Security On The Fly

Mobile community shatters attendance records at worldwide security conference

How significant is the mobile application market around the world today? You just need to look at some of the numbers to understand how widespread mobile apps have become, even in the physical security market, and how adoption of mobile phones, tablets and other smart devices that are used with these apps has gone from leading-edge to commonplace.

At this year’s Mobile World Congress—the international trade event for people in the mobile communications industry—attendance records were shattered. More than 67,000 visitors from 205 countries attended the four-day event in Barcelona, Spain. Among those visitors, 3,500 were CEOs, and more than half of the attendees were C-level staff, attesting to the importance of the mobile-apps industry.

Some other numbers that support the growth and prominence of the app market come from current app download leader Apple, whose iPhone and iPad concepts helped spur the growth of the app market. The company has more than 500,000 apps available in the iTunes app store, and by the time you read this, the company will have achieved its 25-billionth download.

The road to mobile apps

So how did all of this happen? There are three major driving forces that brought us to where we are today, starting with the availability of advanced mobile networks.

When talking about advancements, industry experts speak in terms of first, second, third and now fourth generations of mobile telecommunications, or 1G through 4G. The first generation of standards was introduced in the 1980s. The radio signals that 1G networks used were analog, and they offered voice and very limited data services. In 1983, the first cellular phone was introduced—a clunky, boxy model called the Motorola DynaTac 8000x that sold for $3,995. The radio signals of second-generation standards were no longer analog but instead were digitally encrypted. Going all-digital opened the door for digital data services such as email and SMS text messages.

Since then, we’ve rapidly moved to 3G and 4G—the former bringing on broadband data and the latter providing high-speed broadband that enables streaming video and other capabilities that have transformed cellphones from portable devices to fully functioning communications, productivity and entertainment platforms. Coupled with the advancements and availability of mobile networks was the user interface revolution that transitioned us from text in the 1980s to graphical user interfaces in the 1990s to today’s ability to incorporate touchscreens, voice activation, GPS capability, built-in megapixel cameras and more.

Of course, none of this would matter if the adoption rate didn’t keep pace with the technological developments. Just last year, smartphone users surpassed users of other calling options. By 2015, it’s predicted that 84 percent of people will be smartphone owners and operators.

Analytics firm Flurry announced in June 2011 that the average person spends 81 minutes a day using his or her apps versus 74 minutes of traditional Web browsing on a desktop or laptop computer. Just a year earlier, the breakdown was 64 minutes on the Web versus just 44 minutes on apps. Looking at how that mobile-app time is spent, the majority is still focused on gaming and social networking; but, as businesses develop more apps to extend the reach and efficacy of their products, the numbers could change.

Security Gets on Board

Mobile technology is so prolific that even the security industry, notorious for its slowness to adopt new technology, has gotten on board.

And how are we seeing this come about? Within the physical security market, mobile apps can take security professionals into the field so they can make the best decisions possible based on real-time intelligence. This is a means to provide security on the go because mobile apps and the devices they are used on create an always-on, connected environment.

No longer tied solely to the command center and the computer screen, mobile apps allow for remote monitoring and forensic investigation at the site or hundreds of miles away.

Consider this real-life example: Casually working around the house, a man is surprised when he receives an alert on his iPhone showing him live video of someone breaking into his downtown office. Integrated with his DVR, he had installed the mobile app for his customer demos, never really thinking he would have a reallife opportunity to put it to the ultimate test.

But there it was: video showing a man breaking through the front door of his office and stealing valuable equipment. He opened up the remote streaming video and provided the 911 dispatch play-by-play information on where and what the thief was up to, including when he walked out of the building and the make, model and color of the vehicle. His account was so accurate that by the time he was drivingto the office, he passed the police on the side of the road where they had pulled over the suspect.

With the truck full of stolen equipment and the video footage, the police certainly had ample evidence to prosecute and convict the thief.

Leaders within the security industry have begun to develop apps such as this that extend the capabilities of existing security products, whether it is video management software or access control systems. Through the use of an app, security officers or business owners can remotely monitor video; control PTZ cameras with standard pinch-and-zoom gestures; display multiple, simultaneous video streams; search for and play back video; and even email a snapshot from a video and send it to someone else—all while on the go.

On the intrusion side, there are now apps that allow homeowners to receive, view and acknowledge alarms; check on door status; unlock doors; and put lights and locks on a schedule.

With home automation systems, there is the capability, via mobile apps, to arm and disarm security systems, control HVAC systems, view live and recorded video and automate the arming schedule for access control.

In developing apps for the security industry, the goal is not to replicate the standard desktop experience or to replace it. Rather, it’s about making sure the interface and user experience will have added value.

