Concept of Big Data Conquered at ASIS 2013

As day 2 of ASIS 2013 came to a close, I was excited to attend the after-show functions but a little sad that there was only one more day of this trade show. I have found that the people who make up the security industry as a whole are some of the friendliest, most down-to-earth people who genuinely care about others. In my opinion, this has been the "heart" of ASIS 2013.

Once again I spent the day strolling around the show room floor speaking with security executives and professionals, learning about new and exciting products as well as getting a feel for how the industry is changing. One of the key trends is that video surveillance is becoming "IT-centric."

"Data is no longer the ownership of just physical security," explained Olivier with Pivot3. "It now belongs to the overall operation of an organization."

For example, retail stores are collecting video surveillance data and analyzing it to enhance the customer experience. They can determine the demographics that are shopping in certain areas of the store for certain products and create more enticing product displays as a result of this data. This, of course, can lead to higher sales.

Jay Hauhn with Tyco IS explained that another key trend is learning how to actually use the data that's being recorded.

"The security industry has historically been about preventing bad things for happening, but this type of collected data is hard to put an ROI around. With the plethora of sensor-installed equipment, data is constantly being recorded, but then it just sits around. This data needs to be used."

All the collected nuggets of information can be used to implement overall operational improvement as well as provide security.

With all this recorded information, the Big Data movement is upon us, so I asked Hauhn about the elusive Cloud. A lot of feedback that I have received from people is that they are scared of the Cloud, but I think this is because they simply don't understand it. I think Hauhn did a great job of summing it up.

"The Cloud is as secure as it can be at that moment," said Hauhn. "It's important to constantly participate in due diligence of staying in front of any threats by finding the holes and patching them immediately."

In Hauhn's opinion, cloud operators are more conscious of keeping data safe than people who oversee the server on an organization's level.

Well, the final day of ASIS 2013 is here…sadly. I'm anxious to take my final stroll around the showroom floor within the "heart" of the security industry.

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Making the Grade with Locks and Door Hardware

    Managing and maintaining locks and door hardware across a school district or university campus is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Knowing the basics of common door hardware, including locks, panic devices and door closers, can make a difference in daily operations and emergency situations. Read Now

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3