More Than Just Security

Follow the sequence of events for success

As technology has advanced, security has branched out beyond simple surveillance and intruder deterrence. A security system can now be made up of multiple sensors that provide data about the environment. For example, a door position switch is a sensor that tells you whether a door is open or closed, a thermometer is a sensor that gives you temperature data, and water pressure and flow sensors provide data about your water sprinkler systems.

As systems have migrated to the use of Ethernet as a communication protocol and interfaces with other systems have been developed, the data that each system provides can now be more readily used in another system. Security is one of these systems that migrated to the use of Ethernet and we are just starting to see some of the possibilities that this is offering far beyond security purposes. Imagine the following sequence of events:

1. You enter your company’s parking lot. By either presenting your badge at a gate (access control) or a camera identifying your license plate (video surveillance with analytics), the system identifies you as being on the property.

2. You enter the building at your usual entry point (access control). If at an unusual entry point or at a different time of day, the system recognizes an anomaly and flags that data for observation by those concerned. Facial recognition verifies that it is you using the associated credential.

3. At the time of your entry, the temperature (HVAC) and lighting (building automation) adjust your work area to the level specified when occupied.

4. When you attempt to log in to your network device (network administration), it first checks to verify that you are on the property by interfacing with the access control system.

5. If you leave the property for lunch or the end of the day, facial recognition and access control at building ingress/egress note that you are exiting and send that data to network administration. The logical security system is locked for your network account. The HVAC and lighting adjust as appropriate.

This sequence may have been possible in the past, but it would have been done through many inputs and outputs on the various systems. Now that these systems can link via the Ethernet protocol, the software links provide network intelligence that can automate the events.

One of the challenges to creating these links is that software is constantly being updated and improved by the manufacturer. We have not gotten to the single pane of glass for end users to see every system in their facility at the same time. They currently must jump from one system to the other for correlation of data. As that software system is developed, many standards will need to be developed to maintain those links.

Standards in building automation and communication are developing in each subsystem. IEEE provided us with 802.3 for wired Ethernet and 802.11 for wireless. Now each subsystem needs to develop a standard interface to software that uses that protocol. That single-pane software will need to communicate with the interface that each subsystem provides as a standard. For example, video surveillance uses the ONVIF video and access control profiles to offer an interface, whereas lighting, HVAC, and other systems will be offering systems that use an open interface for integrating data to a single platform.

As new technology continues to enter the market, you can expect to see even more devices join the Internet of Things to bring building intelligence and automation to a whole new level.

This article originally appeared in the March 2019 issue of Security Today.

About the Author

Bob Dolan is the director of technology security solutions at Anixter.

Featured

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

  • Deploying in a Hybrid, Cloud Environment

    The way organizations manage access control is evolving. Traditional on-premises systems come with high IT and server requirements. At the same time, fully cloud-based solutions may not meet the needs of every facility. Read Now

  • Facing Facts for Facilities

    Despite the proliferation of constantly evolving security solutions, there remains a troubling trend among many facility operators who often neglect the most important security assets within their organization. Keys and shared devices like radios, laptops and tablets are crucial to successful operations, yet many operators are managing them haphazardly through outdated storage systems like pegboards and notebooks. Read Now

  • Report Reveals Security Training Reduces Global Phishing Click Rates by 86%

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, today launched its “Phishing by Industry Benchmarking Report 2025” which measures an organization’s Phish-prone Percentage (PPP) — the percentage of employees likely to fall for social engineering or phishing attacks, indicating the organization’s overall susceptibility to phishing threats. This year’s report found a global average baseline PPP of 33.1%, meaning a third of employees interact with phishing simulations before taking part in best-practice security awareness training (SAT).COVER 2025-PIB-NA-Report_EN-US Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities