{"id":1233,"date":"2016-04-19T19:00:53","date_gmt":"2016-04-19T19:00:53","guid":{"rendered":"http:\/\/bixpert-dev.local\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/"},"modified":"2016-04-19T19:00:53","modified_gmt":"2016-04-19T19:00:53","slug":"why-and-how-to-merge-physical-and-cybersecurity-at-your-company","status":"publish","type":"post","link":"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/","title":{"rendered":"Why (And How) To Merge Physical And Cybersecurity At Your Company"},"content":{"rendered":"<p>Let\u2019s face it, companies large and small are facing bigger security threats than ever before. Powerful cybersecurity solutions abound, but locking down physical access points with equally advanced technology is just as critical. At most companies, cyber security and physical security live in silos, with separate systems managed by separate teams. Unfortunately, this outdated approach no longer works. To keep your most important information and assets safe, one unified system should lock all your doors \u2014 whether those doors live in the real world or in the digital one. The effectiveness of unified physical and cyber security systems is proven, and the argument to shift to a converged approach gets stronger with every breach we read about. Making the change may not be easy, but it\u2019s certainly easier than dealing with the aftermath of an exploited security vulnerability. To get the process going, you first need to gather your IT team and physical security team together in one room. From there, here are five recommendations to kickstart the discussion.<\/p>\n<h3>1) Choose a unified device for access.<\/h3>\n<p>Give each employee a single, authenticated device, such as a mobile phone, that grants secure access to their assigned physical and digital entry points. This means that each device authenticates the identity of exactly one person, giving that person a consolidated, trackable access point and giving security administrators a unified view of security activity. Unlike identification badges and other traditional identification systems, this also ensures that access is far less likely to be transferred from one person to another, and can be locked down remotely and instantly in the event of a breach.<\/p>\n<h3>2) Make sure you\u2019re able to instantly grant and revoke access.<\/h3>\n<p>In the event of a security concern, locking down assets and revoking access needs to happen quickly, and should be able to be performed remotely. One deactivation must be able to immediately block access both physically and digitally in the event of a suspected compromise.<\/p>\n<h3>3) Coordinate access policies across your company.<\/h3>\n<p>Siloed cyber and physical security systems almost always require different credentials and have different access restrictions. A converged solution allows you to implement a single set of rules, creating a unified security ecosystem that allows you to manage all assets, and provides a single view into all user activity, eliminating ownership confusion and information silos.<\/p>\n<h3>4) Ensure ease of user authentication.<\/h3>\n<p>This is partially solved if each user uses a single device for all types of access. However, it is even more important to provide employees and administrators with means to verify the identity of those with whom they are communicating and sharing information. This should be able to be done both in-person and remotely.<\/p>\n<h3>5) Create a unified environment for reporting and analysis.<\/h3>\n<p>A unified, real-time report of both physical and cyber security activity provides a comprehensive view of potential intrusions or other abnormal incidents across all environments. A single data set also provides a clean audit trail for incident response.<\/p>\n<p>Jim Letsky is Vice President with MicroStrategy\u2019s Usher enterprise security business.\u00a0 He has more than 10 years of analyzing, developing and managing complex business operations in a variety of market verticals. As one of the key executives on the Usher team, Jim is responsible for growing and positioning the Usher business in the marketplace, as well as working internally with the product management and engineering teams to ensure that development priorities reflect market demand. Prior to MicroStrategy, Jim served for 21 years in the United States Marine Corps, and held several leadership positions at companies in the financial services and technology industries.