Integrated Security Technologies, Inc.

Integrated Security Technologies, Inc. Integrated Security Technologies, Inc. is a Virginia-based corporation founded in 1997 as a full-service systems integrator. VA DCJS 11-5536 Founded by Alexander Oppenhimer, Jon Langhorst, Michael Margolis, Michael Ruddo, TC Chang and Robert Carson

Operating as usual

Timeline Photos
10/22/2021

Timeline Photos

Timeline Photos
10/20/2021

Timeline Photos

Timeline Photos
10/18/2021

Timeline Photos

Timeline Photos
09/11/2021

Timeline Photos

08/18/2021

IBM reported that the cost of data breaches rose 10% from 2020 to 2021, largely due to organizations’ inability to secure remote workers and data. Healthcare organizations bore the brunt, with the average breach costing $9.2 million, up $2 million from 2020.

In one of the most challenging years ever, IST continued to grow, placing 16 in the SDM Top Systems Integrator Report 20...
07/19/2021

In one of the most challenging years ever, IST continued to grow, placing 16 in the SDM Top Systems Integrator Report 2021, up from 19 in 2020. We want to thank our customers for continuing to put their trust in IST to protect their people, property and data.

In one of the most challenging years ever, IST continued to grow, placing 16 in the SDM Top Systems Integrator Report 2021, up from 19 in 2020. We want to thank our customers for continuing to put their trust in IST to protect their people, property and data.

Remembering our heroes today and always. Wishing you all a very safe and happy Memorial Day.
05/31/2021

Remembering our heroes today and always. Wishing you all a very safe and happy Memorial Day.

Remembering our heroes today and always. Wishing you all a very safe and happy Memorial Day.

Synthetic identities is currently the fastest-growing fraud trend, piecing together legitimate data like social security...
05/27/2021
Frankenstein Fraud: How Synthetic Identities Became the Fastest-Growing Fraud Trend

Synthetic identities is currently the fastest-growing fraud trend, piecing together legitimate data like social security numbers and birth dates to create fake identities. They’re difficult to detect but there are some emerging solutions.

Synthetic identity fraud is the fastest-growing fraud trend in the United States, due in part to the blending of real and fake information to create identities that are difficult for financial firms to detect.

Organizations must move quickly to identify and prevent attacks as early as possible. Here are some “Do's and Don’ts” fo...
05/26/2021
Rethinking cybersecurity in the age of COVID: The Dos and Don'ts of protection

Organizations must move quickly to identify and prevent attacks as early as possible. Here are some “Do's and Don’ts” for post-COVID cybersecurity, such as, don’t rely on detection alone, and do rethink your approach to security.

Today’s threat actors are constantly on the move. And COVID-19 has created even more opportunities for them, as emergency digital investments broaden the corporate attack surface. The FBI recorded a 300% increase in reported cybercrimes in the first month of the pandemic. It’s perhaps no surpris...

A recent study by Malwarebytes explores how cybercriminals changed behavior in response to the pandemic, moving from old...
05/24/2021
Cybercriminals exploited pandemic with shift to targeted, sophisticated attacks

A recent study by Malwarebytes explores how cybercriminals changed behavior in response to the pandemic, moving from old tactics to a new emphasis on intelligence gathering and social engineering to launch sophisticated, targeted attacks.

Malwarebytes, a provider of advanced endpoint protection and remediation solutions, announced the findings of its annual “State of Malware” report. The latest report explores how the global pandemic forced many employees to quickly become a remote workforce and confined consumers to their homes....

As it turns out, recurring monthly revenue isn’t just a good idea for security integrators. It also leads to better secu...
05/20/2021
Roundtable: RMR

As it turns out, recurring monthly revenue isn’t just a good idea for security integrators. It also leads to better security outcomes for customers. IST’s VP of Strategy, Mike Ruddo, explains in this roundtable discussion with SecurityInfoWatch.com.

Three veteran integrators peel the onion on recurring revenue, examining every aspect of its benefits to a successful business model in this exclusive Security Business magazine roundtable

Sustainability isn’t a big buzzword in the security industry. But it turns out that you can be secure and green without ...
05/19/2021
Green Practices in Access Control

Sustainability isn’t a big buzzword in the security industry. But it turns out that you can be secure and green without extra expense. Security technology manufacturers are using more sustainable materials in their products as a good business practice, not a way to add cost.

IF YOU WERE TO ASK A SECURITY PROFESSIONAL what words come to mind with the phrase access control, terms like door solutions, readers and credentials would be a few of the likely responses. There’s one phrase, however, that they probably won’t say: sustainability.

“Cloud” was a 4-letter word for security professionals just 3 years ago. But for video surveillance systems, the cloud i...
05/18/2021
Transforming Security -- Security Today

“Cloud” was a 4-letter word for security professionals just 3 years ago. But for video surveillance systems, the cloud is opening opportunities for security departments to collect and analyze data to improve safety, security and operations, among other benefits.

Just three years ago, the “cloud” was a four-letter word in the security industry. After fronting millions of dollars to establish onpremises systems, companies were understandably reluctant to rip them apart for a new approach.

Most universities are opening this fall and many are looking for access control solutions that handle both security and ...
05/17/2021
Touchless access control solutions look to alter the landscape of higher education

Most universities are opening this fall and many are looking for access control solutions that handle both security and health concerns. Touchless access control may fit the bill by dramatically reducing the number of common touch points while also providing secure access.

The headlines in state newspapers around the country tell the story of the impact COVID-19 is having on higher education campuses. Within the last two months, institutions including the University of West Virginia, the University of Missouri, Kings College, Michigan State, University of Chicago, Pri...

Newer technologies like frictionless access control, touchless and mobile credentials, and touchless intercoms give coll...
05/14/2021
4 Ways to Utilize Touchless Access Control Solutions on College Campuses

Newer technologies like frictionless access control, touchless and mobile credentials, and touchless intercoms give college campuses more options to minimize touchpoints to improve both safety and security without impeding the flow of traffic.

Touchless access control solutions can support a safe and healthy environment, as well as a more user-friendly and intuitive experience.

The best efforts to secure network endpoints have been bypassed by clever attackers. The next defense: microsegmentation...
05/13/2021
Getting Into the Cyber-Securing Zone: Segmentation as Cyber Strategy

The best efforts to secure network endpoints have been bypassed by clever attackers. The next defense: microsegmentation of networks, which promises to enable a consistent, proactive defense against advanced cyberthreats.

Deep partitioning is emerging as a viable method to better isolate public and private network access. Get a macro perspective of how microsegmentation can bring stronger cybersecurity to corporate infrastructures, datacenters and more.

On a clear day, you can see the next big thing: AI. Unfortunately, the horizon is a bit cloudy. ASIS is teaming with SAS...
05/12/2021
Sunshine Through the Clouds: AI and the Security Professional

On a clear day, you can see the next big thing: AI. Unfortunately, the horizon is a bit cloudy. ASIS is teaming with SASC to help security professionals better understand AI, how it can be useful in security, and what to look out for.

Security professionals must have an understanding of AI and the implications it poses for their operations. The ASIS Security and Applied Sciences Community is here to help.

Pre-pandemic, many visitor management procedures were under scrutiny. In planning back-to-work efforts, visitor manageme...
05/10/2021
Running the Gauntlet -- Security Today

Pre-pandemic, many visitor management procedures were under scrutiny. In planning back-to-work efforts, visitor management will be the front line for mitigating health risks.

Not long ago when visiting a colleague’s office, it was protocol to arrive early to run the gauntlet of the visitor management check-in that awaited, a process that might gladly be endured now if just for a brief return to some normalcy.

A recent physical security survey revealed that 70% of participants regard tailgating at secured entrances as a serious ...
05/06/2021
Driving COVID Adaptations -- Security Today

A recent physical security survey revealed that 70% of participants regard tailgating at secured entrances as a serious breach. This article discusses design and technology considerations for lobbies and entrances to reduce traffic congestion and enable social distancing.

Our recent physical security survey clearly revealed a challenging nexus between security and safety that has only been exacerbated by the continued onslaught of the coronavirus pandemic.

Many of today’s high-tech access control systems rely on buttons, touchscreens and other touch-enabled technologies. Thi...
05/05/2021
The process of future-proofing a secured entrance post-pandemic

Many of today’s high-tech access control systems rely on buttons, touchscreens and other touch-enabled technologies. This article discusses the security benefits of touchless access control as a way to future proof secured entrances post-pandemic.

