Consolidation is coming to corporate security technology

Consolidation is coming to corporate security technology

Those old enough to remember the software industry in the 1980s might recall some names from days gone by: Lotus 1-2-3, Harvard Graphics, :ccMail and WordPerfect. At its peak, Lotus 1-2-3 had an overwhelming market share and had won the spreadsheet wars. WordPerfect was the enterprise standard for word processing and :ccMail was one of the dominant email systems of the decade. And Harvard Graphics? As the first presentation software to gain widespread acceptance in…

Read More

The evolution of the corporate security mission

The evolution of the corporate security mission

When we started in corporate security, the emphasis in mission statements was on the protection of tangible assets, specifically people and property. As such, physical security strategies tended to focus on perimeter security measures and infrastructure, a guarding operation, CCTV coverage, access control systems, intruder alarms and the accompanying SOPs and standards that govern how all of these measures and programs are implemented and maintained. Often accompanying the mission is an “in order to” statement…

Read More