monitor employees for insider threat for fear of causing dissatisfaction or interfering with their ability to perform their jobs. That type of thinking may well lead to negative repercussions at some point. Continue reading on Security Today website.
October 28, 2016
Security is a vital function that has become a major part of healthcare organizations’ day-to-day operations. Recognizing this reality, hospitals and other providers have invested heavily in video surveillance, access control, visitor management and other technologies and systems to maintain the highest possible level of protection for patients, staff, visitors, prescription drugs and other assets.Continue reading at Security Today by clicking here.
Quantum Secure SAFE Software Suite Integrates with PACOM Graphical Management System (GMS) security management platform
Quantum Secure SAFE Software Suite has successfully integrated with PACOM GMS platform version 220.127.116.11. PACOM GMS (Graphical Management System) is a security management solution providing integration between access control, intrusion, video, intercom, and virtually any building management or security solution.
The integration allows all types of physical identities, including employees, visitors, vendors and contractors, to be provisioned into the PACOM GMS Platform based on the predefined rules and policies set within SAFE. Any changes made to the identity in the SAFE system are read by the integration agent and based on the workflows, the SAFE PACOM agent broadcasts these changes to the PACOM GMS platform. The new PACOM agent is now part of the SAFE standard PACS integrations and will be maintained per our standard agent support policy.
Installing security contractors can now deliver systems and services that meet business goals, thereby flipping security from an undesirable capital expense to a value-enhancing investment.
September 25, 2016
By Don Campbell
SECURITY LEADERS at Fortune 500 companies have recognized that security is a valuable strategic partner and most effective when it aligns with organizational goals. To achieve this alignment, it is essential to identify and meet the unique needs of each organization.
Because every organization is unique, the specifics of attaining this goal must also be unique. However, there are best practices that apply to all organizations that will determine both the efficiency of the process and its ultimate degree of success. In today’s business climate, organizations are not eager to spend more money and management is continually reviewing metrics to identify potential cost savings. With this in mind, security, like all departments, faces higher-level expectations while being asked to become more efficient and do more with less. Continue reading at Security Sales & Integration by clicking here.
A more complete security and risk picture appears when fully prepared
September 1, 2016
By Don Campbell
Most security organizations underestimate the possible impact of security data and only use it for reporting. They may use enterprise analytics solutions to answer the “what” questions related to their security infrastructure without considering context, such as a person’s behavior, work shift or HR background. As a result, these solutions lack the ability to answer the “why” questions that are often the critical missing piece to understanding security threats. Responding without adequately analyzing a situation and its associated circumstances can increase an organization’s risk profile by creating an environment where security operations are managed by assumptions rather than measurable facts. This is why contextual analytics needs to play an important role in the decision-making process. To continue reading – please visit Security Today by clicking here.
August 23, 2016
By Don Campbell
In the wake of ever-present terrorist threats and potentially large-scale disasters, security and safety have become major concerns that also pose greater challenges for refineries. One main challenge is managing the identity of the independent contractors who have become increasingly important for refineries, which routinely undertake turnarounds (TARs) or scheduled shutdowns or outages.
During a TAR, for example, the entire process unit of a refinery is taken offline for inspection and testing, de-bottlenecking projects, revamps, catalyst regeneration or other necessary projects. In terms of lost production and direct costs such as labor, tools, equipment and materials, these projects are very expensive. Because they can be hired for a specific project or period of time and are paid only for the work they do within those parameters, contractors are a more flexible, budget-friendly alternative to full-time employees. Therefore, refineries bring in contractors – sometimes numbering in the thousands – to assist with the execution of a TAR. Continue reading on the Security Magazine website by clicking here.
August 23, 2016
Security Products magazine, the only integrated product and technology magazine reaching the entire security market, and securitytoday.com, the preeminent editorial website for the security industry, announced the winners of their 2016 New Product of the Year Award on August 23rd.
Quantum Secure was selected as the New Product of the Year in the Big Data Security Analytics Category for our, SAFE Facility Analytics.
For more information, please visit the Security Today website.
5 Core Rules for Transforming the Role of Security
August 16, 2016
Article by Don Campbell
In the security industry, as in everyday life, technology is constantly and rapidly changing and evolving as new capabilities emerge to meet the needs of end-users. As technology changes, the role of the security department is also evolving. No longer can security function separately from core business functions; to be most effective it must align with organizational goals. Click here to continue reading on the Security InfoWatch website.