RiskUKAugust2017
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Advertisement Feature<br />
Reaping the Benefits of Full Security Integration<br />
The widespread use of<br />
truly integrated<br />
systems is one of the<br />
most important<br />
developments in the<br />
security sector for<br />
decades. With a heavy<br />
reliance on software,<br />
using open systems<br />
has gone from being a<br />
desirable selling point<br />
to a necessity in only<br />
a few years, writes<br />
John Davies<br />
John Davies:<br />
Managing Director of TDSi<br />
As well as the obvious security advantages,<br />
there’s potentially a whole new world of<br />
opportunities for operators thanks to the<br />
arrival of the Internet of Things (IoT), but at the<br />
same time there are additional factors that<br />
need to be considered which may not have<br />
been an issue in the past.<br />
It might seem obvious at first glance, but this<br />
is a valid question: ‘Why does the security<br />
industry and its customers need full<br />
integration?’ Put simply, if all the components<br />
within the security and wider IT network have<br />
the ability to interact, they can offer so much<br />
more than their individual capabilities. This is<br />
certainly something that has transformed the<br />
way in which organisations think about their<br />
security systems and how they work in the<br />
wider context of their business systems.<br />
From passive, yet rather elaborate electronic<br />
doors/locks and basic CCTV over the past few<br />
decades, we now have Artificial Intelligence and<br />
connected surveillance systems with an in-built<br />
analytics capability which not only match, but<br />
in practice usually outperform a human<br />
operator fulfilling the same role.<br />
Reducing costs, broadening choice<br />
Another key factor in the popularity of<br />
integrated networks is cost. Producing<br />
compatible systems makes it both simpler and<br />
cheaper for customers to choose, purchase and<br />
use the most efficient components for their<br />
needs. Equally, for manufacturers and suppliers<br />
it’s more cost-effective to produce standardised<br />
products. The IoT is going a long way towards<br />
driving demand and the security industry has<br />
sensibly taken this on board, catering heavily<br />
for these market forces.<br />
Within the security industry itself there have<br />
also been interesting and helpful<br />
developments. The International<br />
Electrotechnical Commission recently adopted<br />
ONVIF Profile A and C as the de facto new<br />
international standard for access control which<br />
will offer a truly universal benchmark for<br />
security software and hardware integration.<br />
Naturally, full integration also provides<br />
greater choice, offering the ability to ‘mix and<br />
match’ different components to find the most<br />
suitable and bespoke solution. On the face of<br />
it, it may seem that older legacy systems will<br />
struggle to cope with this, but actually the<br />
flexibility of a fully-integrated approach means<br />
that isn’t necessarily the case. Modern<br />
integrated open protocol systems are often<br />
able to ‘bridge the gap’ in a way that<br />
proprietary systems would simply have failed to<br />
do in the past.<br />
It’s also somewhat ironic that developments<br />
in the latest technology may actually make it<br />
possible for some older systems to continue<br />
being used beyond their expected lifespan.<br />
Mining and analysing data<br />
With integrated systems, the benefits go<br />
beyond just the security provision. If an<br />
intelligent system can learn the behaviours and<br />
trends of people and property within its remit,<br />
it can then predict patterns and, from this, help<br />
to increase efficiencies across the whole<br />
organisation and its facilities.<br />
By mining the data from security systems, it’s<br />
possible to form a detailed picture of any<br />
controlled area and the activity going on within<br />
it. This is a powerful tool for any organisation,<br />
affording an instant snapshot of people<br />
movement or the use of resources while also<br />
monitoring for security threats.<br />
A good example of such data analysis in<br />
practice is the widespread integration of<br />
security with IT infrastructure, power, lighting,<br />
heating and ventilation systems. As CCTV and<br />
intruder detection systems can equally check<br />
the real-time occupancy of a designated area,<br />
these sensors can advise when the correct<br />
individuals are attempting to log-in to the<br />
network. Equally so, when environmental<br />
systems are not required, these solutions can<br />
intelligently lower energy consumption (where<br />
possible) and ensure secured access to the<br />
host organisation’s IT network.<br />
This ability to assess a given situation<br />
renders security components the ideal ‘eyes<br />
and ears’ of more intelligent automated<br />
systems. Such technology is now being used to<br />
assess and report on people traffic in busy<br />
office spaces. Security and detection systems<br />
can ascertain who’s entering the space and<br />
where they need to go and then direct them to<br />
the most appropriate route for their destination<br />
(be that a lift, a ‘hot desk’ or a meeting room).<br />
Going forward, security providers and<br />
operators will need to be even more aware of<br />
how their whole organisation works (right down<br />
to a granular level) when it comes to systems<br />
integration. This may seem somewhat<br />
daunting, but with the right planning and<br />
respect for their needs and benefits, the<br />
development and evolution of fully-integrated<br />
systems is set to continue being a key driving<br />
force for the security industry, in turn offering<br />
many more benefits than disadvantages.