Data-Driven Security

Just a few years ago, the big trends centered around generating sensor data and creating space to store that data. Today, technology trends like deep learning and generative AI are playing a tremendous role in creating insights out of data. We have big data lakes full of rich information, which, when used responsibly, can be mined and evaluated to uncover patterns, issues, and new uses that can lead to the development of innovative and valuable solutions.

Deep Learning & Generative AI
Right now, we’re trying to understand the tools and deep learning models that go along with data mining and tune them for the greater good of a range of different industries, including security and safety. As exciting as the possibilities are, there’s a need to proceed with caution since some new AI technologies are not perfect yet.

Take chatbots like ChatGPT. These intriguing software applications might be useful for jump-starting research and the creation of subject matter content. Caveats to consider carefully, however, include how effectively these apps have been “trained” and how accurate and trustworthy the information they generate is.

This became evident recently when a New York law firm hit a snag while citing several previous court cases to a judge to prove that there was precedent for putting their client’s personal injury lawsuit on the docket. When the other side informed the Court, they could not find several of the cases referenced in the plaintiff’s brief, the judge determined the cited judicial decisions were bogus. It turned out that, unbeknownst to the plaintiff’s attorney, one of his colleagues had used ChatGPT to do his research.

Of course, there are upsides to deep learning and generative AI. Machine learning, for example, is having a significant positive impact on applications for automated and robotic manufacturing.

Machine vision already uses intelligent cameras to help dramatically improve performance and quality, and robots and cameras don’t get tired or bored with repetitive, tedious inspections. That leaves far less room for error and creates new opportunities for talent to shift to more nuanced, rewarding tasks. Through analytics and deep learning, human operators can be alerted instantly when anomalies occur and respond more effectively.

Intelligent surveillance cameras, analytics, and data also feed into security applications where deep learning can help discern whether an intruder is breaching a perimeter or it’s just an animal passing by. This allows personnel to respond appropriately.

Transparency
Along with clarity about AI sourcing of information, people in our industry are demanding transparency about the materials and processes going into product development and manufacturing. The design, building, and security communities and their customers are more concerned than ever today about sustainability and reducing the impacts on human health. They want to know about product ingredients, recyclability, and how conscientiously products are being made.

As a result, they require transparency documentation, especially when it comes to green building certification projects like LEED, the Living Building Challenge, WELL, and Passive House, to name a few. Environmental Product Declarations (EPDs), Health Product Declarations (HPDs), Declare Labels, and other third-party verification programs provide key sustainability indicators, attributes, and information that specifiers look for, such as embodied carbon values, manufacturing location, recycled content, Red List Free designations, and more.

Along with sustainability is an increased focus on resilience. Climate change is being looked at as a key contributor to the increase in wildfires and the intensity of storms and flooding. There’s a greater need now for FEMA-rated storm shelters, fire- and water-resistive doors, and blast-resistant openings, particularly for buildings like chemical supply houses where an explosion could be possible.

Cybersecurity transparency is also critical. Organizations want to know how security data is going to be protected at rest and in flight, what tools are being used to secure the data, and whether those tools are standards based. It is now common for customers to ask if a product has been penetration tested by a third party for cybersecurity.

Putting the Plethora of Data to Best Use
The trend of integrating access control and other security data into proptech (property technology) and building management systems continues. Using data generated by all the sensors and devices allows us to make better real estate space decisions, improve efficiency and take security beyond security.

A smart office building, for example, can detect when a scheduled meeting in a conference room didn’t happen or ended early. If no one has badged in for a certain period, no motion is sensed in the room, all the lights are still on, and HVAC is running full bore, integrated access control and building management systems can work together to automatically turn off lights, close window shades, and latch doors to improve energy efficiency and security. Conversely, room scheduling data can activate HVAC to set just the right comfort level prior to a meeting.

Access control can also be integrated with employee management systems. Let’s say a forklift operator in a company’s warehouse or on the manufacturing floor has had too many accidents over a certain period. Data about those mishaps could trigger a need for the employee to undergo more safety training and temporarily restrict the person from using forklifts via lock out/tag out access control.

Ultimately, trends are driven by the evolving needs of customers. By seeking to understand the problems to be solved, we can use technology to help our customers achieve their objectives, enhance security, and improve efficiency.

This article originally appeared in the November / December 2023 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Cloud and Hybrid Adoption on the Rise

    The physical security industry is experiencing a time of great transformation. Cloud connectivity is accelerating, and more organizations are choosing to blend on-premises and cloud-based solutions. This transformation is affecting all aspects of security, including access control. In the Genetec annual State of Physical Security Survey, it was access control that topped the list of new technologies end-users planned to focus on in 2024. Read Now

  • Texas City Replaces Locks on Intelligent Traffic Cabinets With More Secure Option

    The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic Cabinets with a better and more secure choice. Turns out what they needed was only a few miles away with ALCEA’s Traffic Cabinet Locking Solution powered by ABLOY technology. Read Now

  • New Report Says Vulnerability Exploitation Boom Threatens Cybersecurity

    Verizon Business recently released the findings of its 17th-annual Data Breach Investigations Report (DBIR), which analyzed a record-high 30,458 security incidents and 10,626 confirmed breaches in 2023—a two-fold increase over 2022. Read Now

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3