Security Technology Executive

FEB-MAR 2018

Issue link:

Contents of this Issue


Page 20 of 61

www. • Februar y/March 2018 • SECURIT Y TECHNOLOGY E XECUTIVE 19 Visit us at ISC West | Las Vegas, NV | Booth 5077 | April 11-13 ComNet is Your Solution for Fiber Optic, Copper and Wireless Transmission The transmission products you choose today will affect how well your network performs tomorrow. ComNet offers the most comprehensive line of products designed to solve every transmission challenge. Your Transmission Challenge has always been Getting Your Audio, Video, Data and Ethernet Signals from Here to There. The Shortest Distance Between Two Points View the Full Product Line at and Identify the Fiber Optic, Copper or Wireless Connectivity Solution for your Application Contact the ComNet Design Center Now for Free Design Assistance. Call 1-888-678-9427 or 1-203-796-5300 or email Visit Email Phone 1-203-796-5300 Toll Free 1-888-678-9427 Request information: Devising a workable strategy that fits the size and complexity of shared data centers or how security systems are integrated with different networks within an organization is a huge challenge. "It comes down to a prioritization of what works best and what is most cost-effective for the organization to make that integration happen," Colin says. Merging physical access control and video surveil- lance systems, working with IT on consolidation of data centers and cloud functionality, and eventual placement of security operations are the things that keep Soltis up at night. "Details like this are typically handled during the integration of the company (instead of prior)," he says. "The merging of systems, data centers and functions will depend on the organizational structure of the company." Anupam Mehta , a security consultant for software designer Synopsys, says there are five IT- based aspects of security that must be considered by an acquir- ing company: 1. Data security for electronic and physical data: This involves data clean-up, backups and recovery procedures. 2. Application security: Much like the integration of various physical security measures, companies tend to need to integrate various COTS (Commercial-off-the- Shelf ) and internal IT tools and applications for continuity of the business. Thus, dynamic and static analysis of applications must be conducted prior to integration with current systems; and various mobile applications and services offered by both companies involved in M&A must be integrated. 3. Network security: Care must be taken during the integration of workstations, network devices (firewalls, routers, access points, etc.), web servers and remote connectivity for employees. 4. Architectural risk analysis: Applications and infrastructure components must be analyzed thoroughly to understand the threats and critical assets that are vulnerable. 5. Adopt policies, compliance and standards: Ensure compliance of applications and tools as per applicable standards (NIST, FIPS, PCI-DSS, HIPAA, etc.).

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - FEB-MAR 2018