SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Anviz FaceDeep 5 AI Based Smart Face Recognition Terminal

    Anviz FaceDeep 5 AI Based Smart Face Recognition Terminal

    Hikvision 4G Solar Kit For Remote Security

    Hikvision 4G Solar Kit For Remote Security

    Dahua Panoramic PTZ WizMind Network Camera

    Dahua Panoramic PTZ WizMind Network Camera

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • HID Global Expands Its RFID Enablement Solutions Portfolio With Invengo's Textile Services Business Acquisition
    • ASSA ABLOY Acquires Invengo Information Technology Co., Ltd.’s Textile Services Business Unit In France
    • Access IS Delivers Contactless Transit Payment Solutions For Storstockholms Lokaltrafik To Secure Stockholm’s Public Transport
    • Security Industry Association Names Craig Sharman As The 2021 Recipient Of The SIA Chairman’s Award
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Security bytes
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2020
    • Year in Review 2019
    Featured
    • Water Plant Attack Emphasizes Cyber’s Impact On Physical Security
    • Expert Roundup: Healthy Buildings, Blockchain, AI, Skilled Workers, And More
    • Smart Offices: How Is Mobile ID Changing The Way We Access The Office?
    • What Are The Positive And Negative Effects Of COVID-19 To Security?
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Dahua Technology Installs HD CCTV Cameras With Smart Analytics Using AI To Secure Iconic Battle Of Britain Bunker

    Dahua Technology Installs HD CCTV Cameras With Smart Analytics Using AI To Secure Iconic Battle Of Britain Bunker

    Oliver Law Security Installs Vanderbilt ACT365 Security System To Protect One Of Doncaster’s Largest Gyms, The Fitness Village

    Oliver Law Security Installs Vanderbilt ACT365 Security System To Protect One Of Doncaster’s Largest Gyms, The Fitness Village

    Hikvision IP CCTV Systems Protect Visitors And Stores At Somerset Mall In South Africa

    Hikvision IP CCTV Systems Protect Visitors And Stores At Somerset Mall In South Africa

    CLIQ® Access Control Solution From ASSA ABLOY Helps Secure Museums, Shopping And Indoor Leisure Sites

    CLIQ® Access Control Solution From ASSA ABLOY Helps Secure Museums, Shopping And Indoor Leisure Sites

  • Virtual events
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Management Systems
    • Integrated Systems
    • Asset Management
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Shifting Trends in Operation Centers and Control Rooms for 2021

    Shifting Trends in Operation Centers and Control Rooms for 2021

    5 Steps to Building Resilience in your 2021 Physical Security Plan

    5 Steps to Building Resilience in your 2021 Physical Security Plan

    Critical Event Management: The Digital Transformation of Safety and Security

    Critical Event Management: The Digital Transformation of Safety and Security

    Surveillance Solutions Ensure Cannabis Compliance

    Surveillance Solutions Ensure Cannabis Compliance

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID Global
    • Hanwha Techwin America
    • Security & Safety Things
    • Eagle Eye Networks
    • Everbridge
    Other Resources
    • eMagazines
    • Videos
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    How To Ramp Up Perimeter Security With License Plate Reader Technology

    How To Ramp Up Perimeter Security With License Plate Reader Technology

    Getting the Most Value From Software Subscription Agreements

    Getting the Most Value From Software Subscription Agreements

    Using Smart Video Analytics to Improve Operations in Healthcare Facilities

    Using Smart Video Analytics to Improve Operations in Healthcare Facilities

    10 Step Guide to Staying Ahead of Emerging Security Threats

    10 Step Guide to Staying Ahead of Emerging Security Threats

About us Advertise
  • Artificial intelligence (AI)
  • Counter Terror
  • Cyber security
  • Robotics
  • Thermal imaging
  • Intrusion detection
  • Body worn video cameras
  • ISC West
  • Video management software
  • Video analytics
  • COVID-19
  • View all
Counter Terror
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • White papers
Counter Terror

What Are The Security Challenges Of The Enterprise Market?

