Embracing the Internet of Things

Embracing the Internet of Things

Opportunities and implications for security and beyond

The machine-to-machine (M2M) movement. The Internet of Things (IoT). The Internet of Everything (IoE). Each term may have its subtle differences, but at their core, they all involve connected devices that share information to enhance their intelligence, capabilities and operation. However you refer to the phenomenon, the IoT is here to stay. It’s poised to generate far-reaching implications in the security space—from alarm monitoring to advanced, integration projects—while enhancing efficiencies and business intelligence.

The IoT combines operational technology (OT), devices in the field that capture data, with information technology (IT), back-end software systems that can do something with the data, to create actionable business intelligence and management capabilities. OT devices may include alarm sensors, cameras, readers, panels, environmental sensors and more. Such wired and wireless devices share information with one another and with applications in real time. Standards are being developed so that all a device requires is a communication pathway along with the ability to detect something and capture data.

Real-time data collected by OT devices can be vast and includes information related to alarm conditions, vehicle movement, video detection, doors status, environmental conditions and more. The devices can share this data and send it back to a central management location, likely via a cloud-based solution. From these systems, people can aggregate and analyze the data to identify trends, anomalies and deficiencies, so they can verify positive correlations and make real-time corrective actions as needed to improve their operations.

The IoT promises seemingly endless possibilities, and the security industry is ready to welcome a host of new IoT-enabled capabilities that, if managed well, can greatly enhance security and business operations. Let’s review how the IoT is impacting a variety of industries and how those applications are influencing IoT-related opportunities in the security world.

The IoT Everywhere

The potential of the IoT to drive organizational changes begins with data collection and sharing, and relies heavily on the sophisticated analysis of this data. The capturing of data is nothing new. Corporations have been collecting data—Big Data—from consumers, processes and operations for years. However, in the IoT space, organizations can capture a wider array of data from a wider variety of sources. By combining and purposefully manipulating those data points, organizations can discover deeper correlations and arrive at more intelligent conclusions about their operations. Such capabilities are emerging in a number of industries.

In the utilities market, the IoT is enabling more efficient data collection with smart meters that relay readings to cloud-based servers with no need for human involvement. This capability is leaps ahead of traditional house-to-house manual readings. Beyond providing readings for billing purposes, we can envision a day in which a water company can track realtime usage and historic patterns, and notify a property owner of a potential leak.

In the insurance arena, carriers are using IoT-enabled devices to glean information from consumers’ real-life habits to assess risk and promote safe driving. For example, Progressive’s Snapshot device plugs into a consumer’s vehicle and relays information to a cloud server. Tracking data related to miles driven, hard braking instances and time of day helps Progressive determine appropriate coverage rates. Consumers receive discounts for low-risk driving habits and can track their projected savings online.

For manufacturing operations, IoT-enabled devices can track pallets, containers and processes, informing operators where everything stands in real time. Careful analysis of this data can help organizations predict when a process may fail, identify when to perform proactive maintenance and enhance the visibility of processes throughout a plant on a granular level.

And, let’s not forget the consumer space where IoT applications abound, allowing us to track our exercise habits, set our thermostats from our smartphones and turn our lights on automatically when we arrive at home. One day consumers may use the IoT to control fully-automated homes from a single remote device.

The IoT in Security

If the IoT is all about more efficiently capturing data, understanding what that data means and taking actions to improve outcomes based on that data, then it is more than welcomed in the security space. It’s needed.

Security-related data from IoT-enabled devices may come from people scanning access badges, cameras tracking movements, alarms being activated, sensors monitoring temperature, mobile devices, wearables and vehicles. All of the devices capturing this information are now able to communicate with one another, and they’re able to capture granular information. Collecting, aggregating and analyzing this data can lead organizations to actions that help reduce costs, enhance efficiencies, provide new services and even glean business intelligence that extends far beyond security operations to include information technology, human resources, logistics and other business functions.

As an example of enhancing business intelligence, IoT-enabled devices can give retail loss prevention teams more information to detect, prevent and investigate issues. Connected devices also can serve dual purposes to maximize their value, such as surveillance cameras being used to inform marketing tactics by counting people and tracking heat maps to determine the effectiveness of in-store displays, while making real-time adjustments.

As the IoT security space continues to grow, companies are developing ways to enhance the capabilities of connected edge devices by connecting them to new software systems. The key to enabling these new devices is manufacturers, software companies and integrators providing open architecture systems based on application program interfaces (APIs).

APIs enable the expansion of a system’s capabilities by building customized solutions that leverage applications or services in the cloud as well as onsite. Doing so allows end users to create a more enterprise- focused model for their business that enables richer collaboration and more meaningful information gathering and sharing across departments, sites and organizations.

One example of an API-based system is Diebold’s SecureStat centralized Web-based security management system. It includes a Development Zone Portal in which customers and partners can create solutions with APIs to collect service, installation and monitoring history, access video, automate provisioning and manage security devices in the field. The portal includes documentation, sample code, instructions and an inventory of capabilities and services that organizations can use to create their own interfaces.

Brivo Labs and Eagle Eye Video also have embraced the API space. Brivo Labs offers cloud-based access and video solutions that users can tweak to fit their needs, and the company’s API platform allows developers to build apps that can unlock and lock doors, provision credentials and obtain data. Eagle Eye Video allows organizations to develop apps to automate recording, management and playback of video from any connected camera.

What the Future May Hold

Via low-cost and ubiquitous cellular and wireless transmission technology, the IoT is expanding the capabilities and “smartness” of edge devices, making them even more integral tools for enhancing security. Traditionally, edge devices had to communicate directly to an alarm panel, which relayed information to a receiver or monitoring center, often with some sort of human intervention or interpretation. As edge devices get smarter and communicate directly with one another, they can make decisions and take action on their own to drive efficiencies. To enable even more meaningful outcomes, operators can use a centralized dashboard to conduct targeted analyses on the data that edge devices collect to uncover direct, and sometimes hidden, correlations.

Today, we can envision a future in which the alarm panel as we know it has dramatically changed, replaced by intelligent wireless edge devices communicating directly with a cloud-based service. Via a Web-based interface, an organization can track the information edge devices capture and share it in real time, giving an organization more power than ever before to quickly make adjustments to improve operations. Leveraging software-as-a-service capabilities with APIs enables the organization to pick and choose solution sets to fit its needs, without building its own solutions from the ground up.

With the innovative IoT-related security solutions that are available today, this vision may soon become a reality. As such, the IoT is already empowering the next generation of security.

This article originally appeared in the December 2014 issue of Security Today.

Featured

  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3