
NEWS
AlertEnterprise Inc., the leading cyber-physical security convergence software company, has achieved ISO 27001:2013 certification for information security management systems (ISMS), further demonstrating the company’s commitment to the highest level of internal compliance and Security.
In the CISO position Weatherford will guide strategic aspects of data management and protection, advising cyber-physical Security policies and procedures within AlertEnterprise. In addition, Weatherford will reach out to businesses and executive professionals in the Cyber and Physical Security industries to further accelerate Security Convergence adoption.
The physical security industry has before it an incredible opportunity: to lead business digital transformation (DX) through security convergence. Make no mistake about it, this is our latest inflection point. The emergence of the cloud and as-a-service platform economy have created a sense of urgency all the way up into the corporate boardroom. DX helps enterprises become increasingly customer focused and outward facing.
COVID-19 has triggered a significant shift in the way organizations address the Security and Safety of their workforce. Sensing the urgency, IT, HR and Physical Security leaders realize the days of operating in silos are over – it’s time to embrace convergence. In this time of unprecedented change, Security Convergence is proving one of the most effective ways to protect the workforce, enforce company policies and maintain business resiliency through automated, cross-departmental collaboration.
In this exclusive guest Q&A style interaction between AlertEnterprise CEO Jasvir Gill and Dr. Steve Hunt SAP’s Chief Expert for Technology and Work explores how converged Physical Security and HR management solutions deliver critical data-insights to keep employees safe as facilities reopen.
As employees begin to phase out this extended period of remote work and return to places of business, companies are discussing when and how to do it all safely. It is an essential task, and new territory for everybody from employees to human resources (HR) managers.
Technology plays a key role in facilitating ongoing coordination between human resources and security that bolsters food defense in a COVID-19 world.
With significant clusters of COVID-19 infection among employees—16,000 cases and 86 deaths documented by the CDC through May 2020 — the food processing and distribution industry faces significant challenges in reopening their facilities and ramping up to full capacity. Technology for health and safety access governance and intelligence, along with guidelines from the CDC and OSHA, can help support food companies in the automation of certain compliance activities and a safe return-to-work strategy.
As companies around the world prepare to reopen businesses or facilities that were previously closed or open with limited capacity, logistical and safety puzzles emerge as organizations determine how to do so safely, while keeping employees, visitors and facilities safe from the persistent threat of COVID-19.
AlertEnterprise Launches COVID-19 Workforce and Workspace Health &Safety Software to Strengthen Business Strategies for Reopening
AlertEnterprise Named a Finalist for 2020 SAP® Pinnacle Award in SAP App Center Partner of the Year (Spotlight) Category
The Role of Physical Identity Access Management During A Pandemic
3 identity technology considerations for COVID-19
As COVID-19 strengthens its grip across the globe with over 118,000 cases of infected people and the World Health Organization (WHO) declaring it a pandemic, it’s important for us to have a conversation about how and where technology can support enterprise efforts to protect its workforce. Here are three considerations on how a Physical Identity Access Management (PIAM) platform can help…
8 Steps to An Effective Physical Identity Access Management Strategy
Identity, trust and security are at the heart of enterprise digital transformation, making it easier and faster to engage customers and partners, create amazing experiences and offerings and level up operations. Security is now a true business enabler. Here are 8 steps to implement a holistic approach to managing physical and logical identities for employees, contractors, vendors and visitors to align security with business goals and reduce enterprise risk.
6 Ways Visitor Identity Management Transforms Guest Experiences
You know the saying about first impressions. AlertEnterprise Visitor Identity Management (VIM) software makes a powerful first impression for your customers, prospects, vendors, partners and workforce.
AlertEnterprise Integrates Physical Identity and Access Management Platform with SAP SuccessFactors HCM
AlertEnterprise Unveils Next Generation Workspace Intelligence Software
New Mexico’s Largest Electricity Provider Shines a Light on Converged Security | An AlertEnterprise Case Study
AlertEnterprise Launches Airport Guardian FBI Rap Back Integration
AlertEnterprise Selected by Los Angeles World Airport for New Identity Management and Credentialing System
AlertEnterprise Founder and CEO Named a Top Influencer in the Security Industry
Case Study: AlertEnterprise - AIG Unifies Security and Customer Service as a Business Enabler
AlertEnterprise Hires New Director of Sales Ashish Khurana, and Director of Marketing Reta Booij, to Accelerate Partner Growth
AlertEnterprise Delivers Frictionless Security with Launch of New Facial Recognition Technology for Visitor Management
AlertEnterprise Transforms Insider Threat Protection with Next-Generation AI-Powered Identity Intelligence Technology
AlertEnterprise Continues Rapid Growth in the Middle East; Hires Ehsan Hameed as New Regional Vice President of Sales
AlertEnterprise Hires Willem Ryan as New Vice President Marketing and Communications
THE INEVITABLE EMERGENCE OF THE CYBER-PHYSICAL INSIDER THREAT
Rising to meet the credentialing challenge
Automate airport processes with a converged cyber-physical Identity Management and Credentialing System
Addressing Insider Threats Requires A Cyber-Physical Blended Approach
While most security teams are focused on preventing malicious outsider attacks, recent data suggests that close to 30 percen t of confirmed breaches today involve insiders.