Access "Physical and IT Security: Overcoming Security Convergence Challenges"
This article is part of the June 2004 issue of Exposed: Why your AV software is failing to protect you
When Philadelphia law firm Post & Schell outgrew its office space, it sought a facility that would provide adequate physical and IT security for its 350 employees, assets and sensitive client data. This job fell to Lou Mazzio, the firm's CTO. "Hundreds of concerns were thrown on the table," Mazzio says. "Could the building provide 24/7 security guards? Do you need a passcode to use the elevators? How would the layout keep nonemployees from wandering into restricted work areas? How do you protect employees from disgruntled claimants? How do you apply the same protections to computer access? And how do you protect the data center and paper-based data from fire and water damage?" The big challenge has always come from the introduction of new technology into an existing system. Charles Fletcher CIODelaware State University Mazzio had never overseen both logical and physical security, so he asked the company's facilities manager to help him select a building and design an integrated security system. Today, in the three-floor downtown office space, physical and ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Antivirus software comparison, 2004: Not all AV products are equal
Your desktop AV may be leaving you wide open to attack.
-
NAC best practices and technologies to meet corporate security policy
by Curtis Dalton, CISSP
New solutions help you secure endpoints
-
Antivirus software comparison, 2004: Not all AV products are equal
-
-
Physical and IT Security: Overcoming Security Convergence Challenges
Physical and IT security convergence seems just one leap away...and may remain that way. Learn how to overcome security integration challenges.
-
Six Sigma and CMM models offer security best practices
Security can learn a lot from Six Sigma, CMM and other established business methodologies.
-
Physical and IT Security: Overcoming Security Convergence Challenges
-
Columns
-
Unintentional benefits: Attackers force search for better Trojan virus protection
by Lawrence M. Walsh
Editor Lawrence M. Walsh says creative attackers are unintentionally aiding the search for better security defenses.
-
Firewall and system logs: Using log file analysis for defense
by Marcus Ranum
Log analysis is the most under-appreciated, unsexy aspect of infosecurity, yet Marcus Ranum says it's one of the most important.
-
Prevent data loss, theft with secure data outputs
by Pete Lindstrom, Contributor
To secure data outputs, some organizations are going a step further by deploying data protection systems for specific applications.
-
Linux malware: Challenges of the Linux worm
Should Linux users brush off concerns about malware plagues? Short answer: No. Learn more about Linux malware and the challenges posed by the Linux worm.
-
Internal security controls and business continuity go hand in hand
Learn the top four quality of security beliefs and see why better security means better quality.
-
Unintentional benefits: Attackers force search for better Trojan virus protection
by Lawrence M. Walsh
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO