Verint Insights Q1 2020

rhianna.hile

INSIGHTS

S E C U R I T Y + T E C H N O L O G Y + S T R A T E G Y Q1 2020

Protect What

Matters Most

Inside Verint's focus to ensure customers

achieve their security goals.

PLUS

A review of

Impact 2020

and preview of

ISC West


E M P O W E R I N G

SECURITY

LEADERS

v e r i n t . c o m


An Insightful View

5

Outlining the Steps to Define and Protect Mission-

Critical Assets

36

48

Nearly every single organization, whether a small business or large international

enterprise, goes through non-optional steps to determine

how best to comprehensively secure their environment. This process often starts

with identifying the organization’s top priorities, which requires them to ask

themselves a critical question: “What matters most?”

In order to establish strategic groundwork for implementing

a security solution, a company must take the time to pinpoint the

mission-critical aspects to their businesses — the assets that need to be

protected at all costs. Whether it’s protecting employees at a high-risk, remote

site or a hospital keeping a watchful eye over sensitive patient information,

varying organizations possess different and unique needs when it comes to

protecting what matters most — but the value and principle is still the same

across the board.

It can be argued that the insight is the key to safeguarding valuable assets. At

Verint, we encourage businesses to protect what matters most to them, and it’s

deeply entrenched in our mission to help by providing access to essential and

relevant intelligence. And determining how to secure the items that matter most to

each organization all starts with the first step of identifying which assets are the

most critical.

A L A N S T O D D A R D

VP and General Manager, Verint SIS

INSIGHTS MAGAZINE |3

www.verint.com




E T G

O C I A L S

E A R N H O W W E A R E

L

M P L I F Y I N G O U R S O C I A L

A

E D I A E F F O R T S W I T H A

M

E W E M P L O Y E E A N D

N

A R T N E R E N G A G E M E N T

P

R O G R A M .

P

O N T A C T T H E M A R K E T I N G

C

E A M T O G E T T H E D E T A I L S .

T



V I D E O : T H E

H E A R T O F

T H E S O C

Data generated from IoT devices is growing

at a rapid rate. Everything from smartphones

and computers to our cars and TVs is

capturing information on daily behaviors.

More than ever, businesses are looking to

develop an IoT strategy to analyze data to

benefit their bottom line. However, many

companies feel that establishing a strategic

approach to IoT is complicated. In reality, the

beginning of an IoT plan is a simple as

looking out your window: the existing video

surveillance investments your company

already has in place are the exact place to

start.

Video as Intelligence

Most business operations and security

decisions are based on data. When it comes

to protecting what matters most to an

organization, business leaders rely on

information from a multitude of systems and

solutions, such as video, access control,

building management, weather systems, and

more, to ensure situational awareness.

However, video has been the most

prevalently used tool. According to a study by

Seagate, approximately 566 petabytes of data

was being generated in one day from

surveillance cameras installed worldwide in

2016. This daily volume is estimated to reach

3,500 petabytes by 2023.

INSIGHTS MAGAZINE | 5

www.verint.com


However, this influx of video data can be

overwhelming, difficult to understand, and

time-consuming to analyze. In most cases,

manual processes are needed to

synchronize an event across all security

components for full awareness, which can

increase the risk to people and property. For

example, when operators are overseeing

operations from the control room, it can be

challenging to understand the events as

they are presented from multiple sources

and dashboards. Additionally, with an

abundance of data points, investigations can

quickly become burdensome and ineffective.

For operators to make quick decisions and

deploy the best response to a given

situation, they need a more holistic view:

one that connects the dots and breaks down

silos to present a complete picture of what’s

happening across the entire threat

landscape. Also, with the introduction of

platforms that value video as the central

piece of the operations center, businesses

can work more proactively, analyzing data to

make decisions before problems arise. With

a single view of operations, operators can:

Gain a complete understanding of the

situation through the combination of IoT

data, GIS maps, event management, and

bi-directional data sharing across

systems.

