Genetec shared the results of its 2024 State of Physical Security report. Based on insights from over 5,500 physical security leaders worldwide (including end users and channel partners), the report looks at the security strategies organizations are putting in place to effectively navigate the realities of a changing industry.
Virtual Security Showcase, the professional security industry’s first online multi-vendor educational Tradeshow experience established in 2020, has opened free registration for the next VSS Tech Talk. Protecting Critical Infrastructure with Layered Cyber-Physical Security Solutions, scheduled for December 19th from 2-3 PM EST. Attend this informative on-line event where a panel of cyber-physical security experts will discuss the latest technology innovations and trends being deployed globally to protect critical infrastructure.
As October brings cybersecurity awareness month into the spotlight, new research conducted by Genetec reveals that cybersecurity remains a key concern for physical security experts. Based on insights from over 5,500 physical security leaders from around the world, the research shows that while organizations are putting in place new processes to protect themselves, the level of concern about potential cyber threats continues to increase.
Boon Edam continues to reinforce their position as the preeminent provider of secured entry solutions for the logistics industry with thousands of successful deployments around the globe.Boon Edam’s comprehensive lineup of secured entry solutions is proven to be effective in preventing unauthorized access to high-security areas, mitigating theft and liabilities, while maintaining compliance and reducing costs related to supervised labor, energy conservation, and more.
Quanergy Solutions announced partnership with Convergint, a global leader in service-based systems integration. Together, the two companies will deliver enhanced perimeter intrusion detection capabilities for the utilities industry. Convergint is collaborating with Quanergy to design, engineer and implement various security solutions to provide early detection with hyper accuracy and faster response times.
Eagle Eye Networks and Brivo, announced one of the largest investments to date in cloud physical security. SECOM CO., LTD, one of the largest security integration companies in the world, according to Forbes Global 2000, has made a primary equity investment of $192 million in the two companies, $100M in Eagle Eye Networks and $92M in Brivo. Eagle Eye Networks and Brivo are independent companies majority owned by Dean Drako.
Hakimo announced $6 million in new funding led by Rocketship.vc, with participation from existing investors Neotribe Ventures, defy.vc and Firebolt Ventures as well as new investors Carrier Global Corporation, through its venture capital group, Carrier Ventures, and well-known physical security industry entrepreneur John L. Moss. Hakimo will use the capital to further accelerate product development and expand into new markets.
Campus life, whether elementary, high school, college, or corporate are intended to be secure places where people can learn, grow, and work. Campuses around the world, nevertheless, have seen violent incidents and threats, and it seems to be increasing in recent years. As a result, Campuses must prioritize physical security measures to guarantee the security of their instructors, staff, students, and visitors.
BCD announced the expansion of its virtualized infrastructure solutions with vSTORE. vSTORE is a highly-available solution that leverages virtual machine technology to optimize the utilization of system resources and reduce your total cost of ownership. With vSTORE, a common storage point acts as a centralized storage location for all files that make up the virtual machine. This centralized storage location is comprised of high-speed SAN storage, allowing for VM migration upon failure between nodes.
The government and the general public have long been extremely concerned about the physical security of the United States’ borders. The security of the borders, which comprise the coastline and the northern and southern borders, is crucial for the safety and development of the nation since they serve as important points of entry for both products and people.
Physical security systems play a critical role in protecting people, property, and assets from unauthorized access, theft, vandalism, and other forms of harm. These systems range from alarm systems and perimeter fence to surveillance cameras and access control devices and they need to be inspected frequently to make sure they are operating properly and offering sufficient security. Testing the physical security systems that we have spent significant expense into installing into our environments involves evaluating their performance and detecting any vulnerabilities that could be exploited by hackers.
As we know it, physical security is the protection of personnel, property, and assets from theft, damage, or unauthorized access. With the advancement of technology, physical security has evolved from traditional methods such as access control systems, video surveillance cameras, and human security guards to autonomous systems, providing enhanced protection and improved operational efficiency. Autonomous physical security refers to the integration of advanced technologies, such as artificial intelligence (AI), machine learning (ML), robotics, and internet of things (IoT), to create self-sufficient security systems that can operate without human intervention.
Physical security is a crucial aspect of cyber security as it deals with the protection of the tangible components of a computer system. Given that it involves safeguarding the actual physical parts of a computer system, physical security is an essential component of cyber security. The elements of physical security include protecting workstations, servers, storage systems, and other pieces of gear. To guarantee the privacy, accuracy, and availability of the data stored and processed on these systems, these assets must be physically protected.
Genetec announced that Erickson Senior Living has modernized and standardized its physical security systems across 16 of its communities with Genetec™ Security Center. The new platform enables the company to better protect residents, visitors and communities, and deliver a modern, streamlined resident experience, as threats and technologies evolve. Erickson Senior Living has been a trusted leader in senior living since 1983, today helping more than 28,000 residents live better lives in 21 communities across the U.S.
In recognition of International Data Privacy Day, Genetec Inc. shared data protection best practices to help physical security leaders protect privacy, safeguard data, and enable trust without compromising security. Data privacy has become a global top priority. Today, 71% of countries have initiated data privacy legislation, and companies that haven’t taken appropriate steps to protect data are facing tens of millions of dollars in fines for violations. In the physical security industry, acquiring digital information such as surveillance footage, photos, and license plate information is necessary to help protect people and assets and provide a valuable source of actionable business intelligence.
Genetec shared its top predictions for the physical security industry in 2023. In the Genetec 2022 State of Physical Security Report, 50% of respondents said their physical security team experienced human resource challenges last year. For 2023, security leaders are re-evaluating their technology stack seeking solutions that help streamline tasks, automate processes, and enhance team efficiency. Unifying video surveillance, access control, automatic license plate recognition, communications technology, and other valuable functions can make an operator’s job easier and reduce costs and training. Built-in analytics or decision support features can further streamline operations.
Genetec shared the results of its 2022 State Physical Security report. Based on insights from over 3,700 physical security leaders worldwide (including end users and systems integrators/installers/providers), the report looks at the security strategies organizations are putting in place to effectively navigate the realities of a changing landscape. 54% of end-user respondents indicated that their organization’s target vision for security deployment is a blend of on-premises and cloud-based solutions.
Interface Systems announced that The Old Spaghetti Factory (OSF), a family-owned and operated restaurant chain with over 40 locations across 13 states, has chosen Interface’s suite of managed services to transform its network, voice and security infrastructure. The OSF IT team wanted to standardize network equipment across all their locations to increase efficiencies and reduce downtime.
As cybersecurity awareness month continues to be a focus of discussion in October, new research conducted by Genetec shows that cybersecurity remains a top concern for physical security professionals going into 2023. Based on insights from over 3,700 physical security leaders from around the world, the report revealed that almost half (49%) of the organizations surveyed had activated an improved cybersecurity strategy this year, and more than a third of all respondents (36%) are looking to invest in cybersecurity-related tools to improve their physical security environment in the next 12 months.
Following a pandemic-exacerbated rise in data breaches and ransomware attacks, Genetec guided public sector organizations on how to reduce cyber vulnerabilities of physical security systems that are often overlooked. IP security cameras and other security devices were put in place to protect people, assets, and environments. But the same network connectivity that enables organizations to monitor operations and update software remotely presents a path into the network for cyber criminals. If they are not sufficiently modern or properly shielded, they can pose significant risk to cybersecurity. An attack that originates in a camera or door controller can find its way through the network to block access to critical applications, lock files for ransom, and steal personal data.