Story image

Survey: Rising role of IT in physical security provides opportunities

10 Sep 2018
Sponsored

While departments have suspected it, new research has confirmed IT’s increasing involvement in physical access control.

A survey from HID Global found that IT departments now play a prominent role in an organisation’s physical access control decisions and implementation, with 55 percent of the respondents reporting IT as primarily responsible or having shared responsibility for access control within their organisation – and that number is expected to grow.

This means in addition to protecting company network and cybersecurity-related issues, IT departments are having to adapt to spearhead those set forth by the physical security department to protect employees, visitors, and assets from internal and external threats.

The purpose of the survey was to gain insight into the relationship between an organisation’s physical security and IT departments, how the two work together, and how investments in new technology are made.

HID Global has provided access to the whitepaper that delves into these findings and more to determine how they can be applied in today’s digital world, providing actionable insights that will increase collaboration between IT and physical security.

Read this whitepaper to learn:

  • Why IT is becoming more involved with physical access control
  • How budgets for access control are moving to IT
  • What pain points IT encounters with access control systems
  • Best practices in building relationships between IT and physical security

Click here to access the HID Global whitepaper.

Australians unsure of who is responsible for the safety of their information
According to a recent survey conducted by SOTI, Australians are increasingly concerned about the security of their health records.
Europol makes 61 arrests & nets €6.2 million in dark web crackdown
60 experts from 19 countries, Europol, and Eurojust were involved in hunting for activities including the illegal sale and signs of counterfeit goods and money, drugs, cybercrime, document fraud, non-cash payment fraud, trafficking in human beings and trafficking in firearms and explosives. 
The silver lining in Australia’s Government cloud strategy
Cloud has been a huge part of the ‘digital transformation’ conversation within Australian government during recent years.
Milestone: How video and IoT are finding their place in enterprise
Milestone Systems South Pacific country manager Jordan Cullis talks about three trends that will revolutionise the way video is viewed in 2019 and beyond.
Largest DDoS-for-hire websites responsible for 11% of attacks worldwide – Nexusguard
The FBI’s shutdown of the world’s 15 largest DDoS-for-hire “booter” websites in December resulted in 85% decrease in average attack sizes, year-over year.
Five things MSPs need to keep in mind in 2019
A Datto APAC channel exec outlines the most important factors for MSP to being paying attention to in the coming year.
Survey: IT pros nostalgic over on-prem data centre visibility
There are significant security and monitoring challenges faced by IT staff responsible for managing public and private cloud deployments.
61% of CIOs believe employees leak data maliciously
Egress conducted a survey to examine the root causes of employee-driven data breaches, their frequency, and impact.