Security InfoWatch: Easing GDPR Compliance with PIAM

Easing GDPR Compliance with PIAM

By Don Campbell
July 25, 2017

Beginning May 25, 2018, any company wishing to do business in the European Union will be required to comply with the new General Data Protection Regulation (GDPR) standards, which replace the Safe Harbor Act and extend the scope of existing EU data protection laws to all foreign companies processing data from EU residents. The goal of this data protection initiative is to standardize and harmonize the fragmented data privacy across the European Economic Area to ensure that individuals’ rights are protected in today’s digital world. Continue reading on the Security InfoWatch website.

Campus Safety: Visitor Management Systems for Hospitals: Balancing Security with Patient Satisfaction

Visitor Management Systems for Hospitals: Balancing Security with Patient Satisfaction

Visitor management systems should be able to integrate security systems like access control to maintain hospital security and a welcoming atmosphere.

By Janette Andler
April 24, 2017

Finding a good visitor management system is especially important for hospitals, who face a multitude of threats to people and property, including physical assaults and the theft of medical supplies, drugs or sensitive patient information.

This puts significant strain on the hospital security professionals who must contend with and protect against these threats while balancing the need to maintain an open and inviting environment that facilitates the highest levels of medical treatment and healing. Continue reading on the Campus Safety website.

Security Today – Dissecting the Advantages

Realizing the cost benefits for small- and medium-size businesses

By Don Campbell
Feb 01, 2017

Physical identity access management (PIAM) solutions have changed the way leading organizations approach security. In recent years, advances in PIAM software and related technologies have not only improved the accuracy and capabilities of these powerful systems, but they have also brought the cost within reach of small- and medium-sized businesses. Now, mobile access and management of PIAM systems capabilities are opening up a new way for organizations to further increase their productivity and speed up responses to system alerts. Continue reading at Security Today.

SourceSecurity.com: Physical Security Continues To Support Cybersecurity Aims

Physical Security Continues To Support Cybersecurity Aims

By: Don Campbell
January 5, 2017

At the end of last year, we anticipated that data gathering and analysis would continue to be a strong trend, and that certainly proved to be the case in 2016.

More and more organizations are seeing the value of the intelligence provided by diverse systems’ data. The number and variety of networked systems and devices – both security and non-security – continued to grow steadily in the last year, and the data these disparate sources create has proven highly useful in identifying statistical patterns and trends that may indicate the likelihood of incidents occurring. More data leads to more complete intelligence, allowing organizations to more easily identify threats or business opportunities, make more informed decisions and create better outcomes in general. Continue reading at sourcesecurity.com.

 

Security Today: Detecting and Mitigating

Detecting and Mitigating
Search for the key that will minimize risk
By Don Campbell

January 1, 2017

Insider threat has become an increasingly prevalent concern for organizations, and the damage from breaches caused by current or former employees, contractors or partners misusing access credentials can be devastating.

Despite the very real risk, many organizations are not certain whether the policies and processes they employ, such as candidate screening and background checks, are adequate for identifying potential problems. While they recognize the risk presented by insider threat, they may not be confident in their ability to detect, or what solutions are the most effective for prevention. Some organizations may also be hesitant to monitor employees for insider threat for fear of causing dissatisfaction or interfering with their ability to perform their jobs. That type of thinking may well lead to negative repercussions at some point. Continue reading on Security Today website.

Security Today: Online Exclusive: Expanding the Role of Security in Healthcare

October 28, 2016

Security is a vital function that has become a major part of healthcare organizations’ day-to-day operations. Recognizing this reality, hospitals and other providers have invested heavily in video surveillance, access control, visitor management and other technologies and systems to maintain the highest possible level of protection for patients, staff, visitors, prescription drugs and other assets.Continue reading at Security Today by clicking here.

Quantum Secure Integrates with PACOM Graphical Management System (GMS)

Quantum Secure SAFE Software Suite Integrates with PACOM Graphical Management System (GMS) security management platform

Quantum Secure SAFE Software Suite has successfully integrated with PACOM GMS platform version 4.20.0.20. PACOM GMS (Graphical Management System) is a security management solution providing integration between access control, intrusion, video, intercom, and virtually any building management or security solution.

The integration allows all types of physical identities, including employees, visitors, vendors and contractors, to be provisioned into the PACOM GMS Platform based on the predefined rules and policies set within SAFE. Any changes made to the identity in the SAFE system are read by the integration agent and based on the workflows, the SAFE PACOM agent broadcasts these changes to the PACOM GMS platform. The new PACOM agent is now part of the SAFE standard PACS integrations and will be maintained per our standard agent support policy.

5 Steps to Seizing Business Outcome Opportunities

Installing security contractors can now deliver systems and services that meet business goals, thereby flipping security from an undesirable capital expense to a value-enhancing investment.

September 25, 2016
By Don Campbell

SECURITY LEADERS at Fortune 500 companies have recognized that security is a valuable strategic partner and most effective when it aligns with organizational goals. To achieve this alignment, it is essential to identify and meet the unique needs of each organization.

Because every organization is unique, the specifics of attaining this goal must also be unique. However, there are best practices that apply to all organizations that will determine both the efficiency of the process and its ultimate degree of success. In today’s business climate, organizations are not eager to spend more money and management is continually reviewing metrics to identify potential cost savings. With this in mind, security, like all departments, faces higher-level expectations while being asked to become more efficient and do more with less. Continue reading at Security Sales & Integration by clicking here.

Security Today: Contextual Analysis

A more complete security and risk picture appears when fully prepared

September 1, 2016
By Don Campbell

Most security organizations underestimate the possible impact of security data and only use it for reporting. They may use enterprise analytics solutions to answer the “what” questions related to their security infrastructure without considering context, such as a person’s behavior, work shift or HR background. As a result, these solutions lack the ability to answer the “why” questions that are often the critical missing piece to understanding security threats. Responding without adequately analyzing a situation and its associated circumstances can increase an organization’s risk profile by creating an environment where security operations are managed by assumptions rather than measurable facts. This is why contextual analytics needs to play an important role in the decision-making process. To continue reading – please visit Security Today by clicking here.

Security Magazine: Developing Effective Contractor Identity Lifecycle Management for Refineries

August 23, 2016
By Don Campbell

In the wake of ever-present terrorist threats and potentially large-scale disasters, security and safety have become major concerns that also pose greater challenges for refineries. One main challenge is managing the identity of the independent contractors who have become increasingly important for refineries, which routinely undertake turnarounds (TARs) or scheduled shutdowns or outages.

During a TAR, for example, the entire process unit of a refinery is taken offline for inspection and testing, de-bottlenecking projects, revamps, catalyst regeneration or other necessary projects. In terms of lost production and direct costs such as labor, tools, equipment and materials, these projects are very expensive. Because they can be hired for a specific project or period of time and are paid only for the work they do within those parameters, contractors are a more flexible, budget-friendly alternative to full-time employees. Therefore, refineries bring in contractors – sometimes numbering in the thousands – to assist with the execution of a TAR. Continue reading on the Security Magazine website by clicking here.