Confronting Evolving Challenges

Confronting Evolving Challenges

Confronting Evolving ChallengesSignificant financial challenges continue to confront the world’s major economies, increasing the issues they face in addressing new and evolving threats to critical national infrastructure (CNI). Persistent threats of physical and data terrorism, theft and extreme weather events, have all served to concentrate the minds of those responsible for protecting critical assets.

The services upon which societies rely – among them banking, energy, transportation, water supply, agriculture and telecommunications – have become targets of adversaries working in ever more sophisticated ways. The need to take action is clearer than ever, but so are the budgetary limitations facing many.

In unveiling its vision for protecting the United States until 2016, the Office of Infrastructure Protection said its focus was to “apply and promote innovative and leading-edge programs and activities that cost-effectively manage and enhance the resilience of the nation’s critical infrastructure.” The US is not alone in its bid to blend innovation with cost-efficiency; it is a global mission.

Fortunately, evolving security technologies and enhanced surveillance integration capabilities mean that protecting people, property and data within a strict budget is entirely feasible.

Protect the Whole by Addressing the Parts

Of primary concern, when considering the holistic notion of protecting critical national infrastructure is the necessity for so many disparate entities – many of them privately owned, others aligned to the public sector - to present a united front against potential threats including:

  • Terrorism: The primary concern for national security agencies is the prevention and detection of terrorist attacks. The protection of data centers in particular is of increasing concern.
  • Environmental: Natural disasters linked to concerns about climate change are placing new emphasis on measures designed to protect citizens, national infrastructure and economies.
  • Theft: Incidents of metal theft, partly in response to rising commodity prices, illustrate the extent to which critical national infrastructure is at risk from theft, with transport and energy supply infrastructure bearing the brunt of acts of theft and vandalism.

Confronting Evolving ChallengesBut, how can this ‘united front’ ever be the case while the individual organizations that make up a country’s critical national infrastructure remain disjointed in their own approach to security?

Perimeter security, intruder detection systems, access control, ANPR, emergency incident alarms and general site surveillance – they are all used by organizations critical to our daily lives, but they are traditionally disparate elements that have been specified and implemented in isolation, and which are managed independently of each other. The net result is financial and security inefficiency.

Monitoring disparate systems independently takes time. It also limits potential information capture because information received is siloed and therefore not presented in the broader context of other events. A more integrated approach is required and now, it’s an approach more critical national infrastructure organizations are taking.

Greater Integration Means Increased Potential

Individual organizations operating within the CNI sector want to be cost-effective as well as take vital steps forward towards a more unified approach. For these organizations, connecting their own disparate security elements via an integrated surveillance monitoring and control platform is proving an increasingly popular option.

Open protocol. Today’s open protocol integrated security solutions mean that CCTV, intruder alarms, fire detection, access control, critical asset tracking and building management systems can not only communicate with each other, but can also be monitored and controlled on a centralized command and control platform, from one location. Integration of this level doesn’t just help deliver coherent and comprehensive security monitoring, it also facilitates effective and appropriate security action.

Breaches or critical impact scenarios. As well as detecting and alerting operators to threats, accompanied by live visual/audio feed – today’s high end surveillance systems can also be programmed to ‘look for’ complex breach or critical impact scenarios (data sets which individually may not mean anything but together signify threat) and respond accordingly. For example, a data center may have scheduled maintenance work, or a power distribution hub may be due to move a series of cable drums on site – nothing unusual in these facts in isolation. But, pair either of these scenarios with unusual/unauthorised staff ID movements or data downloads out of usual sequence, and the situation changes. An integrated system can be set to detect such data combinations, alert CCTV operators by streaming live footage from cameras in the ‘breach zones’ and launch a series of reactive protocols that guide operators though appropriate ‘next steps’ such as immediate area/perimeter lockdown or ID card cancellation. This doesn’t just guarantee response - it also guarantees response consistency, which for multi-site estates can be invaluable from both an efficiency and safety perspective.

Local emergency responders. Similarly, a system can be programmed to immediately alert local emergency responders should certain data sets be captured, ensuring that the right level of on-site assistance – say in the case of a protestor attack or a fire – is in place as quickly as possible.

Offsite responders. Video, audio, PIR activations and other alarm inputs, from any number of locations, can be easily streamed directly to offsite operators, ensuring any incident triggers appropriate visual and, if needed, audio data that enables immediate reaction to potential or actual threat.

These benefits don’t just apply to onsite control. Crucially for CNI organizations, which often have responsibility for managing multi-site estates spanning broad geographic areas – frequently incorporating unmanned assets, the integration capabilities outlined and benefits afforded by a ‘one platform’ approach to security monitoring and control make remote asset protection a practical solution.

A Challenge to be Met

Globally, the protection of critical national infrastructure has never been more important or more challenging. While the specifics may vary from nation to nation, the themes remain constant. It comes down to protecting the people, property and data that make our daily lives possible, all within the boundaries and constraints set by the current economic climate. And that means it’s about greater efficiency.

Unifying security operations through a single platform is a trend that is set to continue. The approach saves time, resources and ultimately makes levels of threat detection possible that simply weren’t achievable previously. CNI organizations are recognizing this fact and taking advantage of the latest trends in integrated surveillance monitoring and control to achieve security goals and streamline operations.

About the Author

Karen Churchill is sales manager at Synectic Systems Group Ltd.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3