28 May 2022

Editor Introduction

It’s safe to say there has been more change in the workplace in the last two years than ever before. Driven by the pandemic, technology has both allowed greater flexibility for employees and enabled continuing prosperity for many companies that otherwise would have had to cease operation. But have security protocols and practices done enough to enable companies to keep pace with the changes? We asked this week’s Expert Panel Roundtable: Have security protocols and practices kept up with the changing ways people work?


As companies embrace different return-to-office practices based on more flexible hours, use of space, and digital transformation, they are looking at physical security systems differently. Organizations are increasingly using the data gathered by their physical security systems for more than controlling access and monitoring their spaces. To meet the changing needs of the hybrid workplace, they are also tapping into the data gathered by their security systems to come up with new standard operating procedures, optimize space, improve business efficiency, and comply with public health requirements. This fundamental change in the way people work also means that the traditional IT perimeter no longer exists. Organizations need to keep up with these changes, strengthen their security protocols and bolster their cyber-posture, or risk undermining the safety of their intellectual property, sensitive data, and personal information.

From a manufacturing and technology perspective, we think of protocols as a way to communicate information. It is hard for protocols to keep up with the rapid pace of technology innovation. In the video security market, we have ONVIF as an example of an open industry forum that promotes standardized interfaces between vendors. But we can’t expect ONVIF to communicate all the advanced metadata coming from an AI camera overnight. As such, manufacturers like i-PRO rely on APIs or SDKs to develop plugins for interoperability between partners. This enables us to get important AI metadata into a VMS such as Genetec Omnicast, which allows operators to search or set alarm triggers for specific characteristics. Of course, the data itself means nothing until we transform it into useful information. As protocols and practices evolve, it’s important to pick the right partners to guarantee interoperability as communication protocols and standards emerge.

Security is always evolving, but not necessarily in a linear way. For example, touchless secure access control features have been embedded in security for some time but were not necessarily prominent for many operators until the pandemic struck. Suddenly we were all hyper-aware of the need to control infection vectors, and touchless systems went from a convenient feature to an essential one. The use of mobile device credentials for access control is a good example of another technology that has been “in the right place at the right time.” Whilst it has garnered considerable interest as a post-pandemic touchless technology, the primary driver was to boost security and flexibility whilst presenting security users with a solution that fits their expectations in using their mobile devices for multiple applications. Undoubtedly the pandemic has also accelerated the market’s interest in exploring and adopting the latest solution options. 

Osvaldo San Martin Johnson Controls, Inc.

Looking back on the two years since the COVID-19 pandemic began, it’s clear our day-to-day lives have transformed drastically as we adapted to remote/hybrid work environments. These changes have urged the implementation of stronger protocols for in-person working. A few ways this is happening are by businesses and organizations utilizing touchless access control that delivers streamlined and healthy occupant experiences and updating existing video systems with AI-powered contact tracing and mask detection solutions. Additionally, security technology and practices are being updated with advancements that include AI-driven ransomware detection, cloud-based cybersecurity, two-factor authentication steps, and maintaining good cyber hygiene. 2021 was a year filled with cyberattacks, such as Logj4, Kaseya, and REvil, and security companies are doing everything they can to prevent this from happening in 2022. Today, more protocols are being put into place to help recognize threats and inform on how to cope with attacks should they happen. Hackers might be getting smarter but so are security practices. 

Will O'Donnell Vanderbilt Industries

As there has been a significant transition to remote work over the last two years, security practices have rapidly developed and adapted to combat threats and protect organizations while maintaining a level of convenience for individuals. Today’s innovation efforts like cloud-based access control, SaaS, biometrics, mobile credentials, and similar technologies create more secure ways to authenticate people and grant access ultra-convenient. With this being said, it’s still crucial to remember that each organization requires a deployment that is specific to them and their access rights, which means that every security system needs flexibility, adaptability, and the ability to scale with a customer’s ongoing security requirements and demands. There are open and unified platforms readily available on the market today that help users configure their systems to match their unique security requirements. These modern solutions offer built-in tools and open architecture to quickly adjust to the changing environment.


Editor Summary

The workplace has undergone a drastic transformation in the last two years. For that matter, so has the security industry. The security industry has unveiled a wealth of well-timed technologies that have played a major role in helping companies adapt to recent changes, both those necessary during the pandemic and those that will continue long after the crisis is behind us.