Access "Risk management must include physical-logical security convergence"
This article is part of the June 2009 issue of Effective strategies for risk management and security information management systems
RICH GRASSIE is IT's version of a matchmaker. Many times he's united people you'd think on the surface would have no shot at a sustainable relationship. But Grassie knows how to connect disparate entities, especially when he hitches those guards with guns to geeks guarding GUIs. Converging physical security with IT security inside the enterprise isn't easy, but it's a labor that Grassie, principal consultant with TECHMARK Security Integration of Massachusetts, says is worth the bother, especially for large companies branching out globally with new services. Convergence affords organizations the opportunity to align security with overall business goals, streamline business processes such as provisioning and investigations, and centralize security operations and policies under one office. There are significant barriers to these unions; political and cultural disputes are often the tallest to hurdle, and companies cannot ignore the integration required to get a central view of physical and logical systems. "We look at it as a holistic approach to managing ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
How to write a risk methodology that blends business, security needs
One security professional describes a homegrown risk methodology currently being used by a large university and a private corporation.
-
Lack of cloud computing definition adds confusion, risk
Vendors loosely using the term cloud computing are causing confusion for users in the market for buying and securing these services.
-
How to write a risk methodology that blends business, security needs
-
-
Risk management must include physical-logical security convergence
If your organization is serious about managing risk and total asset protection, then physical-logical convergence is a necessary step.
-
Mature SIMs do more than log aggregation and correlation
They've come a long way from the early days of log aggregation and correlation; enterprises now glean value from SIMs for compliance, visualization, and even overall business intelligence.
-
Risk management must include physical-logical security convergence
-
Columns
-
Three cloud computing risks to consider
Cloud computing carries risks that enterprises need to weigh before they forge ahead.
-
New partnerships, creative thinking help security bust recession
The economy is forcing organizations to be more resourceful and bury the hatchet. And that's a good thing.
-
Three cloud computing risks to consider
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO