Does “Security Technology” Cover The Broader Application Possibilities Of Today’s Systems?
5 Dec 2018
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
The term “security technology” is very limiting in describing the applications of many of today’s systems. Biometric technologies are a good example. Iris, fingerprint and facial recognition systems started primarily as a way to authenticate the identity of a person requesting door access. While that’s still a common use, it’s now only the tip of the iceberg. Payroll solution providers are embedding iris recognition readers into their systems for card- and hands-free time and attendance. College and university students routinely use iris readers to purchase food and books without fumbling in a backpack for a smart card. In many nations, a person’s iris is replacing cards for obtaining healthcare and other social benefits, registering to vote and even acting as a national ID card. We’ll continue to see more innovative uses of biometrics as more public and private organizations think outside of the traditional security box.
It is fair to say the term “security technology” is overloaded. Those of us in the physical security world would interpret it as technologies applied in our industry, but I would guess that the vast majority in general would think of technology applied to secure ourselves against cyber-attacks. Of course, both are true. Today cameras and video management systems are way more than just devices to protect property and people. A camera is the richest data sensor available, and we are starting to see some very creative and focused uses of cameras as a data source. Video management systems (VMSs) for certain markets are no longer focused on showing the video as a primary viewpoint, but instead on showing an aggregation of the data. The information gathered by these cameras are the oil to the management system’s combustion engine. How fast can we get this engine to take us?
The term “security technology” presents a challenge for sales and marketing professionals who need to differentiate products and services to reach their target audiences. Consider surveillance: While it’s not exclusively security managers that we need to talk to, they are critical in most buying chains. In the retail sector, for instance, many surveillance manufacturers differentiate by offering end-to-end lineups encompassing cameras, video management software, integration with point-of-sales systems, plus analytics. In this sector, analytics often benefits marketing departments – which gives more selling opportunities for security suppliers. However, security and loss prevention managers remain the key purchasers. Surveillance in retail is still primarily implemented to improve security and safety. Benefits beyond this are often considered value-added. As long as there’s strong demand for new/upgraded surveillance systems for security, it doesn’t make sense to abandon the term “security technology” but rather to expand upon the proposition for end users.
Looking to maximize their investments in security equipment, customers are finding new ways to spread the costs across multiple departments. The results have led to interesting nontraditional uses of security technology. Retail marketing departments use security cameras to monitor shoppers’ reactions to new product displays. Cameras enable contractor compliance officers to show employees are meeting government safety requirements. Video intercoms let administrators from academic departments at a college for the hearing-impaired communicate using American Sign Language. As employees arrive and leave a manufacturing facility, an access control system keeps track of their time for human resources. These are only a few of the non-traditional uses. The design and use of new and existing products aren’t being hindered by the phrase “security technology.” It’s no longer wholly accurate, but it will do until we can agree on a better term.
The description “security technology” has definitely become far too narrow in recent years. It is more accurate to consider these systems in wider terms of technology that enhances the security of assets/information and the monitoring of areas that need protection. Physical and logical security have also become firmly entwined, particularly as the Internet of Things (IoT) has become more popular. This makes it essential to ensure the application of strict security principles to any IoT devices, ensuring there are no weak links that could be exploited by nefarious individuals or organizations. The advent of full smart homes/offices/cities will naturally require even more secure systems. The application of new technologies is required to secure once humble devices that would never have posed any level of risk before. Security evolution is nothing new of course, consider the progression from lock and key, to card access to biometric systems and beyond.
With the level of interoperability between systems, I would agree that the term "security technology" is too narrow for the work many manufacturers are doing. Many solutions on the market today do far more than keep a facility secure. For example, access control and building management solutions are now intelligent enough and able to share information to make a building more efficient, such as changing the temperature setting when no one is present in a building, saving on lighting, etc. Another example is the integration of event management through an access control solution. In higher education facilities, this means students can request access to specialized study spaces or rooms through an event management system that communicates with the access control system. This works in a number of verticals, like multi-unit housing facilities and recreational locations, too (to reserve a space on a tennis court as an example).
