Security Technology Executive

MAY-JUN 2017

Issue link:

Contents of this Issue


Page 26 of 87

» While many proclaim the GSOC to be the future of security, companies often perceive an advanced operations center to be much too expensive to build and implement. « prioritize these goals among your key stakeholders. The ultimate goal, of course, is to increase collabora- tion and preempt risk in order to respond more pro - actively and effectively to growing security threats in the enterprise landscape. Take Inventory of Current Technology Assets: Instead of immediately instigating a "rip and replace" methodology, take your current technology assets into account. This includes everything from moni- tors to cameras and employee access to areas within the building. Map out your current security technol- ogy to see if anything can be leveraged and integrated better than it is currently. By surveying the current landscape, you will be able to identify the holes within your security strategy and directly address those first. A converged security approach means combining and leveraging data from all sources within your company, including cameras, sensors, access control, building management, alarms, identity management and even social media. From there you will be able to extract actionable information that can positively impact your organization from a security and finan- cial perspective. Find the Right Platform: There are many bene- fits to having an effective GSOC, including shortened response times, continuous monitoring , detailed analysis and actionable information. By accelerating innovative physical security platforms along with IT and cybersecurity methods, organizations can gain the analytical insights that are needed to address specific challenges. In order for an intricate system to work properly, you must have a system that can accurately collect and leverage Big Data. Finding the right information management and correlation platform is essential to the GSOC. You should keep in mind the functions that the GSOC must perform when reviewing different platforms. These include security system administration, com- pliance, situational awareness capabilities (both within and outside of your organization) incident management, crisis communications and 24/7 moni- toring. Once you lay out all of your organization's needs, you can begin pricing and identifying which products is a priority. Capabilities to Consider When Building A GSOC: • Filtering and Correlation Rules • Geospatial Special Recognition, Mapping and Visualization • Routing • Dispatch - Command & Control Communications • Communications • Device Management • Document • Mass Notification • System Management • 3D Mapping • Incident Reports • Asset Tracking • Risk Management • Post/Blue Force Tracking • Real-time monitoring • Case management • Reporting Most importantly, you have to consider your orga- nization's needs now - and in the long term. Make sure to prioritize your goals based on a forward- thinking plan. Test Your Approach: Process-driven decision making is key to the success of your GSOC. Once you've defined your goals, reviewed your assets, cho- sen a platform and allocated appropriate resources, you can give your GSOC the green light. Be sure to train the operators or analysts who will run the plat- form on an on-going basis and to outline specific processes and procedures at the launch. Through consistent planning and execution, you can leverage the integrated capabilities of a GSOC platform to deliver real, end-to-end solutions that can be fully adopted for a variety of applications and expand your security operational footprint so your company can thrive. About the Author: James Chong is the CEO and Founder of V idsys. Prior to becoming CEO in 20 15, he ser ved as CTO and Founder where his accomplishments included being selected into International Data Group's "InfoWorld Top CTO 25" for his business management leadership and converged securit y technology innovation. May/June 2017 • SECURIT Y TECHNOLOGY E XECUTIVE 27

Articles in this issue

Archives of this issue

view archives of Security Technology Executive - MAY-JUN 2017