{"id":2160,"date":"2006-10-25T00:00:00","date_gmt":"2006-10-25T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/25\/security-networks-to-converge-and-move-offshore\/"},"modified":"2021-12-30T11:40:48","modified_gmt":"2021-12-30T11:40:48","slug":"security-networks-to-converge-and-move-offshore","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/25\/security-networks-to-converge-and-move-offshore\/","title":{"rendered":"Security, Networks To Converge, And Move Offshore"},"content":{"rendered":"<p>A few years ago, when networking technology experts and traditional security experts got together, they could barely communicate.  Now, the two areas are converging at a rapid pace and business leaders should plan for more changes ahead, according to several experts who spoke Wednesday.  Both IT and physical security are likely to be driven by government regulations and business needs and are likely to move offshore, said panelists at InfoSecurity and the International Security Conference &#038; Exposition.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Years back, when you brought physical and cyber security guys together they weren&#8217;t even speaking the same language,&#8221; said CA Senior Vice President and Chief Security Strategist Ron Moritz, one of four featured panelists Wednesday at the Jacob Javits Center in New York City.<\/p>\n<p>Senior Vice President and Chief of Security for Indymac Bank, Boulton Fernando, said corporate decision-makers should realize that they are likely to reap cost-saving benefits of convergence in three years, not immediately.<\/p>\n<p>Irene Lam, senior products manager of American Dynamics IP Video Edge Solutions, said that the consolidation of security and networking companies &#8212; evidenced by recent Cisco acquisitions and EMC&#8217;s purchase of RSA &#8212; is good news.<\/p>\n<p>James Henry, chairman, CEO and Founder of Henry Bros.  &#8220;One of the things we did not see happening is the eyeballs moving offshore, at least on the third shift,&#8221; he said.<\/p>\n<p>Fernando and Moritz said that foreign workers are taking more security precautions than Americans take.  Moritz pointed out that, while Americans seek assurances that foreign environments are secure, foreigners are sometimes skeptical about the safety of products from beyond their borders.<\/p>\n<p>http:\/\/www.techweb.com\/showArticle.jhtml?articleID=193402341<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2160","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2160"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2160\/revisions"}],"predecessor-version":[{"id":4647,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2160\/revisions\/4647"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}