The traditional command center isn’t at risk; but, because of budget constraints and advancements in technology, the ability to do more with less is enhanced as security officers are able to head into the field armed with devices and apps that can broaden their capabilities. Mobile devices, even with their expanded bandwidth and processing power, wouldn’t be able to do everything that a complex, PC-based security system can do. Rather, end users are seeking apps that can take key functionality into the field.

As mobile devices and apps proliferate, there is some concern about how to best protect information. After all, while having security capabilities on a phone provides convenience and 24/7 access, it also brings the risk of having this information fall into the wrong hands. End users want to be safe about the transmission of data and what could be shared via a mobile device. Not being sure of the security of the information can be a roadblock to implementation.

Developers of these mobile apps are making sure secure credentials are in place and users can access the information only through authentication processes such as secure user names and passwords.

Those concerned about their personal privacy as they download apps for business or personal use can be assured that the greater global community of developers, device makers, OS companies, mobile operators and others have developed guidelines to ensure their privacy. These app guidelines were announced at the recent Mobile World Congress.

Beyond Security

In examining the trends related to apps and security, another key one is the ability to use security-oriented apps for non-security purposes. A retailer, for example, that already has surveillance cameras in place can now use a mobile app that allows security officers to monitor those cameras and access the video.

In addition, the same cameras and video, accessed via the app, can be used to monitor in real time business operations and employee behavior, including watching for instances of internal theft. A mobile app can provide a live view of a stockroom, warehouse or shipping dock to keep track of inventory or to confirm a shipment or order received. If there is a false alarm, security or someone else within the company has the ability to respond instantly and react appropriately. This retailer also can evaluate staffing needs by viewing checkout or drive-thru lanes to determine how full the parking lot is and the flow of customers in and out of the store.

In the transportation sector, security officers using mobile apps tied to video management systems can view checkpoint closures and terminal evacuations and can monitor terminals, stations and roadways for suspicious persons and activities.

Manufacturers may want to use these security-developed apps so they can better monitor product creation and movement on conveyor systems, or when products are being transported within a warehouse.

Everything from attendance management to workflows can be monitored via these apps that were developed first for security purposes. This type of crossover usage is becoming more common, as noted in a Frost & Sullivan report that points out that 25 percent of users deploy security systems in a non-security setting.

What the Future Holds

So what are the next steps in the mobileapp world? Certainly one of the leading challenges for companies wanting to create apps for their customers is seeing what operating system will emerge as the leader. Although the Apple iOS has gotten out of the gate quickly in the apps market because of the popularity of iPhones and iPads, it is predicted that by 2015 Android will have 49 percent of the market share and that it will continue to grow.

For developers, the challenge is to create apps on platforms that hit their customer base. And there is the realization that this could be a moving target. Developers will continue to monitor the situation and develop apps that suit their needs and those of their end users. Currently, the focus is on Apple iOS and Android rather than the antiquated BlackBerry platform.

Another area that will impact future apps includes near-field communication— a standard whereby smartphones in close proximity to or touching each other can carry out a transaction or exchange data. Mobile devices in general will continue to build on their functionality with improved video and GPS capabilities.

The ability to read QR codes via a smartphone may not directly enhance security capabilities, but it can provide information to end users that will be helpful in the setup and maintenance of equipment by allowing them to access data sheets or installation manuals through a QR app.

Even advancements in multi-core mobile processors are allowing for longer battery life, reduced power usage and faster multitasking.

Finally, developers are continuing to explore the means whereby a single app can be used to bring multiple, independent systems into a single platform, such as connecting video monitoring, event management, access control and the like. This combination of functionalities will provide a great value-add for the end user.

And adding value is what apps are all about, especially now as they continue to roll out into the marketplace. The capabilities they provide are meant to enhance existing products, not replace them, and to open up users to a new world of possibilities.

This article originally appeared in the May 2012 issue of Security Today.

Featured

  • The Key to Wellbeing in the Office

    A few years ago, all we saw in the news was the ‘great resignation.’ Now we have another ‘great’ to deal with. According to CBRE, 2023 was the start of the ‘great return’ as office workers returned to their normal offices after working from home. The data shows that two-thirds of all U.S office buildings were more than 90% leased as of Q2 2023. Read Now

  • Failed Cybersecurity Controls Costing U.S. Businesses $30 Billion Yearly

    Panaseer recently released ControlWatch and the Continuous Controls Battle: Panaseer 2025 Security Leaders Report examining the cost of cybersecurity control failures and the impact of growing personal liability for security failings on security leaders. The report analyzes the findings of a survey of 400 security decision makers (SDMs) across the US and UK. It shows that security leaders feel under increasing pressure to provide assurances around cybersecurity, exposing them to greater personal risk – yet many lack the data and resources to accurately report and close cybersecurity gaps. Read Now

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3