The Future of Security

The future of security is always on the minds of industry leaders and developers. As a welcome to all attendees at this year’s ISC West Conference in Las Vegas, an early morning session devoted to the future of the security industry addressed how IT and security convergence in the cloud will create better end-user operability.

While talks of the illusive cloud continue to resonate amongst IT professional circles, now more security professionals are choosing to partner up with IT pros and gravitating toward cloudy pastures.

Moderator Mike Faddis of Microsoft led the discussion about “The State of the Industry: Where Are We Headed?” featuring speakers Jason Bohrer of HID Global, Francis D’Addario of the Security Executive Council, Bill Taylor of the Security Industry Association Board of Directors and Gary Wong of IMS Research.

All added their industry expertise to address the evolving security marketplace and a new consumerization of security full of new opportunities to better understand and in-turn influence end-user purchasing.

The cloud was a major point of discussion as the speakers presented data highlighting the boom of software-as-a-service also known as on-demand software allowing data to be centrally hosted -- typically on the (Internet) cloud. Both IT and security must work together to balance mobility and security. IT experts understand how to leverage the cloud and security professionals must think about the best way to take advantage of IT professionals’ expertise.

Panelists addressed the increased use of smart devices such as iPads, Tablets and smartphones, and presented the staggering statistics that by 2016 approximately 2 billion people will have access to a smart device.

With such high figures, security professionals need to create use of smart devices for home and work providing mobility and flexibility to end-users. IT and security pros need to work together to provide safe access across various levels of smart device use creating a level of transparency that aids customers. To meet demands of future end-user needs, the security and IT industries need to open up dialogue to maintain standards that allow end-users more flexibility and interoperability.

As the worlds of IT and security merge, they will enable a better end-user experience. And as questions continue to linger in regards to where the future of security is heading, at ISC West, the answer is in the cloud.

About the Author

Christina Miralla is the associate content editor at 1105 Media, Inc.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3