Embracing the Internet of Things

Embracing the Internet of Things

Opportunities and implications for security and beyond

The machine-to-machine (M2M) movement. The Internet of Things (IoT). The Internet of Everything (IoE). Each term may have its subtle differences, but at their core, they all involve connected devices that share information to enhance their intelligence, capabilities and operation. However you refer to the phenomenon, the IoT is here to stay. It’s poised to generate far-reaching implications in the security space—from alarm monitoring to advanced, integration projects—while enhancing efficiencies and business intelligence.

The IoT combines operational technology (OT), devices in the field that capture data, with information technology (IT), back-end software systems that can do something with the data, to create actionable business intelligence and management capabilities. OT devices may include alarm sensors, cameras, readers, panels, environmental sensors and more. Such wired and wireless devices share information with one another and with applications in real time. Standards are being developed so that all a device requires is a communication pathway along with the ability to detect something and capture data.

Real-time data collected by OT devices can be vast and includes information related to alarm conditions, vehicle movement, video detection, doors status, environmental conditions and more. The devices can share this data and send it back to a central management location, likely via a cloud-based solution. From these systems, people can aggregate and analyze the data to identify trends, anomalies and deficiencies, so they can verify positive correlations and make real-time corrective actions as needed to improve their operations.

The IoT promises seemingly endless possibilities, and the security industry is ready to welcome a host of new IoT-enabled capabilities that, if managed well, can greatly enhance security and business operations. Let’s review how the IoT is impacting a variety of industries and how those applications are influencing IoT-related opportunities in the security world.

The IoT Everywhere

The potential of the IoT to drive organizational changes begins with data collection and sharing, and relies heavily on the sophisticated analysis of this data. The capturing of data is nothing new. Corporations have been collecting data—Big Data—from consumers, processes and operations for years. However, in the IoT space, organizations can capture a wider array of data from a wider variety of sources. By combining and purposefully manipulating those data points, organizations can discover deeper correlations and arrive at more intelligent conclusions about their operations. Such capabilities are emerging in a number of industries.

In the utilities market, the IoT is enabling more efficient data collection with smart meters that relay readings to cloud-based servers with no need for human involvement. This capability is leaps ahead of traditional house-to-house manual readings. Beyond providing readings for billing purposes, we can envision a day in which a water company can track realtime usage and historic patterns, and notify a property owner of a potential leak.

In the insurance arena, carriers are using IoT-enabled devices to glean information from consumers’ real-life habits to assess risk and promote safe driving. For example, Progressive’s Snapshot device plugs into a consumer’s vehicle and relays information to a cloud server. Tracking data related to miles driven, hard braking instances and time of day helps Progressive determine appropriate coverage rates. Consumers receive discounts for low-risk driving habits and can track their projected savings online.

For manufacturing operations, IoT-enabled devices can track pallets, containers and processes, informing operators where everything stands in real time. Careful analysis of this data can help organizations predict when a process may fail, identify when to perform proactive maintenance and enhance the visibility of processes throughout a plant on a granular level.

And, let’s not forget the consumer space where IoT applications abound, allowing us to track our exercise habits, set our thermostats from our smartphones and turn our lights on automatically when we arrive at home. One day consumers may use the IoT to control fully-automated homes from a single remote device.

The IoT in Security

If the IoT is all about more efficiently capturing data, understanding what that data means and taking actions to improve outcomes based on that data, then it is more than welcomed in the security space. It’s needed.

Security-related data from IoT-enabled devices may come from people scanning access badges, cameras tracking movements, alarms being activated, sensors monitoring temperature, mobile devices, wearables and vehicles. All of the devices capturing this information are now able to communicate with one another, and they’re able to capture granular information. Collecting, aggregating and analyzing this data can lead organizations to actions that help reduce costs, enhance efficiencies, provide new services and even glean business intelligence that extends far beyond security operations to include information technology, human resources, logistics and other business functions.

As an example of enhancing business intelligence, IoT-enabled devices can give retail loss prevention teams more information to detect, prevent and investigate issues. Connected devices also can serve dual purposes to maximize their value, such as surveillance cameras being used to inform marketing tactics by counting people and tracking heat maps to determine the effectiveness of in-store displays, while making real-time adjustments.

As the IoT security space continues to grow, companies are developing ways to enhance the capabilities of connected edge devices by connecting them to new software systems. The key to enabling these new devices is manufacturers, software companies and integrators providing open architecture systems based on application program interfaces (APIs).

APIs enable the expansion of a system’s capabilities by building customized solutions that leverage applications or services in the cloud as well as onsite. Doing so allows end users to create a more enterprise- focused model for their business that enables richer collaboration and more meaningful information gathering and sharing across departments, sites and organizations.

One example of an API-based system is Diebold’s SecureStat centralized Web-based security management system. It includes a Development Zone Portal in which customers and partners can create solutions with APIs to collect service, installation and monitoring history, access video, automate provisioning and manage security devices in the field. The portal includes documentation, sample code, instructions and an inventory of capabilities and services that organizations can use to create their own interfaces.

Brivo Labs and Eagle Eye Video also have embraced the API space. Brivo Labs offers cloud-based access and video solutions that users can tweak to fit their needs, and the company’s API platform allows developers to build apps that can unlock and lock doors, provision credentials and obtain data. Eagle Eye Video allows organizations to develop apps to automate recording, management and playback of video from any connected camera.

What the Future May Hold

Via low-cost and ubiquitous cellular and wireless transmission technology, the IoT is expanding the capabilities and “smartness” of edge devices, making them even more integral tools for enhancing security. Traditionally, edge devices had to communicate directly to an alarm panel, which relayed information to a receiver or monitoring center, often with some sort of human intervention or interpretation. As edge devices get smarter and communicate directly with one another, they can make decisions and take action on their own to drive efficiencies. To enable even more meaningful outcomes, operators can use a centralized dashboard to conduct targeted analyses on the data that edge devices collect to uncover direct, and sometimes hidden, correlations.

Today, we can envision a future in which the alarm panel as we know it has dramatically changed, replaced by intelligent wireless edge devices communicating directly with a cloud-based service. Via a Web-based interface, an organization can track the information edge devices capture and share it in real time, giving an organization more power than ever before to quickly make adjustments to improve operations. Leveraging software-as-a-service capabilities with APIs enables the organization to pick and choose solution sets to fit its needs, without building its own solutions from the ground up.

With the innovative IoT-related security solutions that are available today, this vision may soon become a reality. As such, the IoT is already empowering the next generation of security.

This article originally appeared in the December 2014 issue of Security Today.

Featured

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.