Ensure contextual visibility and control

over events through both live and

recorded video, as well as a graphical

representation of all devices (not just

video!) and their current status.

Implement faster response with alarm

management tools and automatically

manage multiple events in one pane of

glass.

Additionally, a centralized video-focused

approach allows information and intelligence

to be shared easily with external agencies,

employees, citizens, and first responders,

which is especially critical in the event of a

safety incident where rapid response is

paramount.

Intelligence On-Demand

To stay one step ahead and leverage

automation and intelligence gathering at

even higher levels, businesses need to be

able to access data remotely. Mobile

devices, such as smartphones, help

organizations gain new levels of visibility

into personal safety. For example, there are

mobile applications that enable users to

immediately alert security to a potential

issue via their mobile device no matter their

location. Operators can then obtain a realtime

view of these users, their site, and their

current status.

Additionally, mobile video applications can

be used to help businesses be more aware

of a situation at any given time. Data can be

pushed to mobile phones to provide

information on an incident so that they know

more about the event before arriving at the

scene. Field personnel can also use these

applications to send video back to a

command center if needed. As you can see,

overall, mobility helps ensure that the

intelligence gathered from IoT sensors can

be accessed on-the-go.

Looking Ahead

As technology providers, we need to focus

on innovation to help our customers meet

the complex and evolving business and

security requirements in today’s modern

environments. As businesses look to the

worlds of Big Data, artificial intelligence,

customer engagement, and the IoT, our

goal is to help organizations access the

information necessary to gain greater

awareness over operations and

infrastructure while enhancing safety for

people around the world. The days of

boxed, cookie cutter solutions ar over.

Investments must go above and beyond to

empower leaders to be more efficient,

effective, and proactive. In our opinion,

that’s the driver behind innovation.

INSIGHTS MAGAZINE | 6

www.verint.com




, perimeter detection, and analytics — need to be

brought together under a common metadata layer.

An operator also needs an intuitive system interface

that allows him to easily understand the correlated

information. An advanced VMS can illustrate events

with a geographic map of the area, allowing operators

to better picture where actions are occurring and take

decisive action.

The Role of Video in Being Proactive

The latest tragic events have forced organizations to

move from simply reacting — using technology to

detect and investigate a security event — to a

proactive approach, providing the ability to see

preliminary factors and possibly prevent a negative

incident. Video plays a key role in this switch, as the

use of analytics can alert operators to potential bad

actors, from specifically geofenced areas to any

movement within certain timeframes. In a retail

setting, for example, it is helpful to identify a crime

before it takes place. In high-level environments such

as airports, early detection is crucial.

Enhancing Investigations

Early detection and threat mitigation, while ideal, are

not always possible in today’s evolving risk

landscape. Ensuring that an organization’s forensic

investigation process is effective is critical.

INSIGHTS MAGAZINE | 9

In following up from a security incident, a videofocused

command center can help investigators

streamline their work, achieve learnings faster, and

improve the organization’s security performance.

By being able to view all of security information in one

place, an operator can better assemble key timelines

and facts about a perpetrator. Additionally, an

advanced search engine for data-driven investigations

provides visual representation of correlated data

collected from both video sources and integrated

systems. Manual collection and evaluation of multisystem

data and sensors is no longer needed to set

up an investigation.

As new and advanced technologies continue to enter

the security space, it may seem as though video is

taking a backseat to the latest intelligent capabilities.

But this will never be the case. Video will always exist

as the core to any system, and with the use of an

advanced VMS, the possibilities grow.

