Unlocking the Benefits

Unlocking the Benefits

Internet of Things solution promises greater connectively and organization insights

The Internet of Things (IoT) promises greater connectivity, which, when properly leveraged, can provide invaluable insight into our organizations and our operational environments. In the security sector, increased connectivity between sensors and systems gives us access to more data than we thought possible even just a few years ago.

We have long been able to connect an access control system (ACS) with a video management system. This integration is used to validate the authenticity of events against associated video. It is what allows security personnel to verify that a forced door event is not a false positive.

Today, we can also connect to a wide and diverse array of systems, including intercom, perimeter intrusion detection, gunshot detection, and automatic license plate recognition (ALPR). In addition to providing greater situational awareness, our increased connectivity also allows us to effectively automate decision-making and help guide personnel in their investigations. And we can do more.

Beyond security, access to more data gives us the opportunity to collaborate and create new ties with other teams, including operations, marketing, and human resources. By tapping into security infrastructure, these teams can use analytic tools to derive valuable insights from a wide variety of data to make improvements that can positively impact a business’s bottom line.

Retailers in brick and mortar stores, for example, now have access to real-time information on their customer’s experience. With this timely information, management and marketing teams are able to see how shoppers move through their environments, determine when and where people linger, which displays generate the most interest, and when check-out lines get too long. Working with this knowledge, they can implement changes in the store’s layout and displays as well as increase or decrease personnel on the floor to ensure that they are providing the best possible service. They can also work together to fine-tune the process and ensure that the right balance between safety, loss prevention, and customer service is being met.

While we continue to discover even more benefits of increased connectivity, it is clear that the IoT comes with its own specific set of challenges. The first is figuring out how to actually connect all our sensors and systems. Then, how do we keep from overwhelming people with too much data? Finally, how do we ensure that, as we add more devices, we don’t increase the vulnerability of our networks?

How to Work Well Together

The first challenge is how to connect systems and sensors over the IoT in a way that works. Making sense of all the data we’re collecting from the ever-increasing variety of sources can be a significant hurdle to unlocking insights. Simply hooking up new sensors or systems to an existing network does not mean that they will be able to communicate nor that the information they’re gathering can be understood in the same way.

To get an idea of what is involved, we can look at one of the most common IoT sensors being installed by DIY home automation enthusiasts: motion sensors. Adding a motion sensor to a network might seem like a simple task, but it requires a compatible hub, which can receive events when motion is detected. This hub must also be able to communicate with the lights that the home owner wishes to automate. Even when that integration is achieved, proper calibration of the sensor’s sensitivity is still required, a process involving extensive trial and error.

Given how time-consuming the process involving the installation of even one sensor can be, it is easy to see how complicated and costly it is to install the vast number of sensors collecting data in a modern corporate campus or building. Organizations at this level have the opportunity to collect data on everything from temperature and presence to lighting and door activity and are eager to do so.

This is why we need to work with open platforms that allow for true integration in order to facilitate data collaboration and achieve greater understanding, but this is easier said than done. Traditionally, we have kept information siloed. Sometimes this was done to prevent unauthorized access, and sometimes it happened simply because the systems collecting and storing data were not developed with interoperability in mind. Regardless of the reason, the result is that, more often than not, we are using different protocols to collect, store, and analyze our data.

When it comes to integration, there is a lot of heavy-lifting required to getting new sensors and devices to communicate and work together. It makes sense then that much of the lead on this is being taken by organizations in the security industry as we already have extensive experience connecting devices and unifying systems.

More Devices Shouldn’t Cause Headaches

The challenge of adding more sensors and devices to our networks goes beyond the integration process. When we add more data collecting devices to our networks, we run the risk of overwhelming security personnel with too many device or system interfaces. After all, we don’t want personnel to be jumping from one platform to another in order to gather all the information they need to respond to an evolving situation. In part, the simple fact of opening and closing applications increases the risk that something gets missed. However, we also add a layer of complexity when each application has its own interface and way of working. In high stress situations, the last thing any of us wants is for security staff to be negotiating with their system instead of focusing on the best way to respond.

Working with a single, unified platform means that personnel no longer have to jump from one interface to another and manage different vendor solutions at every turn. Instead, they can handle tasks in fewer steps in a consistent environment. With consolidated monitoring, reporting, and a map-centric approach to security management, a unified security system, like Security Center from Genetec, helps operators become more efficient, make better decisions, and respond to incidents more rapidly.

