This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Verint Fraud and Security Solutions is hosting an hour-long webinar tomorrow, August 6 at 1 p.m. ET, during which several speakers will look at how shifting away from an autonomous security approach to a more structured convergence model can help mitigate cyber and physical security vulnerabilities, and how new technologies like AI factor into today’s converged security models.
SDM talks to four experienced integrators about the future of convergence, how integrators can profit from it, and what will actually drive growth of the market.
For the past several years, talk about converging physical and logical access control has been mostly just that — talk. Budget constraints, perceived lack of need and an absence of cohesive, affordable solutions have made it difficult for integrators to find much traction in this market.
The access control world abounds with the latest and greatest technology buzzwords: wireless; Power over Ethernet (PoE); near field communications (NFC); convergence; the cloud — to name just the top few. But are these the features end users are looking for in access control today? Are these the words integrators can use to close the sale?
ISC West 2013 and “convergence” have arrived. The vision of end-to-end security is a reality for the systems integrators who have rounded out their product lines, acquired internal skill sets, and strategically partnered to address it. The enabling technologies and price points are integrating end-to-end solutions and evolving security to new heights. Miniature sensors and mobile devices are the sophisticated endpoints driving unstructured data through faster networks and middleware to back-end storage and cloud architectures.
After attending the 2011 RSA Security conference in San Francisco recently I was struck by how much momentum that cloud computing and cyber security are generating.