Story image

Fundamental shift: A look inside the rising role of IT in physical access control

Shifting budgets and responsibilities require IT and physical security teams to consider a fundamental change in day-to-day operations.

While physical security professionals have suspected a shift toward increased involvement of the IT department in physical access control, recent research has shown this to be true. 

A survey conducted by The 05 Group of more than 1,500 IT Managers, Directors and staff, as well as Chief Information and Chief Technology Officers, found that IT departments are now more involved than ever in an organisation’s physical access control decisions and implementation. 

According to the survey, more than half (55%) of respondents reported IT as primarily responsible or having shared responsibility for access control within their organisation. 

As a result, IT leaders are tasked with spearheading not only the protection of their company’s network and cybersecurity-related initiatives but also those set forth by the Physical Security department to protect employees, visitors and assets from internal and external threats. 

Similarly, the study showed that the IT department will increasingly play a role in physical security to influence technology decisions (76%) through the integration of access control within the ecosystem (72%), by implementing access control technology (59%), and through the management of access control systems (39%). 

Along with the added responsibility to help implement security solutions alongside IT-related projects, IT leaders are also increasingly responsible for budgeting decisions within physical security. 

According to the survey, more than 85% of respondents reported that IT was involved in decisions regarding physical access control technology investments. 

To get access to the complete case study click here.

ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.