The increase in threats has lead to the convergence of a broad spectrum of security technologies including IT security, surveillance, alarm monitoring, biometrics, access control and response, to name a few. And this convergence has created new opportunities for intelligent, real-time connected security capabilities.
New innovations at the silicon, software and system levels can enable Real-time Connected Security which uses all available data sources in real-time to detect and respond appropriately to security threats or abnormal situations. This article discusses this new way of looking at security opportunities for equipment vendors and service providers.
What are the threats currently effecting businesses?
Company security spans a broad range of potential threats including human resource related issues, legal considerations and physical intrusion, any of which pose a potential danger to the ability of the business to operate normally.
Issues addressed here include leakage of critical information, information espionage, adequate employee screening, physical threats such as robbery and abuse and protection of critical information infrastructure. The protection of critical information infrastructure is one of the most compelling of all.
The sheer volume of transmitted information can be overwhelming: 30 billion text messages and 40 billion e-mail messages are transmitted across the network every day. Eight exabytes (that’s 18 zeros) of IP traffic are generated globally every month.
The real issue is that the vast majority of this traffic is aimed at the enterprise and the systems that enable its ability to function properly. While the bulk of the messages are necessary and harmless, it only takes one to wreak havoc. In fact, the average annual cost to a typical corporation for recovery from the most common types of intrusion can exceed tens of millions of pounds.
Employees represent a major investment for all companies and like all assets they must be protected for both business and compassionate reasons.
Concerns that fall under the topic of personnel protection include building surveillance and security; physical security of car parks, dining facilities, remote buildings and office space; personnel privacy and secrecy of communications; security of computer assets, and physical and network security for remote workers.
Also included here is the creation of a culture of security compliance and physical security for workers travelling on company business or working from home.
With more and more employees choosing to work out of the office or while on the road, the issue of protecting remote workers is becoming increasingly important to businesses of all sizes.
Fraud and Theft Protection
It’s a well-known fact that 80 percent of all retail credit card theft is perpetrated by employees inside of companies, not by outsiders. This kind of activity must be anticipated and programmes for dealing with it must be put into place to adequately cover issues associated with financial liability on the part of the company. Coupled with protection against identity theft, scamming, pfishing, and commercial and insurance fraud this is one of the most critical areas of security in the modern enterprise.
Find your next job with computerworld UK jobs