Embracing the Internet of Things

Embracing the Internet of Things

Opportunities and implications for security and beyond

The machine-to-machine (M2M) movement. The Internet of Things (IoT). The Internet of Everything (IoE). Each term may have its subtle differences, but at their core, they all involve connected devices that share information to enhance their intelligence, capabilities and operation. However you refer to the phenomenon, the IoT is here to stay. It’s poised to generate far-reaching implications in the security space—from alarm monitoring to advanced, integration projects—while enhancing efficiencies and business intelligence.

The IoT combines operational technology (OT), devices in the field that capture data, with information technology (IT), back-end software systems that can do something with the data, to create actionable business intelligence and management capabilities. OT devices may include alarm sensors, cameras, readers, panels, environmental sensors and more. Such wired and wireless devices share information with one another and with applications in real time. Standards are being developed so that all a device requires is a communication pathway along with the ability to detect something and capture data.

Real-time data collected by OT devices can be vast and includes information related to alarm conditions, vehicle movement, video detection, doors status, environmental conditions and more. The devices can share this data and send it back to a central management location, likely via a cloud-based solution. From these systems, people can aggregate and analyze the data to identify trends, anomalies and deficiencies, so they can verify positive correlations and make real-time corrective actions as needed to improve their operations.

The IoT promises seemingly endless possibilities, and the security industry is ready to welcome a host of new IoT-enabled capabilities that, if managed well, can greatly enhance security and business operations. Let’s review how the IoT is impacting a variety of industries and how those applications are influencing IoT-related opportunities in the security world.

The IoT Everywhere

The potential of the IoT to drive organizational changes begins with data collection and sharing, and relies heavily on the sophisticated analysis of this data. The capturing of data is nothing new. Corporations have been collecting data—Big Data—from consumers, processes and operations for years. However, in the IoT space, organizations can capture a wider array of data from a wider variety of sources. By combining and purposefully manipulating those data points, organizations can discover deeper correlations and arrive at more intelligent conclusions about their operations. Such capabilities are emerging in a number of industries.

In the utilities market, the IoT is enabling more efficient data collection with smart meters that relay readings to cloud-based servers with no need for human involvement. This capability is leaps ahead of traditional house-to-house manual readings. Beyond providing readings for billing purposes, we can envision a day in which a water company can track realtime usage and historic patterns, and notify a property owner of a potential leak.

In the insurance arena, carriers are using IoT-enabled devices to glean information from consumers’ real-life habits to assess risk and promote safe driving. For example, Progressive’s Snapshot device plugs into a consumer’s vehicle and relays information to a cloud server. Tracking data related to miles driven, hard braking instances and time of day helps Progressive determine appropriate coverage rates. Consumers receive discounts for low-risk driving habits and can track their projected savings online.

For manufacturing operations, IoT-enabled devices can track pallets, containers and processes, informing operators where everything stands in real time. Careful analysis of this data can help organizations predict when a process may fail, identify when to perform proactive maintenance and enhance the visibility of processes throughout a plant on a granular level.

And, let’s not forget the consumer space where IoT applications abound, allowing us to track our exercise habits, set our thermostats from our smartphones and turn our lights on automatically when we arrive at home. One day consumers may use the IoT to control fully-automated homes from a single remote device.

The IoT in Security

If the IoT is all about more efficiently capturing data, understanding what that data means and taking actions to improve outcomes based on that data, then it is more than welcomed in the security space. It’s needed.

Security-related data from IoT-enabled devices may come from people scanning access badges, cameras tracking movements, alarms being activated, sensors monitoring temperature, mobile devices, wearables and vehicles. All of the devices capturing this information are now able to communicate with one another, and they’re able to capture granular information. Collecting, aggregating and analyzing this data can lead organizations to actions that help reduce costs, enhance efficiencies, provide new services and even glean business intelligence that extends far beyond security operations to include information technology, human resources, logistics and other business functions.

As an example of enhancing business intelligence, IoT-enabled devices can give retail loss prevention teams more information to detect, prevent and investigate issues. Connected devices also can serve dual purposes to maximize their value, such as surveillance cameras being used to inform marketing tactics by counting people and tracking heat maps to determine the effectiveness of in-store displays, while making real-time adjustments.

As the IoT security space continues to grow, companies are developing ways to enhance the capabilities of connected edge devices by connecting them to new software systems. The key to enabling these new devices is manufacturers, software companies and integrators providing open architecture systems based on application program interfaces (APIs).

APIs enable the expansion of a system’s capabilities by building customized solutions that leverage applications or services in the cloud as well as onsite. Doing so allows end users to create a more enterprise- focused model for their business that enables richer collaboration and more meaningful information gathering and sharing across departments, sites and organizations.

One example of an API-based system is Diebold’s SecureStat centralized Web-based security management system. It includes a Development Zone Portal in which customers and partners can create solutions with APIs to collect service, installation and monitoring history, access video, automate provisioning and manage security devices in the field. The portal includes documentation, sample code, instructions and an inventory of capabilities and services that organizations can use to create their own interfaces.

Brivo Labs and Eagle Eye Video also have embraced the API space. Brivo Labs offers cloud-based access and video solutions that users can tweak to fit their needs, and the company’s API platform allows developers to build apps that can unlock and lock doors, provision credentials and obtain data. Eagle Eye Video allows organizations to develop apps to automate recording, management and playback of video from any connected camera.

What the Future May Hold

Via low-cost and ubiquitous cellular and wireless transmission technology, the IoT is expanding the capabilities and “smartness” of edge devices, making them even more integral tools for enhancing security. Traditionally, edge devices had to communicate directly to an alarm panel, which relayed information to a receiver or monitoring center, often with some sort of human intervention or interpretation. As edge devices get smarter and communicate directly with one another, they can make decisions and take action on their own to drive efficiencies. To enable even more meaningful outcomes, operators can use a centralized dashboard to conduct targeted analyses on the data that edge devices collect to uncover direct, and sometimes hidden, correlations.

Today, we can envision a future in which the alarm panel as we know it has dramatically changed, replaced by intelligent wireless edge devices communicating directly with a cloud-based service. Via a Web-based interface, an organization can track the information edge devices capture and share it in real time, giving an organization more power than ever before to quickly make adjustments to improve operations. Leveraging software-as-a-service capabilities with APIs enables the organization to pick and choose solution sets to fit its needs, without building its own solutions from the ground up.

With the innovative IoT-related security solutions that are available today, this vision may soon become a reality. As such, the IoT is already empowering the next generation of security.

This article originally appeared in the December 2014 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3