Addressing Innovation

Incorporating the right technology can provide the perfect solutions

Technology alone does not drive true innovation. Choosing the right technology, then properly adapting and utilizing it, gets you on the path to true innovation. I’m talking about new technology that can be brought into the electronic physical security industry. I believe that by incorporating the right technology, manufacturers can provide solutions to customers that improve productivity and reduce life cycle costs. That is the essence of innovation. For example, a company develops a native browser interface rather than offering proprietary software that includes a web client! Both methods provide browser access, but the first allows full utilization of the customer’s IT infrastructure, while the latter simply introduces proprietary software and added cost to the environment.

Entrepreneurs drive the passion for innovation. Today, more so than the past 10 years, there are many new innovative companies entering the market. I attribute this to three main factors, 1) the ever increasing amount of information technology that aids the spark of innovation… and there is a lot out there, 2) the increased flux of M&A activity the past 6 years has rendered many original innovators (not just engineering) to flee back to environments that are customer focused, and 3) the economic meltdown caused many companies to dismiss A-level players who have since sought out startup/ innovative environments for their new career paths.

Physical Access Control Systems (PACS) – Food For Thought

After many years of observation, I must say that VARS/customers are better served by purchasing products that are originally developed by companies who develop to their core competencies. Specifically, I conclude that access control companies do not know how to develop best-of-breed video management products and vice versa. Interoperability and collaboration should be the chosen path.

The desire for simplicity is a consistent plea from integrators and customers. The desires are not just technical, but also marketing/sales related. In some cases, dealer sales people are forced to present dozens upon dozens of options to the customer. Such complexity adds many hidden costs and potentially renders mistakes in product selection. A simple solution is to offer more inclusive packages. I’m happy to see a few companies in our market heading this way. Although little known to the electronic physical security market, the IT based product Splunk (used to index all events throughout an enterprise into a cohesive dashboard for forensic and real-time assessment) illustrates how buying can be simplified. They have two options; free (limited use) and Enterprise (fully enabled).

One of the most important new trends in the PACS market is the adoption of open source technology delivered on a network appliance or as a virtual machine. The Linux operating system is rapidly being adopted across the globe and it is widely known to include better system stability than other operating systems, as well as better virus, trojan, adware and spyware protection, lower operating costs, and its source acquisition cost is essentially $0. However, if you require the customer to supply/maintain Linux, the cost goes up dramatically. For example, there were several Unix/Linux access control systems in the market in earlier years of which none are marketed today. But by bundling the PACS as a fully pre-integrated server/operating system/database in the form of a network appliance, customers can solely concentrate on the configuration or personalization of information in their system (door names, response instructions, etc.). The costs associated with buying PCs for servers and clients, and/or licenses/upgrades for Microsoft Windows, and/or licenses for the RDBMS like Oracle or Microsoft SQL Server can be consolidated and lowered through this innovative approach. Further, in this type of solution, the PACS product is accessed through a web browser like Mozilla Firefox, Apple Safari, or Microsoft Internet Explorer. This eliminates the life-cycle costs of fat client licenses to serve the same functions. In certain cases, these new products are being optimized to enable native resiliency capabilities like appliance-to-appliance data replication, which can be accomplished through using an LDAP compliant data storage mechanism in the PACS architecture.

As we in the PACS community become citizens of the network, strong security must not be overlooked. As a security component, nobody wants to see a break in the chain though PACS! Stakeholders really need to consider two main elements in regards to the matter of IT security. First, just as IT suppliers (like Cisco) have included “security hardening” guides with their products, the same should hold true for PACS and other network component providers. Second, due-diligence must be performed on PACS’ underpinning architecture – OS, DB, and Web Services among other parts. One must look at the risks associated with each and the countermeasures and costs.

Note that IP is only a small portion of IT. I get the sense that some manufacturers are confused. IP (abbreviation for TCP/IP) is simply a small portion of the Information Technology world, yet some people interchange the terms. Let’s get it right.

On the subject of IP, look at the field hardware in the market that’s enabled with TCP/IP, yet the RS-485 protocol is unchanged and does not take full advantage of medium. Essentially, Ethernet/TCP/IP has just become the new serial port for the PACS industry. We as an industry must do more.

While it’s hard for me to even conceive, there are manufacturers still preaching proprietary hardware/software! And just wait, by summer you will see a few more companies launch a proprietary field hardware line. To be clear, the customer must buy the field hardware (controllers, reader modules, input boards, and output boards) from the manufacturer and they can’t salvage it to use with a different head system. We just finished an analysis project and determined that the entire investment for all components beyond the head end in a typical PACS deployment range from 50% to 90% of the spend, and the controllers and related components made up 50% of that segment. Why would anyone put such substantial amounts of capital at risk when they have viable options to avoid that risk?

We are experiencing a very exciting time. The last decade was the decade of consolidation and M&A. We are now in the decade of IT enlightenment and progressive innovation. With all of those innovators out there we are sure to see many changes come to pass within a short amount of time.

This article originally appeared in the issue of .

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3