The possibilities in today's security landscape go well beyond simply "security technology," encompassing business intelligence, intelligent traffic management, smart buildings, smart cities, AI-driven decision-making for officials, and so much more. To that end, security – especially video surveillance – has begun to permeate all departments of organizations and public agencies, including IT, marketing, building operations, facility management, etc., greatly increasing the types of people that physical security officials must collaborate with. As a result, investment in security technology is becoming less of a cost-centric expenditure and more of an investment in the future of the business and its operations, helping to streamline decision-making and oversight. The application possibilities are only going to grow from here.
Absolutely – especially for access control, which is no longer regarded simply as a mechanism for securing doors, data and other assets, but now also plays a pivotal role in transforming the user experience. Yes, the trusted identity inside today’s smart cards is still used to authorize where people can go and what they can use. But when it is carried on a smartphone and connected through the cloud and IoT to building resources, this same trusted identity that opened the parking gate, front door or elevator for an employee can do much more, such as helping facility managers better understand overall building usage for workplace optimization and providing users with location services for directional assistance. In the future, this same credential could also be used for alerting the building to configure an employee's office’s temperature and lighting before arrival. Using trusted IDs in cloud-based solutions offers virtually limitless potential.
Our Expert Panelists make a strong case that the term “security technology” is too restrictive given the many ways that our industry’s products and systems operate in today’s enterprises. However, currently it still seems as if many of the new uses are seen as a value-add and that security and safety are still the core motivation for embracing the technologies. So as one panelist put it: Although the term is “no longer wholly accurate, it will do until we can agree on a better term.”
- Related links
- ACT Access control software
- ACT Intercom Systems
- Aiphone Intercom Systems
- HID Access control software
- IDIS Surveillance cameras
- IDIS Video Surveillance software
- Oncam Video Surveillance software
- Oncam Surveillance cameras
- Pelco Surveillance cameras
- Pelco Video Surveillance software
- Progeny Access control software
- TDSi Access control software
- TDSi Mechanical digital locks
- TDSi Video Surveillance software
- TDSi Surveillance cameras
- Vanderbilt Access control software
- Vanderbilt Intercom Systems
- Vanderbilt Intruder alarm warning devices
- Vanderbilt Video Surveillance software
- Vanderbilt Mechanical digital locks
- ACT Access control readers
- ACT Electronic lock systems
- HID Access control readers
- IDIS IP cameras
- Oncam IP cameras
- Pelco IP cameras
- Progeny Electronic lock systems
- Progeny Access control readers
- TDSi IP cameras
- TDSi Access control readers
- TDSi Electronic lock systems
- Vanderbilt Access control readers
- ACT Access control cards/ tags/ fobs
- Aiphone Access control cards/ tags/ fobs
- HID Access control cards/ tags/ fobs
- Progeny Access control cards/ tags/ fobs
- TDSi Access control cards/ tags/ fobs
- Vanderbilt Access control cards/ tags/ fobs
- Remote Monitoring Technology: Tackling South Africa’s Cable Theft Problem
- Maximising Supermarket Safety With Real-time Surveillance Solutions
- The Intrinsic Role Of Lighting For Video Surveillance Clarity And Performance
- We Have The Technology To Make Society Safer – How Long Can We Justify Not Using It?
- Getting To Know Dan Grimm, VP And General Manager Of Computer Vision At RealNetworks
- Big Wins And The Importance Of Showing Up: Insights From SecurityInformed.com Editor Larry Anderson
- Setting Goals, Business Travels And Radioactivity: Success Secrets From Tiandy's John Van Den Elzen
- Getting To Know Jeff Burgess, President/CEO At BCDVideo
How To Ramp Up Perimeter Security With License Plate Reader TechnologyDownload
Solve Access Control Challenges in the Healthcare SectorDownload
Getting the Most Value From Software Subscription AgreementsDownload
Shifting Trends in Operation Centers and Control Rooms for 2021Download