Story image

Survey: Rising role of IT in physical security provides opportunities

10 Sep 18
Sponsored

While departments have suspected it, new research has confirmed IT’s increasing involvement in physical access control.

A survey from HID Global found that IT departments now play a prominent role in an organisation’s physical access control decisions and implementation, with 55 percent of the respondents reporting IT as primarily responsible or having shared responsibility for access control within their organisation – and that number is expected to grow.

This means in addition to protecting company network and cybersecurity-related issues, IT departments are having to adapt to spearhead those set forth by the physical security department to protect employees, visitors, and assets from internal and external threats.

The purpose of the survey was to gain insight into the relationship between an organisation’s physical security and IT departments, how the two work together, and how investments in new technology are made.

HID Global has provided access to the whitepaper that delves into these findings and more to determine how they can be applied in today’s digital world, providing actionable insights that will increase collaboration between IT and physical security.

Read this whitepaper to learn:

  • Why IT is becoming more involved with physical access control
  • How budgets for access control are moving to IT
  • What pain points IT encounters with access control systems
  • Best practices in building relationships between IT and physical security

Click here to access the HID Global whitepaper.

Survey reveals CX disconnect is risky business
Too much conversation and too little action could lead companies to neglect, lose, and repel their very lifeblood, according to Dimension Data.
Should AI technology determine the necessity for cyber attack responses?
Fujitsu has developed an AI that supposedly automatically determines whether action needs to be taken in response to a cyber attack.
Police making progress into Cryptopia breach
New Zealand Police say they are making ‘good progress’ into the investigation of an alleged cryptocurrency theft from Christchurch-based crypto exchange Cryptopia.
NEC concludes wireless transport SDN proof of concept
"Operation and management of 5G networks are very complicated and require automation and closed-loop control with timely data refinement and quick action."
Trend Micro’s telecom security solution certified as VMware-ready
Certification by VMware allows communications service providers who prefer or have already adopted VMware vCloud NFV to add network security services from Trend Micro.
Top cybersecurity threats of 2019 – Carbon Black
Carbon Black chief cybersecurity officer Tom Kellermann combines his thoughts with those of Carbon Black's threat analysts and security strategists.
Avaya introduces private cloud delivery of its UCaaS solution
Avaya is supposedly taking a flexible hybrid approach to the cloud with these new solutions.
Data growth the growing case for managed colocation
The relentless growth of data could see colocation take on a new importance, says Jon Lucas.