Page 24 - Security Today, March 2017
P. 24

An organization is a complex environment that is con- tinuously growing to include more systems, buildings and processes and as a result, faces more risk, costs and threats. Organizations continuously evaluate how to increase profits, manage risk and save money, while looking for ways to improve processes, manage incidents and securely operate an enterprise.
The best way to address risk is to manage people and the systems they use. An organization must manage the system intelligence driven to employees by using a data centric approach model to identify be- haviors, manage risk and decrease costs. How can security managers and C- level executives attain a higher level understanding of how a data centric approach can be more effective in combatting silos of data, and the variety of risks across a company’s environment? This is where you, as the integrator, can help your customer identify and meet their goals.
Because every customer is unique, meeting the goals of your cus- tomer requires a customer centric approach. What is your customer
considering in regards to security technology? What are the organiza- tion’s business or operational goals? This is where you can help your customer sync up its security goals with the organization’s goals. Use a dashboard or single monitor of information to present the most effective method of collecting and analyzing data, and deliver a tech- nology centric solution.
Breaking it Down
An organization must first determine what data to collect to best pro- tect their people, assets and infrastructure. As the integrator, provid- ing valuable consultation and direction during the exploration phase can position you as the expert. Ask questions and dig deeper to learn more about your customer. What are they considering when select- ing a security management system? Do they want more out of their system than access control?
Access control and video management systems provide much more data than originally intended. Beyond managing who has ac- cess and when, the information can identify behavior patterns. When
22
0317 | SECURITY TODAY
Delivering
Technology
Optimizing business by managing risk, costs and threats By Kim Rahfaldt
RISK ASSESSMENT






















































































   22   23   24   25   26