Cybersecurity Strategies and Their Impact on Physical Security

Cybersecurity Strategies and Their Impact on Physical Security

Mar 24, 2023

In this episode of SecurPod, Ralph C. Jensen learns more about the impact of cybersecurity, cyber protection and system infrastructure on the physical security world as he talks with Jami McGraw, manager of product development at Seneca; and Ron Vantassel, technical solutions manager at Seneca. The conversation centers on the key differences between physical security and cybersecurity strategies in terms of protecting assets. The importance of cyber protection in relation to hardware infrastructure solutions, as opposed to software only, is also discussed. In addition, McGraw and Vantassel talk about replacing legacy infrastructure with hyperconverged infrastructure — a combination of servers and storage in a distributed infrastructure platform with intelligent software consisting of separate servers, storage networks and storage arrays to create flexible building blocks.

Duration: 36:17

Jami McGraw, Ron Vantassel


Apple Podcast Spotify Google Stitcher

Featured Podcast

  • DPSM is the Future of Cybersecurity

    DSPM is the Future of Cybersecurity

    In this episode of SecurPod Ralph C. Jensen, publisher of Security Today magazine, talks with Parandar Das, the co-founder and CEO of Sotero. The conversation centers around the data security market and how Data Security Posture Management (DSPM) seems to be the future of cybersecurity. Das answers questions of why companies are pivoting more toward a data-first approach to securing their cloud-based data. He also addresses the question of why current approaches to data security are no longer effective. Listen Now

  • Secure the K–12 Campus Environment

    In this episode of SecurPod, Ralph C. Jensen, publisher of Campus Security Today, addresses campus security protocols and procedures. Nothing strikes home quicker and deeper than an active shooter on campus. Jensen’s guest today is Michael Garcia, who manages the K–12 school business vertical in the United States for physical access control solutions at HID. Listen Now

  • Key and Asset Management: Bridging the Gap Between Security and Facilities

    In this episode of SecurPod, publisher Ralph C. Jensen sits down with Craig Newell to talk about key and asset management solutions in numerous security verticals. Listen Now

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3