From Intelligence and Data to Dollars: Monetizing the Internet of Security Things

Sponsored

From Intelligence and Data to Dollars

Monetizing the Internet of Security Things

The largest device market in the world will no longer be smartphones, according to Gartner’s November 2015 study. In fact, by 2020, 28.1 billion devices, will offer connectivity and data, from smartphones and vehicles to embedded microcomputers and security devices according to an IDC forecast. This is the Internet of Things.

Of the projected 14 billion devices in use by 2020, cross-industry and vertical market-specific devices for enterprise and small/mid-sized business are expected to grow to 35% and can no longer be considered only for use by consumers. The interesting fact is that business users often consume data from IoT devices using similar processes as their consumer counterparts. For example, the growth of “Fog” and “Mobile Edge” Computing (MEC) models can boost performance for both multimedia delivery of consumer streaming video services, as well as low latency tactical video for public safety and first responders. Both use cases leverage Digital Multimedia Content (DMC) available in networks and storage closer and capable of a shorter delivery time to smartphones and other consuming devices. One version entertains, while the other potentially delivers life-saving situation awareness.

Digital Multimedia Content and IoT

This Digital Multimedia Content delivered to IoT devices like laptops, workstations and smartphones and produced by IoT devices like IP video surveillance cameras is defined as including the video content itself, plus associated metadata (feature data) and audio. The storage location or device (i.e., network video record, server, or virtual [Cloud, Fog or MEC] storage) where digital video, digital multimedia content, or digital multimedia evidence (DME) is originally stored is significant in achieving Video QoS or the ability to acquire, render, search, disseminate, distribute DMC.

DMC may also be referred to as IP or digital video, IP video content, or Digital Multimedia Evidence (DME). Digital data representing audio content, video content, metadata information, location‑based information, relevant IP addresses, recording time, system time, and any other information attached to a digital file. DMC may be compressed or uncompressed and may also be referred to as original, copied, local, or virtual. How this data is analyzed, processed, stored and delivered efficiently, often to public safety is a significant monetization opportunity.

The basic framework of what defines IoT devices, includes business assets, sensors, industry devices (things) connected to each other, to humans or systems, processing data input, applying rules and models, and finally analyzing and streaming content.

Figure 1 The Internet of Security Things

Figure 1 The Internet of Security Things

In the above figure, an “intelligent” video surveillance device streams DMC efficiently using the advanced video CODEC Zipstream, producing forensic video evidence, which is then analyzed, consumed by users, measured to create a security “model” or scenario and ultimately working seamlessly with other systems, reducing costs. In each step, the systems integrator or end user is able to offer products and services to reduce costs, improve safety and remove “silos” preventing data from benefiting other systems.

Analytics and the Internet of Security Things

Let’s look at the IoT analytics step and discover even greater monetization opportunities. Analytics is a fast growing market with IoT as the use of data creates measurable benefits. All too often, analytics of security data implies forensics or after an event occurs. This is only part of the great benefit associated with using the entire Security Data Analytics Cycle, shown below.

Figure 2 Security Data Analytics Cycle

Figure 2 Security Data Analytics Cycle

This Security Data Analytics Cycle, when related to actual solutions illustrate a significant amount of applications that can run as an embedded process inside a qualified camera. These processes or “agents” may be paired together with a more scalable analytics solutions running as a service or cloud-based application. The innoVi solution from Agent Vi is an example of such a solution, offering systems integrators to install an AXIS camera running an embedded process that delivers actionable data to a cloud service that may be used by central monitoring stations to detect breaches and reduce false alarms. This unified solution is itself monetized as it represents significant cost savings through loss prevention, improved process and potential insurance premium reductions. A suite of potential Security Video Analytic Application Categories and Examples are pictured below:

Figure 3 Security Video Analytic Application Categories

Figure 3 Security Video Analytic Application Categories

Data and usage analysis leads to numerous monetization opportunities for OEMs, as vendors can supply customized offerings with software-enabled features on demand. Some of these features are in the application examples below:

Figure 4 Security Video Analytic Application Examples

Figure 4 Security Video Analytic Application Examples

Public Safety IoT in action!
Let’s look at the Internet of “Security” Things in action. A team of law enforcement professionals just received intelligence of gang operations nearby, where illegal narcotics and weapons are being stored and sold. Two members of the city’s gang violence reduction unit start a tour and soon receive a “hit” off a fixed surveillance camera with a built-in license plate recognition (LPR) application and connected to the NCIC.

Figure 5 Vehicle License Plate Capture (Image courtesy IPConfigure)

Figure 5 Vehicle License Plate Capture (Image courtesy IPConfigure)

The AXIS detecting camera has an embedded application running on its analytics platform and a nearby microcomputer, such as a Razberi Pi running a fully featured video management system called Orchid Fusion connected to a NAS (network attached storage).

A “hot list” was recently uploaded to the NAS device after the city’s crime analysis software related the vehicle registration of a known gang associate to the primary suspects.

