Security Technology Executive

MAY-JUN 2018

Issue link: https://securitytechnologyexecutive.epubxp.com/i/994589

Contents of this Issue

Navigation

Page 29 of 79

30 SECURIT Y TECHNOLOGY E XECUTIVE • May/June 2018 • www. SecurityInfoWatch.com A s networked physical surveillance and secu - rity systems continue to deliver better secu- rity, higher levels of integration, virtually unlimited scalability and easier operation, the migration from traditional analog solutions to IP-enabled solutions continues to accelerate. This ongoing transformation within enterpris - es is also driving the integration of auto- mated system verification solutions that work with these digital systems, ensuring continuous operation and notifying sys - tem administrators of impending failures, degradation, or cyber-criminal activity. Without combining IP-based physical security systems with automated verifi- cation, really bad things can and do hap- pen – most importantly is missing video evidence, but can also extend into failing compliance standards (like PCI), corporate and brand reputations being damaged, and higher risks to people and property. In other words, risks and consequences that few organizations would accept. Advanced Systems Require an Automated Solution Enterprises have historically relied on humans to physically monitor surveil- lance and security system performance and operation. But today 's advanced networked systems running on IP infra- structure are much more complex by nature. With analog video surveillance, a system operator seeing video on a display could almost always count on it being stored correctly. In an IP-based system seeing video on a monitor says nothing about it being stored properly – you need to independently verify that the video evidence is stored and avail- able for use. This is a real problem on many levels, especially for maintaining the system and avoiding downtime, but also for compliance and cybersecurity. This calls for more proactive and auto- mated approaches to system verification models so that system operators can be instantly alerted of an impending and/or active system failure, and dispatch techni- cians to address the specific source of the disruption. Otherwise, it is often difficult to tell where the source of the problem lies within a complex network – malfunc- tioning cables, hackers having breached the security network, a Video Manage- ment System (VMS) integration issue, by a network communication issue or the possibility that the camera itself has simply malfunctioned. As a result, IT and security personnel are increasingly look- ing to automated system verification solu- tions that provide a proactive reporting model to quickly resolve system outages and virtually put an end to missing video. With proactive reporting enabled by an automated system verification solution, the network itself reports on any issues that may be affecting your surveillance or security system, con- tinuously keeping watch on the entire system, and sending alerts and noti- fications to the integrator or operator should a problem arise. This allows system operators to quickly and easily assess what remediation is required, establish a maintenance plan, and gath- er the necessary resources before tech- nicians are dispatched to the location. CRITICAL INFRASTRUCTURE Automated solutions help to dramatically reduce the costs involved in maintaining and operating security systems. Image Courtesy of BigStock.com Automated System Verification Can Be a Proactive Systems Approach Today's complex enterprise networks mandate sophisticated checks and balances By Bud Broomhead

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - MAY-JUN 2018