Security On The Fly

Mobile community shatters attendance records at worldwide security conference

How significant is the mobile application market around the world today? You just need to look at some of the numbers to understand how widespread mobile apps have become, even in the physical security market, and how adoption of mobile phones, tablets and other smart devices that are used with these apps has gone from leading-edge to commonplace.

At this year’s Mobile World Congress—the international trade event for people in the mobile communications industry—attendance records were shattered. More than 67,000 visitors from 205 countries attended the four-day event in Barcelona, Spain. Among those visitors, 3,500 were CEOs, and more than half of the attendees were C-level staff, attesting to the importance of the mobile-apps industry.

Some other numbers that support the growth and prominence of the app market come from current app download leader Apple, whose iPhone and iPad concepts helped spur the growth of the app market. The company has more than 500,000 apps available in the iTunes app store, and by the time you read this, the company will have achieved its 25-billionth download.

The road to mobile apps

So how did all of this happen? There are three major driving forces that brought us to where we are today, starting with the availability of advanced mobile networks.

When talking about advancements, industry experts speak in terms of first, second, third and now fourth generations of mobile telecommunications, or 1G through 4G. The first generation of standards was introduced in the 1980s. The radio signals that 1G networks used were analog, and they offered voice and very limited data services. In 1983, the first cellular phone was introduced—a clunky, boxy model called the Motorola DynaTac 8000x that sold for $3,995. The radio signals of second-generation standards were no longer analog but instead were digitally encrypted. Going all-digital opened the door for digital data services such as email and SMS text messages.

Since then, we’ve rapidly moved to 3G and 4G—the former bringing on broadband data and the latter providing high-speed broadband that enables streaming video and other capabilities that have transformed cellphones from portable devices to fully functioning communications, productivity and entertainment platforms. Coupled with the advancements and availability of mobile networks was the user interface revolution that transitioned us from text in the 1980s to graphical user interfaces in the 1990s to today’s ability to incorporate touchscreens, voice activation, GPS capability, built-in megapixel cameras and more.

Of course, none of this would matter if the adoption rate didn’t keep pace with the technological developments. Just last year, smartphone users surpassed users of other calling options. By 2015, it’s predicted that 84 percent of people will be smartphone owners and operators.

Analytics firm Flurry announced in June 2011 that the average person spends 81 minutes a day using his or her apps versus 74 minutes of traditional Web browsing on a desktop or laptop computer. Just a year earlier, the breakdown was 64 minutes on the Web versus just 44 minutes on apps. Looking at how that mobile-app time is spent, the majority is still focused on gaming and social networking; but, as businesses develop more apps to extend the reach and efficacy of their products, the numbers could change.

Security Gets on Board

Mobile technology is so prolific that even the security industry, notorious for its slowness to adopt new technology, has gotten on board.

And how are we seeing this come about? Within the physical security market, mobile apps can take security professionals into the field so they can make the best decisions possible based on real-time intelligence. This is a means to provide security on the go because mobile apps and the devices they are used on create an always-on, connected environment.

No longer tied solely to the command center and the computer screen, mobile apps allow for remote monitoring and forensic investigation at the site or hundreds of miles away.

Consider this real-life example: Casually working around the house, a man is surprised when he receives an alert on his iPhone showing him live video of someone breaking into his downtown office. Integrated with his DVR, he had installed the mobile app for his customer demos, never really thinking he would have a reallife opportunity to put it to the ultimate test.

But there it was: video showing a man breaking through the front door of his office and stealing valuable equipment. He opened up the remote streaming video and provided the 911 dispatch play-by-play information on where and what the thief was up to, including when he walked out of the building and the make, model and color of the vehicle. His account was so accurate that by the time he was drivingto the office, he passed the police on the side of the road where they had pulled over the suspect.

With the truck full of stolen equipment and the video footage, the police certainly had ample evidence to prosecute and convict the thief.

Leaders within the security industry have begun to develop apps such as this that extend the capabilities of existing security products, whether it is video management software or access control systems. Through the use of an app, security officers or business owners can remotely monitor video; control PTZ cameras with standard pinch-and-zoom gestures; display multiple, simultaneous video streams; search for and play back video; and even email a snapshot from a video and send it to someone else—all while on the go.

On the intrusion side, there are now apps that allow homeowners to receive, view and acknowledge alarms; check on door status; unlock doors; and put lights and locks on a schedule.

With home automation systems, there is the capability, via mobile apps, to arm and disarm security systems, control HVAC systems, view live and recorded video and automate the arming schedule for access control.

In developing apps for the security industry, the goal is not to replicate the standard desktop experience or to replace it. Rather, it’s about making sure the interface and user experience will have added value.

The traditional command center isn’t at risk; but, because of budget constraints and advancements in technology, the ability to do more with less is enhanced as security officers are able to head into the field armed with devices and apps that can broaden their capabilities. Mobile devices, even with their expanded bandwidth and processing power, wouldn’t be able to do everything that a complex, PC-based security system can do. Rather, end users are seeking apps that can take key functionality into the field.

As mobile devices and apps proliferate, there is some concern about how to best protect information. After all, while having security capabilities on a phone provides convenience and 24/7 access, it also brings the risk of having this information fall into the wrong hands. End users want to be safe about the transmission of data and what could be shared via a mobile device. Not being sure of the security of the information can be a roadblock to implementation.

Developers of these mobile apps are making sure secure credentials are in place and users can access the information only through authentication processes such as secure user names and passwords.

Those concerned about their personal privacy as they download apps for business or personal use can be assured that the greater global community of developers, device makers, OS companies, mobile operators and others have developed guidelines to ensure their privacy. These app guidelines were announced at the recent Mobile World Congress.

Beyond Security

In examining the trends related to apps and security, another key one is the ability to use security-oriented apps for non-security purposes. A retailer, for example, that already has surveillance cameras in place can now use a mobile app that allows security officers to monitor those cameras and access the video.

In addition, the same cameras and video, accessed via the app, can be used to monitor in real time business operations and employee behavior, including watching for instances of internal theft. A mobile app can provide a live view of a stockroom, warehouse or shipping dock to keep track of inventory or to confirm a shipment or order received. If there is a false alarm, security or someone else within the company has the ability to respond instantly and react appropriately. This retailer also can evaluate staffing needs by viewing checkout or drive-thru lanes to determine how full the parking lot is and the flow of customers in and out of the store.

In the transportation sector, security officers using mobile apps tied to video management systems can view checkpoint closures and terminal evacuations and can monitor terminals, stations and roadways for suspicious persons and activities.

Manufacturers may want to use these security-developed apps so they can better monitor product creation and movement on conveyor systems, or when products are being transported within a warehouse.

Everything from attendance management to workflows can be monitored via these apps that were developed first for security purposes. This type of crossover usage is becoming more common, as noted in a Frost & Sullivan report that points out that 25 percent of users deploy security systems in a non-security setting.

What the Future Holds

So what are the next steps in the mobileapp world? Certainly one of the leading challenges for companies wanting to create apps for their customers is seeing what operating system will emerge as the leader. Although the Apple iOS has gotten out of the gate quickly in the apps market because of the popularity of iPhones and iPads, it is predicted that by 2015 Android will have 49 percent of the market share and that it will continue to grow.

For developers, the challenge is to create apps on platforms that hit their customer base. And there is the realization that this could be a moving target. Developers will continue to monitor the situation and develop apps that suit their needs and those of their end users. Currently, the focus is on Apple iOS and Android rather than the antiquated BlackBerry platform.

Another area that will impact future apps includes near-field communication— a standard whereby smartphones in close proximity to or touching each other can carry out a transaction or exchange data. Mobile devices in general will continue to build on their functionality with improved video and GPS capabilities.

The ability to read QR codes via a smartphone may not directly enhance security capabilities, but it can provide information to end users that will be helpful in the setup and maintenance of equipment by allowing them to access data sheets or installation manuals through a QR app.

Even advancements in multi-core mobile processors are allowing for longer battery life, reduced power usage and faster multitasking.

Finally, developers are continuing to explore the means whereby a single app can be used to bring multiple, independent systems into a single platform, such as connecting video monitoring, event management, access control and the like. This combination of functionalities will provide a great value-add for the end user.

And adding value is what apps are all about, especially now as they continue to roll out into the marketplace. The capabilities they provide are meant to enhance existing products, not replace them, and to open up users to a new world of possibilities.

This article originally appeared in the May 2012 issue of Security Today.


  • Report: Physical Security Market Turning to Cloud and Hybrid Solutions

    Genetec, a provider of unified security, public safety, operations, and business intelligence solutions, today shared the results of its 2024 State of Physical Security report. Based on insights from over 5,500 physical security leaders worldwide (including end users and channel partners), the report looks at the security strategies organizations are putting in place to effectively navigate the realities of a changing industry. Read Now

  • A Future in the Clouds

    The cloud has become a pervasive term in everyone’s daily work and personal lives – from the explosion of content available on Internet streaming services to remote learning to social interactions. Everyone is living cloud-based lives. Read Now

  • A Rapidly Changing Realm

    Many retail operators continue to face a daily balancing act of maintaining both an online and in-person presence. The coronavirus pandemic accelerated our adoption of online shopping, and the expectation now is that every retailer needs to be proficient in both arenas. This places a heightened emphasis on secure operations that ensure a seamless experience for the customer no matter where they pull out their credit card. Read Now

  • Secure Your Home During the Holidays

    The most wonderful time of the year can easily transform into a nightmare. Being vigilant, while still enjoying the holiday season, is possible. The holiday season is the perfect time to start implementing security measures to protect one’s home and ensure security while out and about. Read Now

Featured Cybersecurity

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3