Security Technology Executive

JUL-AUG 2016

Issue link:

Contents of this Issue


Page 22 of 75

July/August 2016 • SECURITY TECHNOLOGY EXECUTIVE 23 21st Century Technology Planning Technology planning in the 21 st centu- ry has distinct differences from plan- ning for the previous century's tech- nology, some of which are shown in Table 1 above. Scenarios and Roadmap Planning Security risk scenarios are an effective way to characterize the risk picture for security stakeholders. They are also a quick and effective way to com- municate the value of any particular technology. For example, here is a retail store gunpoint hold-up scenario, inspired by A robber in a hoody, wearing gloves, and orders the cashier to open the cash drawer and step away. The cashier cannot press the silent alarm button. The robber bypasses the duress device in the cash drawer, takes the cash, and safely exits the store. Typically, at that point, the employee would call the police, but the police would arrive several minutes after robber's departure. There would be no clear video of robber's face in the store cameras. The typical outcome: the robber gets away with the crime. Instead, with new tablet-based Point-of-Sale (POS) system technol- ogy, the cashier presses an unmarked holdup button on checkout screen plus the button to open the cash regis- ter. The camera built into POS screen tablet gets facial a close-up facial picture of robber taking the cash. The police car was rolling before the cashier stepped away from the cash drawer. The POS system sends an email to police containing a picture of the robber, the picture of store floor showing where the customers and employees are, plus a link to a web page with live video from all store Table 1. Some roadmap planning differences between technology eras. Era 20 th Century Century 21 st Century Century Basis of evaluation Security products and their integration capabilities Security products and technology trends, information technology trends, integration capabilities of non-security sensors, devices and systems Focus of Evaluation Systems and controlled devices, and their integration Applications, intelligent devices and their integration Architecture Server and workstation computers with client/server software, locally connected devices Web-based with local or cloud-based servers, and smart devices, securely accessible anywhere Integrations System to system (one main system to a few other systems) Many-to-many connections (local, remote and cloud-based applications, smart devices, and smart sensors) Standards Few; some it industry and some security industry Hundreds to thousands of emerging standards, both security industry standards and it industry standards End Users A few in fixed locations Many users located anywhere, such as a university's faculty and staff, students and their parents, connected via smart mobile devices Operational Value Based upon system and controlled device capabilities, and local integrations for central data collection, providing situational awareness to a few local users Based upon the capabilities of many applications and systems, and smart device capabilities, with two-way human interaction, achieving distributed situational awareness to a large number of users Operations Mode Central command and control; human interactions with first responders Centrally-coordinated or monitored actions by situationally-aware individuals and teams; automated interactions with first responders Non-Radio Communications Capabilities Text messages, email, and one-to- many message broadcasting Multiple, parallel, automated messaging based upon real-time unfolding situation status, with role-based distribution of live data to specific individuals and teams Situational Awareness Central awareness used for command and control purposes Awareness shared with any or all users local and remote, with two-way communication, and with well-coordinated adaptive response capabilities Analytics Capabilities Simple analytics used for individual event alarming and object/person recognition Advanced analytics with multiple sensor fusion, metadata generation and collection, adaptive and predictive algorithms, self-learning capabilities, including data-sharing, enabling autonomous operation of GPS-aware, task- performing robots, and self-piloting land, water and air vehicles System Constraints Defined by technology limitations (such as network throughput and data storage capacities) Rarely (and only temporarily) constrained by technology limitations; primarily constrained by the insightfulness of the design and configuration of the security systems infrastructure Legacy Technology Usually replaced by the new technology Can often be enhanced or have its life extended by integration with new technology Affordability Most projects highly constrained by budgetary limitations Falling technology prices and rising technology capabilities continually increase affordability and security value Tech Infrastructure Management 20 th century manual processes, like officers monitoring cameras on the midnight shift 21 st century automated monitoring, analytics and diagnostics, and automated workflow processes, including products purpose-built for physical security systems; akin to IT Infrastructure Analytics and IT Service Management workflow automation People, Process and Technology Approach Find the best technology you can afford, then make up for its shortcomings with people and process measures. Get deep insight into the organization's risk scenarios. Dream up ideal ways of addressing the risks. Find technology to provide the operational capabilities that fit your intended people and process measures. If it doesn't exist now, it probably will in the very near future.

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - JUL-AUG 2016