17 Jan 2018

What Are The Security Challenges Of The Enterprise Market?
17 Jan 2018
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook

Editor Introduction

Enterprise customers provide a large, and very lucrative, business opportunity for the physical security market. These customers include big global companies with plenty of revenue to spend and employees and facilities to protect. As a group, enterprise customers also tend to be a demanding lot, requiring systems that are large, scalable, that can operate across a wide geographic area, and that provide top-notch system performance. Enterprise customers set the standards of performance for the entire market, and they challenge manufacturers to up their game. We asked this week’s Expert Panel Roundtable to reflect on the industry’s biggest customers: What are the security challenges of the enterprise market?


Card image cap
Jumbi Edulbehram Oncam

I’ll address five major security challenges of the enterprise market. The first one is cybersecurity, both in terms of vulnerabilities in general and in particular, susceptibilities of physical security infrastructure. Second, enterprise customers often have multiple locations in different geographies, so seamless integration of security operations could be challenging. Third, designing and deploying an enterprise-class security infrastructure needs significant IT expertise, which could be difficult if physical security personnel don’t have the necessary expertise and/or the IT department doesn’t have resources to allocate to physical security. Fourth, more so than in other markets, enterprise customers often have many stakeholders that need to come together to execute a successful security strategy, which is often a significant challenge, especially in organizations where such interdepartmental collaboration is limited. And last but certainly not least, obtaining the necessary budgets for enterprise security infrastructure and personnel is always a challenge.

Card image cap
Mitchell Kane Vanderbilt Industries

The main security challenge that faces the enterprise market is the fact that individual locations, divisions and branches of large and/or global organizations each possess diverse needs when it comes to streamlining operations and overall safety. Enterprises demand elevated integration capabilities across multiple security, event management and human resources systems, and in the access control market, this requires manufacturers to provide systems that are easy to administer and manage to allow roles to be updated quickly and efficiently. Due to the elevation of cybersecurity threats, enterprises also need to ensure best practices for employees at all sites in keeping data safe, as one small mishap can lead to larger complications. Business continuity and risk management procedures must be maintained across the enterprise for day-to-day users of security technology and employees/visitors to ensure comprehensive preparation for a security incident or emergency.

Card image cap
Tom Echols Security 101

Security leaders at enterprise organizations are responsible for protecting critical resources including intellectual property, personnel and assets from natural or manmade emergencies through video, access control and other solutions. Organizations are consistently affected by mergers and acquisitions, regulatory compliance mandates and system lifecycle transitions. Additionally, emerging cybersecurity and active shooter threats have pinpointed vulnerabilities that highlight potential operational flaws such as traveling employees and vendor site visits. Often the biggest hurdle for enterprise end-users is understanding that physical security standards on a national or global scale is more than just technology and product, it’s a program and a process. To achieve a holistic view of disparate systems on a vast scale, enterprises should utilize an experienced integrator to develop a layered approach with a transition and scalability plan that expertly addresses change management and business continuity.

Card image cap
Jody Ross AMAG Technology, Inc.

The challenges of the enterprise market haven’t really changed over the past several years. It is important for manufacturers to know and fully understand their customers. That is the only true way to be able to deliver a solution that works for the customer. It also provides valuable feedback that manufacturers can use to help improve and enhance their solutions.

Card image cap
John Davies TDSi

Although the security industry has already embraced the idea that cybersecurity and physical security are merging into one, it is taking some quarters of the enterprise sector longer to fully grasp the concept. Security is crucially important for enterprise businesses, and it’s vital that the sector is fully briefed by us security professionals. A recent statistic from Morgan Stanley suggests that just a 10 percent cut in enterprise security breaches could save these businesses an impressive $17 billion a year. Commercial espionage is big business for criminal elements, and the threat needs to be crushed. Interactive buildings and security systems can make the threat even more acute if they are not properly planned and operated with prevention in mind. The Internet of Things is bringing this to the fore, so it is essential that enterprise organizations look very closely at the risks and what they need to do.

Card image cap
Tom Galvin Razberi Technologies

Enterprises are increasingly challenged by the growing number of Internet of Things devices deployed across their locations, including IP surveillance cameras that are connected to the corporate network. There are three key issues with this. First, streaming surveillance back to centralized servers for recording can negatively impact the network and force tradeoffs in video quality. Second, hackers can use exposed cameras or other IoT devices to launch cyberattacks. Third is ensuring that IoT devices are operating 24x7x365. In 2018, enterprises should seek solutions that can optimize the network with smart architectures. To mitigate cybersecurity threats, they must automate cybersecurity firewall and “hardening” of devices in a scalable way. Lastly, to ensure reliability and uptime of IoT devices as well as the video surveillance system, enterprises require the ability to monitor and view data analytics. These are all addressable but need proactive attention by enterprise security and IT leaders.

Card image cap
Todd Piett Rave Mobile Safety

As office environments continue to change, location has quickly become a large obstacle for the enterprise market. For instance, the distance between employees, management and safety officials can delay essential communication during emergencies. Whether offices are spread out across different buildings, states or include remote workers, it’s critical to have immediate access to the location information of each employee in the event of an emergency. As remote workers and multi-office location expansions continue to increase in the enterprise market, executives must also increase their investment in both lone worker and onsite employee safety. Having multiple office locations can often hinder essential information from reaching employees simultaneously during an emergency, resulting in longer response times and expanding business downtime. Employee communication obstacles such as these can be mitigated through the use of modern technology. Tools like two-way communication devices help to manage ongoing incidents in real-time and increase the employee engagement.

Card image cap
Melissa Stenger ISONAS, Inc.

The security challenges of the enterprise market are vast and a separate set of challenges than typical customers in the market.  With large enterprises come more complexity and requirements for a security system; whether that be in the number of users, geographically disperse locations, or the management of high security products. In addition to the complexity and requirements, large enterprises are at a higher risk for breaches, hackers and other cyber and physical crimes. The combination of the complexity and higher risk require large systems that are fully integrated and can utilize the best and most reliable technology. As the market and technologies have expanded, the ability to manage and meet the needs of the enterprise market have become simpler and more cost effective. As the cloud, mobile and open technologies begin to take the security market to the next level, they have allowed the enterprise market to pick the best solutions and on a more reasonable budget.

Card image cap
Colin Leatherbarrow Grosvenor Technology Ltd

The lack of industry capability in relation to cybersecurity and GDPR are undoubtedly two of the biggest challenges. The enterprise market is transitioning from “on-premise” solutions to cloud SaaS, and security manufacturers continually innovate with increasingly sophisticated solutions designed to leverage these new technologies. This rapidly-evolving IT landscape goes to the heart of the challenge: expertise in the design of physical security solutions is no longer enough, becoming experts in cybersecurity, GDPR and cloud SaaS are now fundamental requirements, but it’s essentially a completely new language. The industry is beginning to respond but it needs to do much more before we see the norm of security professionals fluent in both physical and information security. Training and recruitment working in partnership with industry associations and standards bodies will undoubtedly play a major role, I hope ultimately driving to the codification of these skills.


Editor Summary

The enterprise market presents a long list of challenges to manufacturers and integrators in the physical security market, including cybersecurity, seamless integration across multiple locations and divisions, protection of critical assets, and a need for the most complex and effective systems. While meeting the needs of the enterprise market is an ongoing challenge, it also affords a lucrative opportunity for the security industry to deploy the best it has to offer.

  • Related links
  • ACT Access control systems & kits
  • ISONAS Access control systems & kits
  • TDSi Access control systems & kits
  • Vanderbilt Access control systems & kits
  • AMAG IP cameras
  • Oncam IP cameras
  • TDSi IP cameras
  • Related categories
  • Access control systems & kits
  • IP cameras
Featured white papers
Access Control & Intelligent Vehicle Screening

Access Control & Intelligent Vehicle Screening

Download
Related articles
Physical And Cyber Security Precautions When Traveling

Physical And Cyber Security Precautions When Traveling

Mass Security Screening Technology For Large Events

Mass Security Screening Technology For Large Events

2018 FIFA World Cup Russia Integrates Safety, Security And Service

2018 FIFA World Cup Russia Integrates Safety, Security And Service

Follow us

Sections Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Virtual events Events White papers Videos January 2018 news RSS
Topics Artificial intelligence (AI) Counter Terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras ISC West Video management software
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
About this page

Security experts from Oncam, Vanderbilt Industries, Security 101, AMAG, TDSi, Razberi Technologies, , ISONAS, Inc., discuss "What Are The Security Challenges Of The Enterprise Market?"

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Limited 2000 - 2021, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACInformed.com

Subscribe to our Newsletter


Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download SecurityInformed.com product tech spec