<\/p>\n<p>\u00a0<\/p>\n<p><em>Source: http:\/\/cbspulse.com\/2016\/03\/09\/merge-physical-cyber-security\/<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let\u2019s face it, companies large and small are facing bigger security threats than ever before. Powerful cybersecurity solutions abound, but locking down physical access points with equally advanced technology is just as critical. At most companies, cyber security and physical security live in silos, with separate systems managed by separate teams. Unfortunately, this outdated approach [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1233","post","type-post","status-publish","format-standard","hentry","category-uncategorized-hu"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why (And How) To Merge Physical And Cybersecurity At Your Company - Bixpert | Munk\u00e1ra fogjuk adatait<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why (And How) To Merge Physical And Cybersecurity At Your Company - Bixpert | Munk\u00e1ra fogjuk adatait\" \/>\n<meta property=\"og:description\" content=\"Let\u2019s face it, companies large and small are facing bigger security threats than ever before. Powerful cybersecurity solutions abound, but locking down physical access points with equally advanced technology is just as critical. At most companies, cyber security and physical security live in silos, with separate systems managed by separate teams. Unfortunately, this outdated approach [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/\" \/>\n<meta property=\"og:site_name\" content=\"Bixpert | Munk\u00e1ra fogjuk adatait\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bixpertkft\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-19T19:00:53+00:00\" \/>\n<meta name=\"author\" content=\"Kapuv\u00e1ri Tam\u00e1s\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kapuv\u00e1ri Tam\u00e1s\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/\"},\"author\":{\"name\":\"Kapuv\u00e1ri Tam\u00e1s\",\"@id\":\"https:\/\/bixpert.hu\/#\/schema\/person\/e7e0808310a8c8ff0acda56faa0c1e79\"},\"headline\":\"Why (And How) To Merge Physical And Cybersecurity At Your Company\",\"datePublished\":\"2016-04-19T19:00:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/\"},\"wordCount\":608,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/bixpert.hu\/#organization\"},\"articleSection\":[\"Uncategorized @hu\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/\",\"url\":\"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/\",\"name\":\"Why (And How) To Merge Physical And Cybersecurity At Your Company - Bixpert | Munk\u00e1ra fogjuk adatait\",\"isPartOf\":{\"@id\":\"https:\/\/bixpert.hu\/#website\"},\"datePublished\":\"2016-04-19T19:00:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/bixpert.hu\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why (And How) To Merge Physical And Cybersecurity At Your Company\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bixpert.hu\/#website\",\"url\":\"https:\/\/bixpert.hu\/\",\"name\":\"Bixpert | Munk\u00e1ra fogjuk adatait\",\"description\":\"A vil\u00e1g legjobb BI-technol\u00f3gi\u00e1it szak\u00e9rtelm\u00fcnkkel \u00f6tv\u00f6zve t\u00e1mogatjuk \u00fczleti d\u00f6nt\u00e9seit.\",\"publisher\":{\"@id\":\"https:\/\/bixpert.hu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bixpert.hu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/bixpert.hu\/#organization\",\"name\":\"Bixpert | Munk\u00e1ra fogjuk adatait\",\"url\":\"https:\/\/bixpert.hu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/bixpert.hu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/bixpert.hu\/wp-content\/uploads\/2025\/01\/bixpert-logo-map.png\",\"contentUrl\":\"https:\/\/bixpert.hu\/wp-content\/uploads\/2025\/01\/bixpert-logo-map.png\",\"width\":120,\"height\":35,\"caption\":\"Bixpert | Munk\u00e1ra fogjuk adatait\"},\"image\":{\"@id\":\"https:\/\/bixpert.hu\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/bixpertkft\/\",\"https:\/\/www.linkedin.com\/company\/10286168\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/bixpert.hu\/#\/schema\/person\/e7e0808310a8c8ff0acda56faa0c1e79\",\"name\":\"Kapuv\u00e1ri Tam\u00e1s\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/bixpert.hu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ed42ac2cd3e20b9a736f5beea1cde02e0e26c3c51c6623afce850bef2fd90f7d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ed42ac2cd3e20b9a736f5beea1cde02e0e26c3c51c6623afce850bef2fd90f7d?s=96&d=mm&r=g\",\"caption\":\"Kapuv\u00e1ri Tam\u00e1s\"},\"url\":\"https:\/\/bixpert.hu\/en\/blog\/author\/bixpertadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why (And How) To Merge Physical And Cybersecurity At Your Company - Bixpert | Munk\u00e1ra fogjuk adatait","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/","og_locale":"en_US","og_type":"article","og_title":"Why (And How) To Merge Physical And Cybersecurity At Your Company - Bixpert | Munk\u00e1ra fogjuk adatait","og_description":"Let\u2019s face it, companies large and small are facing bigger security threats than ever before. Powerful cybersecurity solutions abound, but locking down physical access points with equally advanced technology is just as critical. At most companies, cyber security and physical security live in silos, with separate systems managed by separate teams. Unfortunately, this outdated approach [&hellip;]","og_url":"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/","og_site_name":"Bixpert | Munk\u00e1ra fogjuk adatait","article_publisher":"https:\/\/www.facebook.com\/bixpertkft\/","article_published_time":"2016-04-19T19:00:53+00:00","author":"Kapuv\u00e1ri Tam\u00e1s","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kapuv\u00e1ri Tam\u00e1s","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/#article","isPartOf":{"@id":"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/"},"author":{"name":"Kapuv\u00e1ri Tam\u00e1s","@id":"https:\/\/bixpert.hu\/#\/schema\/person\/e7e0808310a8c8ff0acda56faa0c1e79"},"headline":"Why (And How) To Merge Physical And Cybersecurity At Your Company","datePublished":"2016-04-19T19:00:53+00:00","mainEntityOfPage":{"@id":"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/"},"wordCount":608,"commentCount":0,"publisher":{"@id":"https:\/\/bixpert.hu\/#organization"},"articleSection":["Uncategorized @hu"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/","url":"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/","name":"Why (And How) To Merge Physical And Cybersecurity At Your Company - Bixpert | Munk\u00e1ra fogjuk adatait","isPartOf":{"@id":"https:\/\/bixpert.hu\/#website"},"datePublished":"2016-04-19T19:00:53+00:00","breadcrumb":{"@id":"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/bixpert.hu\/en\/blog\/why-and-how-to-merge-physical-and-cybersecurity-at-your-company\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bixpert.hu\/en\/"},{"@type":"ListItem","position":2,"name":"Why (And How) To Merge Physical And Cybersecurity At Your Company"}]},{"@type":"WebSite","@id":"https:\/\/bixpert.hu\/#website","url":"https:\/\/bixpert.hu\/","name":"Bixpert | Munk\u00e1ra fogjuk adatait","description":"A vil\u00e1g legjobb BI-technol\u00f3gi\u00e1it szak\u00e9rtelm\u00fcnkkel \u00f6tv\u00f6zve t\u00e1mogatjuk \u00fczleti d\u00f6nt\u00e9seit.","publisher":{"@id":"https:\/\/bixpert.hu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bixpert.hu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/bixpert.hu\/#organization","name":"Bixpert | Munk\u00e1ra fogjuk adatait","url":"https:\/\/bixpert.hu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bixpert.hu\/#\/schema\/logo\/image\/","url":"https:\/\/bixpert.hu\/wp-content\/uploads\/2025\/01\/bixpert-logo-map.png","contentUrl":"https:\/\/bixpert.hu\/wp-content\/uploads\/2025\/01\/bixpert-logo-map.png","width":120,"height":35,"caption":"Bixpert | Munk\u00e1ra fogjuk adatait"},"image":{"@id":"https:\/\/bixpert.hu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/bixpertkft\/","https:\/\/www.linkedin.com\/company\/10286168"]},{"@type":"Person","@id":"https:\/\/bixpert.hu\/#\/schema\/person\/e7e0808310a8c8ff0acda56faa0c1e79","name":"Kapuv\u00e1ri Tam\u00e1s","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bixpert.hu\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ed42ac2cd3e20b9a736f5beea1cde02e0e26c3c51c6623afce850bef2fd90f7d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ed42ac2cd3e20b9a736f5beea1cde02e0e26c3c51c6623afce850bef2fd90f7d?s=96&d=mm&r=g","caption":"Kapuv\u00e1ri Tam\u00e1s"},"url":"https:\/\/bixpert.hu\/en\/blog\/author\/bixpertadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/bixpert.hu\/en\/wp-json\/wp\/v2\/posts\/1233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bixpert.hu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bixpert.hu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bixpert.hu\/en\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/bixpert.hu\/en\/wp-json\/wp\/v2\/comments?post=1233"}],"version-history":[{"count":0,"href":"https:\/\/bixpert.hu\/en\/wp-json\/wp\/v2\/posts\/1233\/revisions"}],"wp:attachment":[{"href":"https:\/\/bixpert.hu\/en\/wp-json\/wp\/v2\/media?parent=1233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bixpert.hu\/en\/wp-json\/wp\/v2\/categories?post=1233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bixpert.hu\/en\/wp-json\/wp\/v2\/tags?post=1233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}