Does “Security Technology” Cover The Broader Application Possibilities Of Today’s Systems?
5 Dec 2018
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
The term “security technology” is very limiting in describing the applications of many of today’s systems. Biometric technologies are a good example. Iris, fingerprint and facial recognition systems started primarily as a way to authenticate the identity of a person requesting door access. While that’s still a common use, it’s now only the tip of the iceberg. Payroll solution providers are embedding iris recognition readers into their systems for card- and hands-free time and attendance. College and university students routinely use iris readers to purchase food and books without fumbling in a backpack for a smart card. In many nations, a person’s iris is replacing cards for obtaining healthcare and other social benefits, registering to vote and even acting as a national ID card. We’ll continue to see more innovative uses of biometrics as more public and private organizations think outside of the traditional security box.
It is fair to say the term “security technology” is overloaded. Those of us in the physical security world would interpret it as technologies applied in our industry, but I would guess that the vast majority in general would think of technology applied to secure ourselves against cyber-attacks. Of course, both are true. Today cameras and video management systems are way more than just devices to protect property and people. A camera is the richest data sensor available, and we are starting to see some very creative and focused uses of cameras as a data source. Video management systems (VMSs) for certain markets are no longer focused on showing the video as a primary viewpoint, but instead on showing an aggregation of the data. The information gathered by these cameras are the oil to the management system’s combustion engine. How fast can we get this engine to take us?
The term “security technology” presents a challenge for sales and marketing professionals who need to differentiate products and services to reach their target audiences. Consider surveillance: While it’s not exclusively security managers that we need to talk to, they are critical in most buying chains. In the retail sector, for instance, many surveillance manufacturers differentiate by offering end-to-end lineups encompassing cameras, video management software, integration with point-of-sales systems, plus analytics. In this sector, analytics often benefits marketing departments – which gives more selling opportunities for security suppliers. However, security and loss prevention managers remain the key purchasers. Surveillance in retail is still primarily implemented to improve security and safety. Benefits beyond this are often considered value-added. As long as there’s strong demand for new/upgraded surveillance systems for security, it doesn’t make sense to abandon the term “security technology” but rather to expand upon the proposition for end users.
Looking to maximize their investments in security equipment, customers are finding new ways to spread the costs across multiple departments. The results have led to interesting nontraditional uses of security technology. Retail marketing departments use security cameras to monitor shoppers’ reactions to new product displays. Cameras enable contractor compliance officers to show employees are meeting government safety requirements. Video intercoms let administrators from academic departments at a college for the hearing-impaired communicate using American Sign Language. As employees arrive and leave a manufacturing facility, an access control system keeps track of their time for human resources. These are only a few of the non-traditional uses. The design and use of new and existing products aren’t being hindered by the phrase “security technology.” It’s no longer wholly accurate, but it will do until we can agree on a better term.
The description “security technology” has definitely become far too narrow in recent years. It is more accurate to consider these systems in wider terms of technology that enhances the security of assets/information and the monitoring of areas that need protection. Physical and logical security have also become firmly entwined, particularly as the Internet of Things (IoT) has become more popular. This makes it essential to ensure the application of strict security principles to any IoT devices, ensuring there are no weak links that could be exploited by nefarious individuals or organizations. The advent of full smart homes/offices/cities will naturally require even more secure systems. The application of new technologies is required to secure once humble devices that would never have posed any level of risk before. Security evolution is nothing new of course, consider the progression from lock and key, to card access to biometric systems and beyond.
With the level of interoperability between systems, I would agree that the term "security technology" is too narrow for the work many manufacturers are doing. Many solutions on the market today do far more than keep a facility secure. For example, access control and building management solutions are now intelligent enough and able to share information to make a building more efficient, such as changing the temperature setting when no one is present in a building, saving on lighting, etc. Another example is the integration of event management through an access control solution. In higher education facilities, this means students can request access to specialized study spaces or rooms through an event management system that communicates with the access control system. This works in a number of verticals, like multi-unit housing facilities and recreational locations, too (to reserve a space on a tennis court as an example).
The possibilities in today's security landscape go well beyond simply "security technology," encompassing business intelligence, intelligent traffic management, smart buildings, smart cities, AI-driven decision-making for officials, and so much more. To that end, security – especially video surveillance – has begun to permeate all departments of organizations and public agencies, including IT, marketing, building operations, facility management, etc., greatly increasing the types of people that physical security officials must collaborate with. As a result, investment in security technology is becoming less of a cost-centric expenditure and more of an investment in the future of the business and its operations, helping to streamline decision-making and oversight. The application possibilities are only going to grow from here.
Absolutely – especially for access control, which is no longer regarded simply as a mechanism for securing doors, data and other assets, but now also plays a pivotal role in transforming the user experience. Yes, the trusted identity inside today’s smart cards is still used to authorize where people can go and what they can use. But when it is carried on a smartphone and connected through the cloud and IoT to building resources, this same trusted identity that opened the parking gate, front door or elevator for an employee can do much more, such as helping facility managers better understand overall building usage for workplace optimization and providing users with location services for directional assistance. In the future, this same credential could also be used for alerting the building to configure an employee's office’s temperature and lighting before arrival. Using trusted IDs in cloud-based solutions offers virtually limitless potential.
Our Expert Panelists make a strong case that the term “security technology” is too restrictive given the many ways that our industry’s products and systems operate in today’s enterprises. However, currently it still seems as if many of the new uses are seen as a value-add and that security and safety are still the core motivation for embracing the technologies. So as one panelist put it: Although the term is “no longer wholly accurate, it will do until we can agree on a better term.”
- Related links
- ACT Intercom Systems
- ACT Access control software
- Aiphone Intercom Systems
- HID Access control software
- IDIS Surveillance cameras
- IDIS Video Surveillance software
- Oncam Video Surveillance software
- Oncam Surveillance cameras
- Pelco Video Surveillance software
- Pelco Surveillance cameras
- Progeny Access control software
- TDSi Video Surveillance software
- TDSi Surveillance cameras
- TDSi Access control software
- TDSi Mechanical digital locks
- Vanderbilt Video Surveillance software
- Vanderbilt Surveillance cameras
- Vanderbilt Intercom Systems
- Vanderbilt Intruder alarm warning devices
- Vanderbilt Access control software
- ACT Electronic lock systems
- ACT Access control readers
- HID Access control readers
- IDIS IP cameras
- Oncam IP cameras
- Pelco IP cameras
- Progeny Access control readers
- Progeny Electronic lock systems
- TDSi Access control readers
- TDSi Electronic lock systems
- TDSi IP cameras
- Vanderbilt Access control readers
- Vanderbilt IP cameras
- ACT Access control cards/ tags/ fobs
- Aiphone Access control cards/ tags/ fobs
- HID Access control cards/ tags/ fobs
- Progeny Access control cards/ tags/ fobs
- TDSi Access control cards/ tags/ fobs
- Vanderbilt Access control cards/ tags/ fobs
Combining Systems Intelligence And Human Insight For Superior SecurityDownload
3 Ways To Increase Workplace Safety And Resource EfficiencyDownload
Mobile Access- What You Need To Know (Part 1)Download