Data-Driven Security

Just a few years ago, the big trends centered around generating sensor data and creating space to store that data. Today, technology trends like deep learning and generative AI are playing a tremendous role in creating insights out of data. We have big data lakes full of rich information, which, when used responsibly, can be mined and evaluated to uncover patterns, issues, and new uses that can lead to the development of innovative and valuable solutions.

Deep Learning & Generative AI
Right now, we’re trying to understand the tools and deep learning models that go along with data mining and tune them for the greater good of a range of different industries, including security and safety. As exciting as the possibilities are, there’s a need to proceed with caution since some new AI technologies are not perfect yet.

Take chatbots like ChatGPT. These intriguing software applications might be useful for jump-starting research and the creation of subject matter content. Caveats to consider carefully, however, include how effectively these apps have been “trained” and how accurate and trustworthy the information they generate is.

This became evident recently when a New York law firm hit a snag while citing several previous court cases to a judge to prove that there was precedent for putting their client’s personal injury lawsuit on the docket. When the other side informed the Court, they could not find several of the cases referenced in the plaintiff’s brief, the judge determined the cited judicial decisions were bogus. It turned out that, unbeknownst to the plaintiff’s attorney, one of his colleagues had used ChatGPT to do his research.

Of course, there are upsides to deep learning and generative AI. Machine learning, for example, is having a significant positive impact on applications for automated and robotic manufacturing.

Machine vision already uses intelligent cameras to help dramatically improve performance and quality, and robots and cameras don’t get tired or bored with repetitive, tedious inspections. That leaves far less room for error and creates new opportunities for talent to shift to more nuanced, rewarding tasks. Through analytics and deep learning, human operators can be alerted instantly when anomalies occur and respond more effectively.

Intelligent surveillance cameras, analytics, and data also feed into security applications where deep learning can help discern whether an intruder is breaching a perimeter or it’s just an animal passing by. This allows personnel to respond appropriately.

Transparency
Along with clarity about AI sourcing of information, people in our industry are demanding transparency about the materials and processes going into product development and manufacturing. The design, building, and security communities and their customers are more concerned than ever today about sustainability and reducing the impacts on human health. They want to know about product ingredients, recyclability, and how conscientiously products are being made.

As a result, they require transparency documentation, especially when it comes to green building certification projects like LEED, the Living Building Challenge, WELL, and Passive House, to name a few. Environmental Product Declarations (EPDs), Health Product Declarations (HPDs), Declare Labels, and other third-party verification programs provide key sustainability indicators, attributes, and information that specifiers look for, such as embodied carbon values, manufacturing location, recycled content, Red List Free designations, and more.

Along with sustainability is an increased focus on resilience. Climate change is being looked at as a key contributor to the increase in wildfires and the intensity of storms and flooding. There’s a greater need now for FEMA-rated storm shelters, fire- and water-resistive doors, and blast-resistant openings, particularly for buildings like chemical supply houses where an explosion could be possible.

Cybersecurity transparency is also critical. Organizations want to know how security data is going to be protected at rest and in flight, what tools are being used to secure the data, and whether those tools are standards based. It is now common for customers to ask if a product has been penetration tested by a third party for cybersecurity.

Putting the Plethora of Data to Best Use
The trend of integrating access control and other security data into proptech (property technology) and building management systems continues. Using data generated by all the sensors and devices allows us to make better real estate space decisions, improve efficiency and take security beyond security.

A smart office building, for example, can detect when a scheduled meeting in a conference room didn’t happen or ended early. If no one has badged in for a certain period, no motion is sensed in the room, all the lights are still on, and HVAC is running full bore, integrated access control and building management systems can work together to automatically turn off lights, close window shades, and latch doors to improve energy efficiency and security. Conversely, room scheduling data can activate HVAC to set just the right comfort level prior to a meeting.

Access control can also be integrated with employee management systems. Let’s say a forklift operator in a company’s warehouse or on the manufacturing floor has had too many accidents over a certain period. Data about those mishaps could trigger a need for the employee to undergo more safety training and temporarily restrict the person from using forklifts via lock out/tag out access control.

Ultimately, trends are driven by the evolving needs of customers. By seeking to understand the problems to be solved, we can use technology to help our customers achieve their objectives, enhance security, and improve efficiency.

This article originally appeared in the November / December 2023 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3