Building owners, property and facility managers, and architects are now entering year two of the coronavirus pandemic and the lingering realities of health and safety protocols intended to reduce virus transmission. For business and organizational administrators and executives, the three main focus....

Cyberattacks happen. Having the right security systems in place is a good start. But you also need a bulletproof plan in...
05/04/2021
Be prepared for the first 24 hours of a cyberattack

Cyberattacks happen. Having the right security systems in place is a good start. But you also need a bulletproof plan in the event of a breach. The first 24 hours are critical and you need to move quickly to limit damage.

We’ve all heard the warnings, “it’s not a matter of IF you’ll suffer a cyberattack, it’s WHEN.” Yet according to one study, more than 77% of organizations have no incident response plan. Hard to believe when you consider that attacks can cost businesses millions of dollars. What’s wors...

Museums and cultural sites are reopening. Do earlier approaches to risk management work in the current environment? This...
05/03/2021
Risk Assessment Approaches for the Reopening of Cultural and Heritage Venues

Museums and cultural sites are reopening. Do earlier approaches to risk management work in the current environment? This interview with security expert Andy Davis overviews how risk management has changed and the processes and technologies that can help address new realities.

Most museums and heritage sites were forced to close during 2020 in response to COVID-19-related lockdowns. Here’s what should be top-of-mind as they reopen.

Some access control methods are more environmentally friendly than others. “Green” access control is now being built int...
04/30/2021
Green Practices in Access Control

Some access control methods are more environmentally friendly than others. “Green” access control is now being built into products without adding to the cost. And being green can reduce power consumption and save money.

IF YOU WERE TO ASK A SECURITY PROFESSIONAL what words come to mind with the phrase access control, terms like door solutions, readers and credentials would be a few of the likely responses. There’s one phrase, however, that they probably won’t say: sustainability.

A recent consumer survey reports that passwords no longer rank among the top three authentication methods that consumers...
04/29/2021
Survey: Passwords No Longer Perceived as Most Secure Method for Authentication

A recent consumer survey reports that passwords no longer rank among the top three authentication methods that consumers now prefer. Newer methods are more convenient and more secure.

Experian's Fraud Report sees passwords miss out on a spot in the top three most secure methods for authenticating a customer’s identity for the first time in four years.

IST's Michael Ruddo recently sat down with securityinfowatch.com for an industry roundtable on recurring monthly revenue...
04/28/2021
Roundtable: RMR

IST's Michael Ruddo recently sat down with securityinfowatch.com for an industry roundtable on recurring monthly revenue (RMR) for systems integrators. Ruddo says that RMR isn’t an add-on but a way of doing business that leads to better security outcomes for customers.

Three veteran integrators peel the onion on recurring revenue, examining every aspect of its benefits to a successful business model in this exclusive Security Business magazine roundtable

When the lockdowns started, there was a big scramble to enable remote access for employees working from home. Now that t...
04/28/2021
Work Safe: Top priorities for securing remote workers

When the lockdowns started, there was a big scramble to enable remote access for employees working from home. Now that the dust has settled a bit, it’s time to ensure that your remote workers have secure access to company computer systems.

The global pandemic has certainly changed things. Before the pandemic, working from home was rare. Today, commuting to an office is the exception rather than the rule. While the percentage of those working remotely will likely drop over time, it’s estimated that about a quarter of the workforce wi...

Olymbec, a large property management company, is investing in security infrastructure because it's good for business. Re...
04/19/2021
Improving Rentability -- Security Today

Olymbec, a large property management company, is investing in security infrastructure because it's good for business. Renters like security amenities and Olymbec gets a leg up on common security threats that nearly all property management companies face.

Olymbec is the largest, privately owned industrial real estate holder on the East Coast. Managing upwards of 300 properties in Quebec and 15 different States in the US, they own more than 30 million square feet of property.

Most industries have standards to ensure products from different manufacturers work together. The security industry is n...
04/16/2021
Why Better Cybersecurity Standards Mean Better Security

Most industries have standards to ensure products from different manufacturers work together. The security industry is no different ... until you consider the IoT. Read more about the lack of cybersecurity standards for IoT and what this means for you.

