SSI logo

Physical-IT Security Convergence

Top Story

Proactive Paths to Thwart Prox Card Threats

Security integrators need to work with clients to stay ahead of proximity card threats.


Latest in Physical-IT Security Convergence

Here is a glimpse at a few advances likely to have significant impacts on future physical security information management (PSIM) product development and use. By Michael Mesaros · March 25, 2015

As systems have become increasingly network-based, installing security contractors must learn to collaborate with IT departments. That is easier said than done. Here are tips to help foster a good foundation for a sustainable relationship. By Minu Youngkin · March 25, 2015

ProtectWise, founded by network security industry pioneer Scott Chasin, unveils a “cloud DVR” that delivers real-time and automated retroactive threat detection. SSI Staff · March 24, 2015

Broader capabilities and convenience have hastened the deployment of networked and wireless physical security devices — but at what cost? With breaches racing toward epidemic proportions, the electronic security industry finds itself scrambling to contend with cybersecurity threats. Security Sales & Integration’s Physical-Logical Assessment quantifies how cyber is rewriting the integrator playbook. Scott Goldfine · March 16, 2015

Security Sales & Integration magazine’s first Physical-Logical Security Assessment shows security systems integrators are acknowledging issues surrounding cybersecurity that also affect networked physical security systems. Scott Goldfine · March 12, 2015

That was the daunting message by security experts who addressed cybersecurity issues at a Wisconsin Homeland Security Council gathering. SSI Staff · March 11, 2015

Blue Coat’s previous owner agreed to sell the company for $2.4 billion in an all-cash deal after taking it private in 2012 for $1.3 billion. SSI Staff · March 11, 2015

Think your security business is too small to be an attractive target for cyber criminals? If so, you could not be more grievously wrong. Learn cost-efficient, uncomplicated techniques to safeguard your organization and your client’s sensitive information. By Hank Goldberg · March 09, 2015

The current PACS architecture significantly limits access control system capabilities. This paper explains why next generation PACS architecture is long overdue: it presents the critical IT-aligned attributes and capabilities that next generation PACS architecture must possess. February 18, 2015

Although an organization’s computer network is normally built to deal with large amounts of data, including that of video surveillance applications, installing security contractors need to fully leverage the functionalities of the end user’s IT investment to optimize bandwidth capacity. Learn principles behind proper cabling uses, bit rate control fundamentals and more. The increasing need to transmit digital information from point to point has created various networking challenges for installing security contractors. This FREE download from Security Sales & Integration delves into the cabling and other infrastructure that determines the amount of bandwidth a network can achieve, along with insights into different transmission methodologies. February 17, 2015




EDITOR'S CHOICE