Security Operations Center (SOC) will be the largest demonstration ever of the convergence of information security and physical security
Infosecurity NY and ISC East (Sept. 11-12, Jacob Javits Convention Center, New York) will debut The Security Operations Center (SOC), a best-of-breed, multi-vendor example of convergence technology that will highlight the security and business benefits of combining physical and information security.
More than 25 manufacturers will display their latest IP-based products at the SOC, which will provide attendees with the opportunity of experiencing convergence at its very best. Solutions will focus on four different market sectors consisting of government, education, retail and banking. The SOC will include a forum for the most relevant customer security concerns and technology standards proven to solve them.
In addition, “ask the experts” panel discussions where security professionals can gain insight on two important questions: What is the bandwidth? and Is my network secure? while simultaneously asking specific questions about their individual concerns and issues. These sessions will take place several times a day, both days of the show. Educational materials and guides and Standard Operating Procedures will be available.
Companies currently participating include: Agent VI, ASSA ABLOY, Axis Communications, Canon, CBL Systems, DeWalt, Exacq Technologies, IP Video Corporation, Milestone Systems, On-Net Surveillance Systems, Pivot3, S2 Security Corporation, Transition Networks, and Viscount Systems.
The Security Operations Center is the first of its kind,” said Dean Russo, group vice president, Reed Exhibitions, group vice president, Security and Life Safety portfolio, “and we are excited to present this concept to both physical and IT security professionals through the co-location of these two events.”
The SOC will feature IP surveillance video, networked access control, intrusion detection, wired and wireless network security products, enterprise class servers, software management platforms, and robust storage networks.
For more information visit http://www.isceast.com/ or http://www.infosecurityevent.com