Concept of Big Data Conquered at ASIS 2013

As day 2 of ASIS 2013 came to a close, I was excited to attend the after-show functions but a little sad that there was only one more day of this trade show. I have found that the people who make up the security industry as a whole are some of the friendliest, most down-to-earth people who genuinely care about others. In my opinion, this has been the "heart" of ASIS 2013.

Once again I spent the day strolling around the show room floor speaking with security executives and professionals, learning about new and exciting products as well as getting a feel for how the industry is changing. One of the key trends is that video surveillance is becoming "IT-centric."

"Data is no longer the ownership of just physical security," explained Olivier with Pivot3. "It now belongs to the overall operation of an organization."

For example, retail stores are collecting video surveillance data and analyzing it to enhance the customer experience. They can determine the demographics that are shopping in certain areas of the store for certain products and create more enticing product displays as a result of this data. This, of course, can lead to higher sales.

Jay Hauhn with Tyco IS explained that another key trend is learning how to actually use the data that's being recorded.

"The security industry has historically been about preventing bad things for happening, but this type of collected data is hard to put an ROI around. With the plethora of sensor-installed equipment, data is constantly being recorded, but then it just sits around. This data needs to be used."

All the collected nuggets of information can be used to implement overall operational improvement as well as provide security.

With all this recorded information, the Big Data movement is upon us, so I asked Hauhn about the elusive Cloud. A lot of feedback that I have received from people is that they are scared of the Cloud, but I think this is because they simply don't understand it. I think Hauhn did a great job of summing it up.

"The Cloud is as secure as it can be at that moment," said Hauhn. "It's important to constantly participate in due diligence of staying in front of any threats by finding the holes and patching them immediately."

In Hauhn's opinion, cloud operators are more conscious of keeping data safe than people who oversee the server on an organization's level.

Well, the final day of ASIS 2013 is here…sadly. I'm anxious to take my final stroll around the showroom floor within the "heart" of the security industry.

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Live From ISC West 2023: Day 1

    ISC West 2023 in Las Vegas, Nevada, has officially begun! Make sure to keep an eye on Security Today’s ISCW Live 2023 page, as well as our associated Twitter accounts—@SecurToday and @CampusSecur—for the latest updates from the show floor at the Venetian Expo. Read Now

    • Industry Events
    • ISC West
  • It Happened Again

    Just yesterday (as of this writing), it happened again. A 28-year-old woman shot her way into a Christian elementary school in Nashville, Tenn., on Monday and killed three children and three adults, according to national news. AP News reports that the victims were three 9-year-old children, a top school administrator, a substitute teacher, and a school custodian Read Now

  • Let's Get to Work

    You are standing at the conference center doors just waiting to get into the exhibit hall. I know you are because I’m standing next to you. This week at ISC West has been three years in the making. Last year was encouraging, and here we are waiting for the Big Show. Read Now

    • Industry Events
    • ISC West
  • Using Modern Technology

    Using Modern Technology

    Workplace violence is a serious and growing challenge for many organizations — including those in the healthcare industry. Read Now

Featured Cybersecurity

New Products

  • ALTO Neoxx Electronic Padlock

    ALTO Neoxx Electronic Padlock

    Built to withstand all access control needs, the tough new SALTO Neoxx electronic padlock takes security beyond your expectations. 3

  • PDK IO Access Control Software

    PDK.IO Access Control Software

    ProdataKey now allows for "custom fields" within the interface of its pdk.io software. Custom fields increase PDK's solutions' overall functionality by allowing administrators to include a wide range of pertinent data associated with each user. 3

  • LenelS2 BlueDiamond™ mobile app

    enelS2 has introduced its Indoor Location subscription-based service for businesses and other organizations using LenelS2’s BlueDiamond™ mobile app version 2.1.8 for smartphones. 3