About This Book
You'll find dozens of ideas—from two decades of working in the area of Security/IT convergence—that you can apply to your own security technology projects.
Take a peek at the Table of Contents below and the 66 specific insight topics presented in the book.
Table of Contents
- Four Categories of Convergence
- Mastering Convergence
- Integration of Physical Security and Logical Security
- Why Convergence Didn’t Really Disappear
- Trends a Decade into Convergence
- The Value of Technology
- How Hacking is Changing the Physical Security Industry World
- Security Industry Wake Up Call!
- Convergence in Design: Virtual Construction
- Collaboration between Physical Security and IT
- How IT Can Help Physical Security System Planning
- The Scope of Security Systems Integration
- Convergence Roles and Responsibilities
- Service Level Agreements
- Convergence Collaboration Collisions
- Security Video Requires Convergence Collaboration
- Data Security for Corporate Security Departments
- Financial Impact of Cyber Risk
- Protecting Information in Human Memory
- Network Protection for Security Systems
- Physical Security for Computing Systems
- Let IT Be Your Force Multiplier
- Security Patrols for Desktop Security
- ROI for Convergence Education and Training
- Certifications Relevant to Convergence
- Knowledge Gap: Customers and Security Integrators
- Learning about IP-Based Systems
- Maximizing Your Progress in the New Year
- Convergence Initiatives: Timing Can Be Critical
- Convergence and Layers of Security
- Levels of Security
- Why Do I Need a Technology Roadmap?
- Power over Ethernet (PoE)
- PSIM and DATA: What’s the Difference?
- Impact – The Pace of Technology Development
- Technology Blinders
- Addressing Risks in Real Time
- Who Specified This?
- The Deadlocking Plunger Weakness
- Smart Projects
- Smart Perimeter Detection Projects
- Backup Power for Video Systems
- Uninterruptible Power Supply (UPS) Integration for Video
- Standards Can Provide Significant Benefits
- Lessons Learned: Physical Security & IT Collaboration
- Single Logical-Physical Access Card Standards?
- Where Do Standards Lead?
- Technology Roadmap Match-Up
- Benefits of Access Card Convergence
- Security Cameras for Business Operations Use
- Sharing Security Technology with Business Units
- Automating Workforce Management
- Wireless Analog Opens Vulnerability
- Responsible Disclosure and Physical Security Risk
- Facing Up to Lock and Key Denial
- Wheels or Electrons?
- Simple Network Management Passion
- Log Me In, Scotty!
- Costly Cable Kinks
- Tech Projects Undermined by Poor Training and Documentation
- Read the Release Notes!
- Detecting the Gradual Loss of Video Network Capacity
- Ongoing Maintenance for Outdoor Security Cameras
- The Facility Code Access Control Vulnerability
- Caught on Video: Trees Stealing Video Disk Storage
- Prank – or Bigger Threat?