{"id":3859,"date":"2021-04-18T06:55:58","date_gmt":"2021-04-18T12:55:58","guid":{"rendered":"https:\/\/idzone.com.sa\/?p=3859"},"modified":"2021-04-18T08:06:36","modified_gmt":"2021-04-18T14:06:36","slug":"what-is-physical-security","status":"publish","type":"post","link":"https:\/\/idzone.com.sa\/arabic\/what-is-physical-security\/","title":{"rendered":"What is Physical Security ?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3859\" class=\"elementor elementor-3859\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6f617de1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6f617de1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6859aab2\" data-id=\"6859aab2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-33deba82 elementor-widget elementor-widget-text-editor\" data-id=\"33deba82\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span>Physical security protects individuals, property, and assets from events that could cause harm, theft or perform malicious act. Just like cybersecurity, physical security is equally important &#8211; the developing technologies like artificial intelligence (<\/span><strong>AI<\/strong><span>) and the internet of things (<\/span><strong>IoT<\/strong><span>) are now more firmly associated, hence the security departments are required to align physical security and information technology for a smart generation workflow process.<\/span><\/p>\n<p><strong>Importance of Physical Security<\/strong><\/p><p><span>Physical security is extremely important as it manages the end to end access of your offices, individuals and resources protecting it from true dangers like intrusion, physical deterrence and helps you take an action immediately.<\/span><br><\/p>\n<p>The term Physical Security is classically applied to keep individuals \u2013 regardless of whether an outsider or insider from accessing certain areas. Restricting people out of your Headquarters, locations with sensitive work, sneaking into secure data centers, steal or damage important IT assets. While the outer perimeter controls external threats, physical security management controls and reduces inside threats and continually flag unusual activities.<\/p>\n<p><strong>How to to manage Physical Security and Identity Management ?<\/strong><\/p>\n<p><!-- \/wp:paragraph --><!-- wp:paragraph --><\/p>\n<p>PSIM constitutes of two major solutions that are&nbsp;<strong>\u0635\u0644\u0627\u062d\u064a\u0629 \u0627\u0644\u062a\u062d\u0643\u0645 \u0635\u0644\u0627\u062d\u064a\u0629 \u0627\u0644\u062f\u062e\u0648\u0644 <\/strong>\u0648<strong> \u0627\u0644\u0645\u0631\u0627\u0642\u0628\u0629 \u0628\u0627\u0644\u0641\u064a\u062f\u064a\u0648<\/strong>.<\/p>\n<p><span>Access control incorporates a wide range that includes basic barriers to more sophisticated things such as Keypad, ID card or biometrically-restricted doors. The principal line of safeguard is simply the structure &#8211; the entryways wall, entryways, gates, doors, windows. Locking these, adding impediments like security fencing, cautioning signage, and noticeable gatekeepers will put off most easy-going endeavors on your areas. <\/span><span>Biometric security is additionally a typical choice to get the two offices and gadgets. In principle our interesting body identifiers \u2013 regardless of whether finger impression, iris, face or even your heartbeat \u2013 are more earnestly to take or phony than any cards.<\/span><strong><br><\/strong><\/p>\n<p><!-- \/wp:paragraph --><!-- wp:paragraph --><\/p>\n<p>Video Surveillance includes everything from guards on patrol, burglar alarms and CCTV to sound and movement sensors and keeping a log of who went where. At more high-risk locations, companies can deploy far more sophisticated detectors such as proximity, infrared, image, optical, temperature, smoke and pressure sensors to maintain a holistic view of their facilities.<\/p>\n<p>These are best practices that can be applied in all cases to guarantee a thorough physical security structure.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Physical security protects individuals, property, and assets from events that could cause harm, theft or perform malicious act. Just like cybersecurity, physical security is equally important &#8211; the developing technologies like artificial intelligence (AI) and the internet of things (IoT) are now more firmly associated, hence the security departments are required to align physical security [&hellip;]<\/p>","protected":false},"author":2,"featured_media":3865,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-3859","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Physical Security ? - IDZONE - Access Control System<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idzone.com.sa\/arabic\/what-is-physical-security\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Physical Security ? - IDZONE - Access Control System\" \/>\n<meta property=\"og:description\" content=\"Physical security protects individuals, property, and assets from events that could cause harm, theft or perform malicious act. Just like cybersecurity, physical security is equally important &#8211; the developing technologies like