A “beacon” application notifies the team nearby, as well as the Command Center of the alert. The camera is equipped with a “next generation” codec called Zipstream that reduces the bitrate required for streaming video, so a clip of the vehicle passing by the camera is pushed to law enforcement on site. The camera is capable of rendering details through forensic capture, an image processing feature of the AXIS camera, and the team sees the vehicle occupants are armed with automatic weapons.

Knowing the location of their law enforcement assets, Command automatically pushed out notifications of the filtered social media chatter to the nearby detectives and tactical response team. The cloud-based social media app has been listening for known gang language, keywords and locations, focusing the intelligence to just what is most vital in this operation.

Figure 6 Social Media Alerts and Video Surveillance Assets (Image courtesy Geofeedia)

Figure 6 Social Media Alerts and Video Surveillance Assets (Image courtesy Geofeedia)

A warrant is obtained and the unit leader requests the “go-ahead” for the operation from Command. A traffic management application creates a protective radius around the site operation, re-directing traffic safely around the operation’s area and dispatching EMS for potential injuries and HAZMAT should there be toxic drug production onsite. The team executes the warrant and takes key gang members into custody.

This scenario is not only possible with a running IoT ecosystem, it represents a ubiquitous development of social and technology fusion. What really makes this work? An even better question is, can this scale, or can hundreds of these scenarios be running simultaneously and continuously in many locations? The Internet of Things links sensors like advanced IP cameras, together with communications, storage, infrastructure, analytics and quality of service. With the Internet of Security Things, today’s systems integrators can close the loop on edge devices, data processing, transmission, dispatch of first responders and mining of the event’s intelligence for even faster response in the future.

Tactical IoT profiles may be identified and potential response scenarios generated, with the most confident automation by analytical processes performed repeatedly. First responders become safer through intelligence; families stay informed and involved.

The Cyber IoT factor

Figure 7 IoT Cyber FrameworkCyber hardening is another monetization opportunity. Energy management solutions, process control and industrial machines perform high risk operations and have a high level of embedded intelligence for visualization. There is a great need to protect such solutions and secure the associated intellectual property from theft or manipulation. The large number of connected sensors also create a huge amount of big data which also needs to be protected. The cyber framework for defining and protecting IoT devices is shown below and in this figure:

The situational awareness of IoT industrial Applications and Devices as requiring three capabilities:

  1. DETECT, the ability to know what IoT devices and components are connected to a given network or system
  2. AUTHENTICATE, the ability to verify the provenance of IoT components and prevent and detect spoofing
  3. UPDATE, IoT security programs must include the ability to securely maintain and upgrade these components

Monetization options also can be found in condition data monitoring of IoT devices which ultimately leads to predictive maintenance services. End users benefit from improved availability of their applications and a reduction in total cost of ownership. Software license management and version compatibility are another opportunity to build recurring revenue and reduce potential costs for end users due to incompatible systems.

Safe and Smart Cities

Globally, more people live in urban areas than in rural areas, with 54 per cent of the world’s population residing in urban areas (2014 data). The number of megacities has nearly tripled since 1990 and by 2030, 41 urban “super-regions” are projected to house at least 10 million inhabitants each. Urbanization places extraordinary stress on both environmental resources and physical security. Resilience and operations management are necessary to keep pace with this growth.

In potential answer to the urbanization trend, the birth and evolution of the smart city has contributed to reduce security investigations, increase energy management, increase parking resource efficiency and improve traffic safety. The following framework can be applied to campuses and corporations as well:

Figure 8 Smart City Security Framework

Figure 8 Smart City Security Framework

The monetization of Security Device IoT extends into a rapidly growing market, smart lighting. There is great potential in unifying an intelligent IP Camera and various sensors on a lighting solution. LED lighting upgrades often lead to impressive energy savings, often measured in hundreds of thousands of dollars per year for cities and corporations. In addition, vehicle and pedestrian traffic flow outside and inside buildings may be analyzed.

The move towards smarter urban management does not happen without the deployment and measurement of the solution opportunities. With urbanization rates potentially reaching 70% by 2050 in rapidly growing regions like the Middle East, these solutions are essential. Applicable to virtually any global urban area, problems such as traffic congestion and increased energy use can be eased with the following goals in the figure.

Figure 9 Safe and Smart City/Corporate Goals

Figure 9 Safe and Smart City/Corporate Goals

The opportunities for monetization in the Internet of Security Things is great for all ecosystem members. However, deployment abilities may not be readily available, requiring collaboration and project management. For the city or corporation using IoT, becoming safe and smart is a journey, not a destination.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West: Day 2

    What a great show ISC West 2024 has been so far. The second day on Thursday was as busy or even more hectic than the first. Remember to keep tabs on our Live From ISC West page for news and updates from the show floor at the Sands Expo, because there’s more news coming out than anyone could be expected to keep track of. Read Now

    • Industry Events
    • ISC West
  • A Unique Perspective on ISC West 2024

    Navigating a tradeshow post-knee surgery can be quite the endeavor, but utilizing an electric scooter adds an interesting twist to the experience. While it may initially feel like a limitation, it actually provides a unique perspective on traversing through the bustling crowds and expansive exhibition halls. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3