IT Security


Schalge, idOnDemand Form Technology Partnership

Ingersoll Rand Security Technologies, provider of security and safety solutions and manufacturer of Schlage contactless smart credentials and readers, and idOnDemand are partnering to offer a joint solution that consolidates a user’s identity across the enterprise.

Need For Network Security Boosts Growth In Managed Security Service Provider Market, According To Research

New analysis from Frost & Sullivan, North American Managed Security Service Providers (MSSP) Market, finds that the market earned revenues of $1.20 billion in 2009 and estimates this to reach $3.90 billion in 2016.

NIST To Help Accelerate Federal Government’s Adoption Of Secure Cloud Computing

The National Institute of Standards and Technology (NIST) has been designated by Federal Chief Information Officer Vivek Kundra to accelerate the federal government’s secure adoption of cloud computing by leading efforts to develop standards and guidelines in close consultation and collaboration with standards bodies, the private sector and other stakeholders

Research Indicates IT Security Needs Of Mid-Sized Organizations Becoming More Sophisticated

RSA, The Security Division of EMC, recently released the results of two new research initiatives that explore log management priorities for mid-sized organizations.

Poll: Data Loss Is Top Corporate Security Threat

CDW LLC recently announced the results of its IT Threat Prevention Straw Poll, based on a survey of 200 IT security managers and decision makers at medium and large businesses across the United States.

Less Than Half Of Cloud Services Vetted For Security, According To Study

CA Inc. and the Ponemon Institute, an independent research firm specializing in privacy, data protection and information security policy, recently announced a study analyzing significant cloud security concerns that persist among IT professionals when it comes to cloud services used within their organization.

Survey: Employees More Focused On Individual Concerns Than Overall Company IT Security

From prowling social networking sites at work, to overriding their company's installed security so they can access restricted websites, most employees were found to be generally imprudent and ambivalent when it comes to their company's overall security health, according to the 2010 Trend Micro survey on corporate and small business end users.

Survey Looks At Security Management Practices, Compliance Weaknesses

SenSage recently announced the results of an industry survey on security management practices taken during the RSA Conference in March.



Survey: Majority Of Americans Unaware Of Cloud Computing

A majority of U.S. citizens are unaware of how their online data is stored and who secures it, according to a Business Software Alliance (BSA) survey released recently. Approximately one in five U.S. citizens said they were unaware of whether their personal or corporate data is being held “in the cloud,” and 60 percent said they did not know what “in the cloud” means.

Market Trends

Trends in the Market

The use of video surveillance in business began with the introduction of CCTV in the early 1960s. Throughout the years, we have witnessed the rapid uptake of some technologies, while others showed promise but never experienced widespread adoption. Today, there are four trends that are shaping the video industry.

Consumers Confident In Security Of Mobile Devices, According To Research

According to recent research conducted by Unisys Corp., the majority of mobile device users worldwide feel safe using their mobile devices for applications, including airline boarding passes; as payments in stores for low-cost items; or to access online banking.

Survey: Data Security In The Cloud Top Concern For Government Officials

Lockheed Martin and its Cyber Security Alliance partners recently announced the results of a collaborative cloud computing and cyber security survey in a new white paper titled "Awareness, Trust, and Security to Shape Cloud Adoption."

Survey: Most SMBs Lacking Knowledge To Protect Against Online Fraud

Despite highly publicized cybercriminal attacks against businesses and the ongoing rise of malware perpetrated through schemes such as the Mariposa botnet recently dismantled by Panda Security and others, the majority of small and medium-sized businesses are not familiar with the banking Trojans used to attain access to and steal from their online accounts.

Survey: Almost Half Of IT Professionals Say Cloud Computing Risks Outweigh Benefits

Nearly half of U.S. IT professionals say that the risks of cloud computing outweigh the benefits, according to the 2010 ISACA IT Risk/Reward Barometer survey.

Survey: Companies Lack Adequate Policies To Protect Information In The Cloud

Symantec Corp. and the Ponemon Institute, a privacy and information management research firm, recently announced the findings of a joint survey of IT professionals. The survey revealed that most organizations lack the procedures, policies and tools to ensure that sensitive information they put in the cloud remains secure.

Verizon Framework Looks To Standardize Security Incident Reporting

Verizon Business is giving away information that officials believe will help the IT security industry address a critical issue -- the lack of a common standard for the collection of security-incident data and analysis -- with the hopes that it will help the industry fight cybercrime.

Wireless mesh

Challenge or Opportunity?

Wireless has been in the physical security space for years, especially with point-to-point bridges. But the newcomers—especially in the field of wireless mesh—are changing the game. Will wireless be as ubiquitous for outdoor deployments as cable or fiber?

Seattle Tops Report As U.S. City Most Vulnerable To Cyber Crime

Norton from Symantec teamed up with independent research firm Sperling’s BestPlaces to find and expose the nation’s top 10 cities most vulnerable to cybercrime.

Poll: One In 10 Employees Knowingly Violate Company IT Policy

A new Fiberlink Poll published recently showed that more than one in 10 U.S. workers admit to knowingly violating the policies put in place by their companies' IT departments in order to get their work done.

Report: Total Loss Linked To Online Fraud More Than Doubles In 2009

The Internet Crime Complaint Center (IC3), a partnership between the FBI and the National White Collar Crime Center (NW3C), today released the 2009 annual report about fraudulent activity on the Internet.

Featured

  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3