Explore the dearth of cyber standards in the industry, progress being made, recommendations for next steps and more.

A well-rounded security policy includes a disaster recovery (DR) plan. You can simplify the process by outsourcing DR th...
04/15/2021
Disaster Recovery as a Service: What is it and do you need it?

A well-rounded security policy includes a disaster recovery (DR) plan. You can simplify the process by outsourcing DR through disaster recovery as a service (DRaaS), which comes with a ready-made cloud-based infrastructure and a low monthly fee.

Disaster recovery as a service can potentially save organizations money and resources while ensuring they’re prepared for an incident that could potentially put them out of business. But what is DraaS, how can it be implemented at your organization and what are the benefits?

As cyber attacks increase, security teams need more vigilance around monitoring and managing identity. Modern and evolvi...
04/14/2021
Identity and securing the remote work perimeter

As cyber attacks increase, security teams need more vigilance around monitoring and managing identity. Modern and evolving threats are best prevented by securing identity through many layers relying on a zero-trust model.

The sudden shift to remote work exposed the limitations of traditional, domain-based security. The castle-and-moat security approach is obsolete, having given way to a kitchen-table-and-home-office norm. Employees are accessing IT resources—distributed across on-premises servers and private and pu...

Post-pandemic cyber attacks are up, and K-12 schools are a target. The K-12 Cybersecurity Resource Center and the K12 Se...
04/13/2021
Cyberattacks on Schools Spiked in 2020 Due to COVID-19 Pandemic

Post-pandemic cyber attacks are up, and K-12 schools are a target. The K-12 Cybersecurity Resource Center and the K12 Security Information Exchange just released a comprehensive report on current threats to school systems, including ways to mitigate threats.

The pandemic “offered a profound stress test of the resiliency and security of the K-12 educational technology ecosystem,” a new report finds.

Most people have learned about AI through TV and movies, so expectations are really high. But in reality, most of what w...
04/12/2021
Learn to Walk Before Running -- Security Today

Most people have learned about AI through TV and movies, so expectations are really high. But in reality, most of what we know about the effectiveness of AI is speculation. While there’s a big future for AI in security, for now, it’s best to focus on what it’s actually good at.

Today’s analytics are not only better able to differentiate between true security incidents and false alarms, but can be programmed to trigger when a given event occurs.

In a crisis, communication is crucial. But many companies still rely on paper-based call-tree lists to get the word out ...
04/08/2021
Efficient Communication is Crucial in a Crisis

In a crisis, communication is crucial. But many companies still rely on paper-based call-tree lists to get the word out by phone. This article advocates for emergency mass notification systems, which automates crisis notifications through various formats, media and platforms.

In a crisis, clear and efficient communication is crucial because you cannot make effective decisions about the steps to take without a full picture of what is going on.

The shift to working from home means that employees may be using company-issued devices for personal activities, which o...
04/07/2021
Adjusting Security Awareness for Remote Work Hygiene

The shift to working from home means that employees may be using company-issued devices for personal activities, which opens possibilities for new lines of attack. Educating employees on good hygiene for remote work is one way to get ahead of the problem.

As the lines between work and leisure time become increasingly blurred and employees use company-issued devices and resources for personal use—such as social media, online shopping, and even telehealth—the potential for cyberattacks is ever present.

Address

520 Herndon Pkwy Ste C
Herndon, VA
20170

Opening Hours

Monday 9am - 5pm
Tuesday 9am - 5pm
Wednesday 9am - 5pm
Thursday 9am - 5pm
Friday 9am - 5pm

Telephone

(703) 464-0042

Alerts

Be the first to know and let us send you an email when Integrated Security Technologies, Inc. posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Integrated Security Technologies, Inc.:

Category

Nearby contractors


Other Contractors in Herndon

Show All

Comments

On behalf of my military and veteran service organization, United Soldiers and Sailors of America - Usasoa , please accept our sincere gratitude for assisting us in providing hot meals to the Guardsmen, Airmen and Soldiers deployed to our nation's Capital.
Many thanks to everyone who was involved in making the holiday party such a great experience last night. Donald and I have a great time seeing old friends and making new ones every year. Thanks for all you did.