artificial intelligence (AI) and the internet of things (IoT) are now more firmly associated, hence the security departments are required to align physical security [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idzone.com.sa\/arabic\/what-is-physical-security\/\" \/>\n<meta property=\"og:site_name\" content=\"IDZONE - Access Control System\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-18T12:55:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-18T14:06:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/04\/istockphoto-541282164-612x612-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"434\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"IDZONE Systems\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"IDZONE Systems\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 \u062f\u0642\u0627\u0626\u0642\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/idzone.com.sa\/what-is-physical-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/idzone.com.sa\/what-is-physical-security\/\"},\"author\":{\"name\":\"IDZONE Systems\",\"@id\":\"https:\/\/idzone.com.sa\/#\/schema\/person\/031230d91dcda2bc172697046d2ba819\"},\"headline\":\"What is Physical Security ?\",\"datePublished\":\"2021-04-18T12:55:58+00:00\",\"dateModified\":\"2021-04-18T14:06:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/idzone.com.sa\/what-is-physical-security\/\"},\"wordCount\":366,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/idzone.com.sa\/#organization\"},\"image\":{\"@id\":\"https:\/\/idzone.com.sa\/what-is-physical-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/04\/istockphoto-541282164-612x612-1.jpg\",\"articleSection\":[\"Blogs\"],\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/idzone.com.sa\/what-is-physical-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/idzone.com.sa\/what-is-physical-security\/\",\"url\":\"https:\/\/idzone.com.sa\/what-is-physical-security\/\",\"name\":\"What is Physical Security ? - IDZONE - Access Control System\",\"isPartOf\":{\"@id\":\"https:\/\/idzone.com.sa\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/idzone.com.sa\/what-is-physical-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/idzone.com.sa\/what-is-physical-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/04\/istockphoto-541282164-612x612-1.jpg\",\"datePublished\":\"2021-04-18T12:55:58+00:00\",\"dateModified\":\"2021-04-18T14:06:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/idzone.com.sa\/what-is-physical-security\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/idzone.com.sa\/what-is-physical-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/idzone.com.sa\/what-is-physical-security\/#primaryimage\",\"url\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/04\/istockphoto-541282164-612x612-1.jpg\",\"contentUrl\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/04\/istockphoto-541282164-612x612-1.jpg\",\"width\":612,\"height\":434,\"caption\":\"Cybersecurity of network of connected devices and personal data security, concept on virtual interface with consultant in background\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/idzone.com.sa\/what-is-physical-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/idzone.com.sa\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Physical Security ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/idzone.com.sa\/#website\",\"url\":\"https:\/\/idzone.com.sa\/\",\"name\":\"IDZONE - Access Control System\",\"description\":\"IDZONE - Access Control System\",\"publisher\":{\"@id\":\"https:\/\/idzone.com.sa\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/idzone.com.sa\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/idzone.com.sa\/#organization\",\"name\":\"IDZONE\",\"url\":\"https:\/\/idzone.com.sa\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/idzone.com.sa\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2020\/10\/logo-1.png\",\"contentUrl\":\"https:\/\/idzone.com.sa\/wp-content\/uploads\/2020\/10\/logo-1.png\",\"width\":703,\"height\":301,\"caption\":\"IDZONE\"},\"image\":{\"@id\":\"https:\/\/idzone.com.sa\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/idzone.com.sa\/#\/schema\/person\/031230d91dcda2bc172697046d2ba819\",\"name\":\"IDZONE Systems\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/idzone.com.sa\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7f6f32b51f2f63b386f40fb254fc88593193dbb8168f035720e56bdd72dd249f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7f6f32b51f2f63b386f40fb254fc88593193dbb8168f035720e56bdd72dd249f?s=96&d=mm&r=g\",\"caption\":\"IDZONE Systems\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Physical Security ? - IDZONE - Access Control System","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idzone.com.sa\/arabic\/what-is-physical-security\/","og_locale":"ar_AR","og_type":"article","og_title":"What is Physical Security ? - IDZONE - Access Control System","og_description":"Physical security protects individuals, property, and assets from events that could cause harm, theft or perform malicious act. Just like cybersecurity, physical security is equally important &#8211; the developing technologies like