Unifying existing security systems into a single

management solution that prioritizes video at the

center enables organizations to experience simpler

security operations with accurate visualization,

effective response and investigation, and improved

efficiency. These qualities are all paramount to

enhance awareness and maximize control.

www.verint.com



M A R K E T S

The Value of

Transportation SOCs

and the Lesson for

Businesses


When people are traveling — whether it’s a

short trip to work or a vacation across the

country — they are fortunate to have a wide

variety of options to choose from, such as

cars, trains, ferries, and planes. On a larger

scale, these transportation methods also play

a critical role in day-to-day activities that

underpin economic and social stability. The

effective transport of goods and products

across state and country lines is paramount

to facilitating a thriving environment — one

that relies on these items to reach their

destinations in a safe and efficient manner.

It is therefore critical that these intricate and

interconnected transportation systems

leverage the appropriate technology to

protect citizens and prevent disruption.

Individuals, equipment, and cargo must be

secured and protected at every step of the

way, and doing so depends on the unique

needs of various transportation sectors. The

pathways used for travel, like roads or

railways, for example, need to be monitored

constantly to ensure they are clear and

running smoothly. Hubs, such as a train

station or airport, must oversee a variety of

operations, from technical maintenance to

retail. A ferry terminal’s perimeter detection

has to incorporate water elements, while a

train station has to ensure that the railways

leading toward or away from the station aren’t

tampered with or obstructed.

All forms of transportation need to have the

right systems in place to protect what matters

most. The transportation industry also faces

an inherent risk of terrorism and other

threats, whether they are internal or external,

intentional or accidental. While the exact

requirements may vary, all of these

environments demand a comprehensive and

intelligent security solution that can bring

together various elements and associate

events to improve situational intelligence.

VMS and Analytics

A video management system can be crucial

in mitigating security concerns, while

analytics engines that have access to

metadata layers across security platforms

and devices can catch precipitating factors

for key incidents, making an organization’s

security posture more proactive. The ability to

correlate events across different

infrastructures and then locate vulnerabilities

is crucial in providing an effective event

response. With multi-tiered environments, a

VMS in the transportation sector needs to

have efficient ways of communicating

information, such as through representing

alarm and system information on a visual

map of the premises.

INSIGHTS MAGAZINE | 10

In addition to security threats, transportation

networks face logistical concerns every day,

with items that need to be appropriately

monitored and addressed in order to keep

operations running smoothly. An advanced

VMS can be instrumental in the investigation

of equipment breakdown to diagnose

operational problems or monitor device health,

and a properly set up command center will be

poised to act quickly on these matters.

An intelligent SOC is comprised of two key

functions: aggregating data and acting upon it.

The more data is associated in meaningful

ways, the more informed a course of action

can be during a security incident or suspicious

event. The best way to increase intelligence

and improve situational awareness is to

connect data from different systems. An

abnormal motion sensor alert could mean a

variety of things, but when that incident is

paired with video system data and access

control information, it illustrates a more

complete picture of the event in progress.

A command center gathers and connects data

points, but it is the operator that uses it to

make a decision. It takes an intelligent system

to present the right types and amounts of data

so that an operator can make the best

decision, instead of being under-informed or

distracted with unnecessary data points.

The Link Between Intelligence and Action

The next step to ensuring protection is

connecting the intelligence that’s gathered and

analyzed in an SOC with response teams.

Organizations require comprehensive

emergency dispatch solutions that enable

situational awareness, faster and more

efficient emergency response, and enhanced

communications.

By leveraging mobile technologies within an

intelligent SOC, security teams can share

relevant and real-time information with first

responders, making for a safer and more

efficient action plan during security incidents.

Combining situational awareness and mobile

dispatch allows the user to oversee an entire

situation and direct response.

The Complete Picture

A key lesson to note is that transportation

networks are a prime example of many

security technologies in continually changing

threat landscapes. These applications

exemplify how organizations need to utilize

and monitor a variety of technologies to

support the end goals of safety and business

continuity. Ultimately, all organizations are

tasked with protecting the employees, patrons,

and merchandise in their charge.

www.verint.com


PROTECT WHAT MATTERS MOST

SECURITY

INTELLIGENCE

SOLUTIONS

WWW.VERINT.COM

More magazines by this user
Similar magazines