Implementing a Data-centric Approach

Reducing costs is as equally important goal in operating an enterprise

A company is much more complex than an IT department or a number of buildings. It is always evolving and adding more servers, buildings and systems, and therefore, obtaining more risk, costs and threats. As COOs look at the multitude of objectives across an organization, they need to evaluate how to increase profits, manage risk, or provide a cost-effective route for improving processes, managing incidents, or securely operating an enterprise.

To manage risk, organizations must manage people and the systems they utilize. Using a dashboard to manage system intelligence will identify behaviors, reduce costs and mitigate risk. How does an organization accomplish this? How can security managers and CLevel executives understand how applying a data-centric approach can eliminate data silos, combat convergence of IT/OT and reduce the multitude of risks an organization faces?

First, an organization must determine the types of data to collect to help protect business and mitigate risk. To best protect assets, people and infrastructure, it’s best to collect access control, video, visitor management, case management, burglar/fire, BMS and IT data. Companies normally collect much of this type of data, but don’t use it to make good business decisions. Analyzing the data to centrally manage business will help organizations become more efficient.

Once the data is collected, organizations must:

  • Eliminate silos and analyze data simultaneously
  • Centrally manage the data
  • Improve efficiencies based on new information learned

Organizations must use this information to not only operationalize their business to improve processes and meet compliance, but to best protect their people, property, and assets. Streamlining all data into one dashboard using a data-centric approach will narrow the gap between physical and cyber security and help predict behavior and patterns.

Key Issues with Collecting Data

Interconnectivity. Most of the systems and sensors do not talk to one another and have different device standards.

Information Overload. A typical dashboard can only show so much information and the human brain can only assimilate and sort through so many inputs at one time.

Large and unstructured data streams pose challenges; Hard to understand and recognize patterns in the data. Some of which can be overwhelming in volume and unstructured.

Turning data into intelligence requires a combination of elements. Within a security framework, using a deliberate posture and roadmap to understand the interacting systems and use cases is key to driving better outcomes. Ultimately, the key systems need to lie within the overall security apparatus.

Case Study, Digital Realty

Digital Realty supports the data center, colocation and interconnection strategies of more than 2,300 firms across its secure, network-rich portfolio of data centers located throughout North America, Europe, Asia and Australia. Digital Realty’s clients include companies all over the world, of all sizes, ranging from financial services, cloud and information technology services, to manufacturing, energy, gaming, life sciences and consumer products. By implementing a data centric approach, they were able to streamline operations, while offering a more consistent, qualitative and cost effective solution to their customers across their portfolio of data centers.

Here are some key results:

  • Implementing a self-service visitor process decreased the risk associated with manual access assignment, reducing man hours by 60 percent.
  • Reviewing the combined visitor and alarm activity periods, provided an opportunity for an 18 percent annual reduction on guard service requirements.
  • System growth translated to 24 percent increase in support services. Digital Realty used data to validate the anticipated increase in workload.
  • Excessive alarms resulted in response complacency. The data collected justified changing Design Engineering Guidelines and operating procedures. Now responses to actual events are consistent, providing a more secure environment and streamlined operation.

Adopting a data-centric approach helps organizations reduce costs, mitigate risk and meet compliance. Customers can reduce costs by operationalizing existing security infrastructure on a global scale, reduce manual processes that are labor intensive, repetitive and error prone, and future proof investment by enabling new technology.

Organizations can mitigate risk by standardizing their security processes, and ensuring the right people, places and authorizations are in place.

Implementing a data-centric approach will help companies meet government, organizational and industry regulations. They can monitor infractions and enforce security policies and rules, while creating automated reports and audit security procedures.

This article originally appeared in the August 2017 issue of Security Today.

Featured

  • Keynote Speakers Announced for ISC West 2025

    ISC West, hosted in collaboration with premier sponsor the Security Industry Association (SIA), unveiled its 2025 Keynote Series. Featuring a powerhouse lineup of experts in cybersecurity, retail security, and leadership, each keynote will offer invaluable insights into the challenges and opportunities transforming the field of security. Read Now

    • Industry Events
    • ISC West
  • Study: Video Doorbells Have a 71% Service Attach Rate

    Parks Associates recently announced a new white paper, Consumer IoT Product Development: Managing Costs, Optimizing Revenues, which provides companies with a business-planning blueprint to evaluate how a consumer IoT solution will perform across its lifetime. Subscription services, such as video storage and professional monitoring, can be critical for covering ongoing cloud and support costs Read Now

  • Michigan City Fights Retail Crime With AI-Powered Video Surveillance, 911 Camera Sharing

    To combat persistent retail crime and deliver peace of mind to workers in the bustling North Leroy Street business district, the City of Fenton Police Department has deployed a new AI-powered video surveillance system with camera-sharing technology to accelerate response time during retail heists or other emergencies. Read Now

  • TSA Intercepts 6,678 Firearms at Airport Security Checkpoints in 2024

    During 2024, the Transportation Security Administration (TSA) intercepted a total of 6,678 firearms at airport security checkpoints, preventing them from getting into the secure areas of the airport and onboard aircraft. Approximately 94% of these firearms were loaded. This total is a minor decrease from the 6,737 firearms stopped in 2023. Throughout 2024, TSA managed its “Prepare, Pack, Declare” public awareness campaign to explain the steps for safely traveling with a firearm. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3