artificial intelligence (AI) and the internet of things (IoT) are now more firmly associated, hence the security departments are required to align physical security [&hellip;]","og_url":"https:\/\/idzone.com.sa\/arabic\/what-is-physical-security\/","og_site_name":"IDZONE - Access Control System","article_published_time":"2021-04-18T12:55:58+00:00","article_modified_time":"2021-04-18T14:06:36+00:00","og_image":[{"width":612,"height":434,"url":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/04\/istockphoto-541282164-612x612-1.jpg","type":"image\/jpeg"}],"author":"IDZONE Systems","twitter_card":"summary_large_image","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"IDZONE Systems","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"3 \u062f\u0642\u0627\u0626\u0642"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idzone.com.sa\/what-is-physical-security\/#article","isPartOf":{"@id":"https:\/\/idzone.com.sa\/what-is-physical-security\/"},"author":{"name":"IDZONE Systems","@id":"https:\/\/idzone.com.sa\/#\/schema\/person\/031230d91dcda2bc172697046d2ba819"},"headline":"What is Physical Security ?","datePublished":"2021-04-18T12:55:58+00:00","dateModified":"2021-04-18T14:06:36+00:00","mainEntityOfPage":{"@id":"https:\/\/idzone.com.sa\/what-is-physical-security\/"},"wordCount":366,"commentCount":0,"publisher":{"@id":"https:\/\/idzone.com.sa\/#organization"},"image":{"@id":"https:\/\/idzone.com.sa\/what-is-physical-security\/#primaryimage"},"thumbnailUrl":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/04\/istockphoto-541282164-612x612-1.jpg","articleSection":["Blogs"],"inLanguage":"ar","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idzone.com.sa\/what-is-physical-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idzone.com.sa\/what-is-physical-security\/","url":"https:\/\/idzone.com.sa\/what-is-physical-security\/","name":"What is Physical Security ? - IDZONE - Access Control System","isPartOf":{"@id":"https:\/\/idzone.com.sa\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idzone.com.sa\/what-is-physical-security\/#primaryimage"},"image":{"@id":"https:\/\/idzone.com.sa\/what-is-physical-security\/#primaryimage"},"thumbnailUrl":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/04\/istockphoto-541282164-612x612-1.jpg","datePublished":"2021-04-18T12:55:58+00:00","dateModified":"2021-04-18T14:06:36+00:00","breadcrumb":{"@id":"https:\/\/idzone.com.sa\/what-is-physical-security\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idzone.com.sa\/what-is-physical-security\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/idzone.com.sa\/what-is-physical-security\/#primaryimage","url":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/04\/istockphoto-541282164-612x612-1.jpg","contentUrl":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/04\/istockphoto-541282164-612x612-1.jpg","width":612,"height":434,"caption":"Cybersecurity of network of connected devices and personal data security, concept on virtual interface with consultant in background"},{"@type":"BreadcrumbList","@id":"https:\/\/idzone.com.sa\/what-is-physical-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idzone.com.sa\/"},{"@type":"ListItem","position":2,"name":"What is Physical Security ?"}]},{"@type":"WebSite","@id":"https:\/\/idzone.com.sa\/#website","url":"https:\/\/idzone.com.sa\/","name":"IDZONE - Access Control System","description":"IDZONE - Access Control System","publisher":{"@id":"https:\/\/idzone.com.sa\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idzone.com.sa\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/idzone.com.sa\/#organization","name":"IDZONE","url":"https:\/\/idzone.com.sa\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/idzone.com.sa\/#\/schema\/logo\/image\/","url":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2020\/10\/logo-1.png","contentUrl":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2020\/10\/logo-1.png","width":703,"height":301,"caption":"IDZONE"},"image":{"@id":"https:\/\/idzone.com.sa\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/idzone.com.sa\/#\/schema\/person\/031230d91dcda2bc172697046d2ba819","name":"IDZONE Systems","image":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/idzone.com.sa\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7f6f32b51f2f63b386f40fb254fc88593193dbb8168f035720e56bdd72dd249f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7f6f32b51f2f63b386f40fb254fc88593193dbb8168f035720e56bdd72dd249f?s=96&d=mm&r=g","caption":"IDZONE Systems"}}]}},"_links":{"self":[{"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/posts\/3859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/comments?post=3859"}],"version-history":[{"count":0,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/posts\/3859\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/media\/3865"}],"wp:attachment":[{"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/media?parent=3859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/categories?post=3859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idzone.com.sa\/arabic\/wp-json\/wp\/v2\/tags?post=3859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}