Focus on What is Important

When it comes to security, we like to say that there is no such thing as too much information, but this is only as true as our ability to manage it. Today’s security staff monitor thousands of network-connected devices, including video cameras, access control readers, intercom stations, fire alarm panels, intrusion devices, perimeter detection sensors, and analytics. All this information is streaming back to them over the network, and they must quickly decipher what’s happening and respond.

One of the risks we run with adding an ever-increasing number of sensors to our systems is that security personnel can be inundated with minor events, major alarms, and notifications. This in itself can be a security risk. For example, when an operator receives more alarms than they can respond to or a significant number of falsepositive alarms, their reaction can be to either ignore incoming alerts or turn off reporting.

Investing in a collaborative decision management system (CDMS) to automate workflows and guide security personnel through tasks and decisions can alleviate this burden. A CDMS, like Genetec Mission Control, provides security personnel with increased situational intelligence, visualization, and complete incident management capabilities. By ensuring a timely flow of information, it allows them to make better-informed decisions when faced with routine tasks or unanticipated situations.

A CDMS can also help organizations move beyond simple event and alarm management. Working in real-time, a CDMS automatically analyzes the data it collects and qualifies from different security systems as well as thousands of sensors and devices. This enables it to spot the most complex situations and incidents and determine whether or not security personnel should be sent to investigate potential threats. Once decided, the system can then guide security personnel in their responses following pre-defined processes and compliancy requirements.

Network Security is Everyone’s Responsibility

The last, and perhaps most far-reaching, challenge associated with our increased connectivity over the internet is cyber security. In order to leverage all the advantages of the IoT, we are essentially creating incredibly large networks with thousands of connected devices. Given that our systems are only ever as secure as their least secure element, even a single unprotected camera or door controller that still has its factory-set default password can be all the attack surface a cybercriminal needs to gain access to an organization’s network.

There are several ways to mitigate the risks of criminal cyber activity, including advanced encryption, authentication, and authorization. Encrypting data both in transmission and at rest protects private information and enhances the security of communication between client apps and servers. Authentication keeps data from getting into the wrong hands by preventing unauthorized access and authorization allows administrators to restrict the scope of activity within your system by providing access rights to groups or individuals for resources, data, or applications and by defining what users can do with these resources.

Given the substantial rewards for criminal cyber activity, including financial gain, access to valuable data, or system control, cyberattacks will continue to evolve. Organizations must not only protect themselves today, but must also lay the groundwork to continue to mitigate against the risk of future threats. As we continue to discover the myriad insights and advantages to be found in the IoT, protecting ourselves against criminal cyber activity will not only be good for business, it will also help foster a safer global community.

This article originally appeared in the January/February 2019 issue of Security Today.

Featured

  • Live from GSX 2024: Post-Show Recap

    Another great edition of GSX is in the books! We’d like to thank our great partners for this years event, NAPCO, LVT, Eagle Eye Networks and Hirsch, for working with us and allowing us to highlight some of the great solutions the companies were showcasing during the crowded show. Read Now

    • Industry Events
    • GSX
  • Research: Cybersecurity Success Hinges on Full Organizational Support

    Cybersecurity is the top technology priority for the vast majority of organizations, but moving from aspiration to reality requires a top-to-bottom commitment that many companies have yet to make, according to new research released today by CompTIA, the nonprofit association for the technology industry and workforce. Read Now

  • Live from GSX 2024: Day 3 Recap

    And GSX 2024 in Orlando, is officially in the books! I’d like to extend a hearty congratulations and a sincere thank-you to our partners in this year’s Live From program—NAPCO, Eagle Eye Networks, Hirsch, and LVT. Even though the show’s over, keep an eye on our GSX 2024 Live landing page for continued news and developments related to this year’s vast array of exhibitors and products. And if you’d like to learn more about our Live From program, please drop us a line—we’d love to work with you in Las Vegas at ISC West 2025. Read Now

    • Industry Events
    • GSX
  • Bringing New Goods to Market

    The 2024 version of GSX brought with it a race to outrun incoming hurricane Helene. With it’s eye on Orlando, it seems to have shifted and those security professionals still in Orlando now have a fighting chance to get out town. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3