Story image

Fundamental shift: A look inside the rising role of IT in physical access control

Shifting budgets and responsibilities require IT and physical security teams to consider a fundamental change in day-to-day operations.

While physical security professionals have suspected a shift toward increased involvement of the IT department in physical access control, recent research has shown this to be true. 

A survey conducted by The 05 Group of more than 1,500 IT Managers, Directors and staff, as well as Chief Information and Chief Technology Officers, found that IT departments are now more involved than ever in an organisation’s physical access control decisions and implementation. 

According to the survey, more than half (55%) of respondents reported IT as primarily responsible or having shared responsibility for access control within their organisation. 

As a result, IT leaders are tasked with spearheading not only the protection of their company’s network and cybersecurity-related initiatives but also those set forth by the Physical Security department to protect employees, visitors and assets from internal and external threats. 

Similarly, the study showed that the IT department will increasingly play a role in physical security to influence technology decisions (76%) through the integration of access control within the ecosystem (72%), by implementing access control technology (59%), and through the management of access control systems (39%). 

Along with the added responsibility to help implement security solutions alongside IT-related projects, IT leaders are also increasingly responsible for budgeting decisions within physical security. 

According to the survey, more than 85% of respondents reported that IT was involved in decisions regarding physical access control technology investments. 

To get access to the complete case study click here.

JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
WatchGuard appoints new channel distributors in A/NZ
The appointments will enable WatchGuard to expand its regional channel reseller footprint.
Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."
Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.