Concept of Big Data Conquered at ASIS 2013

As day 2 of ASIS 2013 came to a close, I was excited to attend the after-show functions but a little sad that there was only one more day of this trade show. I have found that the people who make up the security industry as a whole are some of the friendliest, most down-to-earth people who genuinely care about others. In my opinion, this has been the "heart" of ASIS 2013.

Once again I spent the day strolling around the show room floor speaking with security executives and professionals, learning about new and exciting products as well as getting a feel for how the industry is changing. One of the key trends is that video surveillance is becoming "IT-centric."

"Data is no longer the ownership of just physical security," explained Olivier with Pivot3. "It now belongs to the overall operation of an organization."

For example, retail stores are collecting video surveillance data and analyzing it to enhance the customer experience. They can determine the demographics that are shopping in certain areas of the store for certain products and create more enticing product displays as a result of this data. This, of course, can lead to higher sales.

Jay Hauhn with Tyco IS explained that another key trend is learning how to actually use the data that's being recorded.

"The security industry has historically been about preventing bad things for happening, but this type of collected data is hard to put an ROI around. With the plethora of sensor-installed equipment, data is constantly being recorded, but then it just sits around. This data needs to be used."

All the collected nuggets of information can be used to implement overall operational improvement as well as provide security.

With all this recorded information, the Big Data movement is upon us, so I asked Hauhn about the elusive Cloud. A lot of feedback that I have received from people is that they are scared of the Cloud, but I think this is because they simply don't understand it. I think Hauhn did a great job of summing it up.

"The Cloud is as secure as it can be at that moment," said Hauhn. "It's important to constantly participate in due diligence of staying in front of any threats by finding the holes and patching them immediately."

In Hauhn's opinion, cloud operators are more conscious of keeping data safe than people who oversee the server on an organization's level.

Well, the final day of ASIS 2013 is here…sadly. I'm anxious to take my final stroll around the showroom floor within the "heart" of the security industry.

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Teaching AI New Tricks

    You have probably heard that AI-enabled security cameras are evolving the role of traditional surveillance cameras, shifting the focus from passive monitoring to active problem-solving and operational insights. AI technology changes fast, so what is new can be considered only news in just a few months. Read Now

  • From the Most Visible to the Less Apparent

    The Cybersecurity and Infrastructure Security Agency (CISA) states “There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, and national public health or safety or any combination thereof.” Read Now

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.