Round table contributions
There’s almost no such thing as a local business anymore. Even the smallest of entrepreneurs find they have immediate access to a global marketplace via the Internet, and larger companies continue to find new ways to maximize their successes throughout the world. We asked our panelists this week to comment on how they see globalization impacting the physical security market. Their broad-ranging responses emphazis the opportunities and challenges of succeeding the global marketplace.
The U.S. physical security market will be focused on Las Vegas this week and the big ISC West trade show for 2015. But what should attendees expect when they get to Sin City? We asked our panelists for their insights into what will be making “big news” at this year’s show. Fortunately, the suspense is almost over!
Cybersecurity vulnerabilities of IP physical security systems have long been the industry’s “elephant in the room.” Perhaps as a function of salesmanship, the possibility of a cybersecurity attack on a physical security system has sometimes been downplayed or dismissed. However, video from hacked cameras streaming on the Internet cannot be ignored, nor can the possibility that an enterprise’s system could be hacked using back-door entry through an unprotected physical security component. Such is a downside of our new networked world. Lately, there has been much more talk in the industry about cybersecurity, so we wanted to get our Expert Panelists to add their views. This week we asked our panel: What are the cybersecurity vulnerabilities of IP based systems? How well does our industry address these vulnerabilities and what do we need to do better?
The retired police officer who takes a cushy job as a security director is almost a cultural cliché. Like any cliché, the idea has roots in the real world, where police departments have often been a rich source of the security industry’s leadership talent. Former military personnel often find their way to the security industry, too, and realize that the familiar elements of discipline and command structure translate well. We wondered about the impact of this historic trend and whether it is changing as the security industry itself evolves. We asked our panel: What effect has the traditional recruitment of corporate and institutional security leaders from the law enforcement and/or military communities had on the security marketplace? Is the tradition changing and why?
Articles by Brian Matthews
Organizations are looking to emerging technologies to enhance security and communications Verint 2014/2015 Review and Forecast: The overall economy was solid in 2014, with large regions and industries continuing to grow and emerging markets revealing even greater opportunity. We are seeing emerging signs of strength in industries like Higher Education that are expanding their security horizons, or taking note of global events. Additionally, security organizations continue to evolve and play a key role in the organization. The security executive position is expanding from the monitoring and investigation of alarms to more strategic areas including risk mitigation and business continuity. This transition has resulted in far greater consideration for PSIM solutions, such as Verint SMC, than in previous years. 2014 was a banner year for Verint in the security and surveillance market. We released our Verint Situation Management Center (SMC) platform, which unifies a wide range of sensors and systems into a centralized, user-friendly environment. Multiple systems can be integrated with SMC, including communications, access control, panic alarms, intrusion detection, fire, building management systems, IP cameras, video analytics and various external databases. SMC is critical in today’s market because more customers are looking to merge multiple security, life safety and business optimization systems into one platform. Too often, accessing the information from these various platforms is clumsy and labor-intensive, and it’s difficult to manage individual data streams, making collaboration nearly impossible. Situation management platforms offer users enhanced response time and effectiveness. Operators can view the location of fixed and mobile sensors and areas and targets of interest all through a single pane of glass. They can identify incidents before they impact business operation by leveraging Web-based data, security, traffic, government and commercial sensors and data sources. This allows operators to be more efficient and collaborative, while realising strong training and compliance. The progression of security and its function within an organization will continue to evolve and grow because it is now an important discussion point within the C-suite. In the past, security was often looked at as simply a cost center to manage but now, as more departments touch the value of video surveillance, security has increased its importance across the entire organization. SMC is critical in today’s market because more customers are looking to merge multiple security, life safety and business optimization systems into one platform This focus on delivering organizational value will further accelerate the transition from an emphasis on managing events to an expanded state of situational awareness. Risk mitigation will become an even greater responsibility of today’s security organization. With that, buyers are broadening their perspective on addressing today’s need by looking ahead to what will give them an advantage tomorrow, both in advancing the organization’s security strategy and in minimizing cost over time. This not only has to do with handling today’s security challenge, but tomorrow’s Big Data opportunity. Leveraging the power of Big Data can help a variety of functions across a CEOs spectrum be more proactive in addressing business issues and identifying ways to reduce operating costs. From a selling perspective, this represents a fundamental shift in the conversation. We are no longer talking about specific product capabilities, features or functionalities in an IT or Security silo; the conversation is now about how IT can play an integral role providing solutions to solve large organizational challenges that are important to the entire C-suite of leaders. Changing the conversation from a product specific conversation to a solutions-based conversation won’t happen overnight but it will be integral to integrators’ and organizational stakeholders’ success in 2015 and beyond. It is an exciting time to be in the security market. Organizations are looking to emerging technologies to enhance security and communications, which leads to more opportunity for security technology innovators. In addition, our customers are leveraging technologies in new ways. Educational institutions are gaining new levels of situational intelligence by enhancing real-time incident management, field communication and force management. The public is being asked to take on a role within Safe City initiatives by reporting suspicious activity with mobility reporting. Mobile applications are growing at a high rate because these devices can ‘act’ as roving visual and text data sensors to extend the overall reach of security intelligence. All of these trends and more point to a very robust future for the market. We as a company look forward to helping our customers achieve their goals in the coming year. See the full coverage of 2014/2015 Review and Forecast articles here
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload