Verint Insights Q1 2020
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
INSIGHTS
S E C U R I T Y + T E C H N O L O G Y + S T R A T E G Y Q1 2020
Protect What
Matters Most
Inside Verint's focus to ensure customers
achieve their security goals.
PLUS
A review of
Impact 2020
and preview of
ISC West
E M P O W E R I N G
SECURITY
LEADERS
v e r i n t . c o m
An Insightful View
5
Outlining the Steps to Define and Protect Mission-
Critical Assets
36
48
Nearly every single organization, whether a small business or large international
enterprise, goes through non-optional steps to determine
how best to comprehensively secure their environment. This process often starts
with identifying the organization’s top priorities, which requires them to ask
themselves a critical question: “What matters most?”
In order to establish strategic groundwork for implementing
a security solution, a company must take the time to pinpoint the
mission-critical aspects to their businesses — the assets that need to be
protected at all costs. Whether it’s protecting employees at a high-risk, remote
site or a hospital keeping a watchful eye over sensitive patient information,
varying organizations possess different and unique needs when it comes to
protecting what matters most — but the value and principle is still the same
across the board.
It can be argued that the insight is the key to safeguarding valuable assets. At
Verint, we encourage businesses to protect what matters most to them, and it’s
deeply entrenched in our mission to help by providing access to essential and
relevant intelligence. And determining how to secure the items that matter most to
each organization all starts with the first step of identifying which assets are the
most critical.
A L A N S T O D D A R D
VP and General Manager, Verint SIS
INSIGHTS MAGAZINE |3
www.verint.com
E T G
O C I A L S
E A R N H O W W E A R E
L
M P L I F Y I N G O U R S O C I A L
A
E D I A E F F O R T S W I T H A
M
E W E M P L O Y E E A N D
N
A R T N E R E N G A G E M E N T
P
R O G R A M .
P
O N T A C T T H E M A R K E T I N G
C
E A M T O G E T T H E D E T A I L S .
T
V I D E O : T H E
H E A R T O F
T H E S O C
Data generated from IoT devices is growing
at a rapid rate. Everything from smartphones
and computers to our cars and TVs is
capturing information on daily behaviors.
More than ever, businesses are looking to
develop an IoT strategy to analyze data to
benefit their bottom line. However, many
companies feel that establishing a strategic
approach to IoT is complicated. In reality, the
beginning of an IoT plan is a simple as
looking out your window: the existing video
surveillance investments your company
already has in place are the exact place to
start.
Video as Intelligence
Most business operations and security
decisions are based on data. When it comes
to protecting what matters most to an
organization, business leaders rely on
information from a multitude of systems and
solutions, such as video, access control,
building management, weather systems, and
more, to ensure situational awareness.
However, video has been the most
prevalently used tool. According to a study by
Seagate, approximately 566 petabytes of data
was being generated in one day from
surveillance cameras installed worldwide in
2016. This daily volume is estimated to reach
3,500 petabytes by 2023.
INSIGHTS MAGAZINE | 5
www.verint.com
However, this influx of video data can be
overwhelming, difficult to understand, and
time-consuming to analyze. In most cases,
manual processes are needed to
synchronize an event across all security
components for full awareness, which can
increase the risk to people and property. For
example, when operators are overseeing
operations from the control room, it can be
challenging to understand the events as
they are presented from multiple sources
and dashboards. Additionally, with an
abundance of data points, investigations can
quickly become burdensome and ineffective.
For operators to make quick decisions and
deploy the best response to a given
situation, they need a more holistic view:
one that connects the dots and breaks down
silos to present a complete picture of what’s
happening across the entire threat
landscape. Also, with the introduction of
platforms that value video as the central
piece of the operations center, businesses
can work more proactively, analyzing data to
make decisions before problems arise. With
a single view of operations, operators can:
Gain a complete understanding of the
situation through the combination of IoT
data, GIS maps, event management, and
bi-directional data sharing across
systems.
Ensure contextual visibility and control
over events through both live and
recorded video, as well as a graphical
representation of all devices (not just
video!) and their current status.
Implement faster response with alarm
management tools and automatically
manage multiple events in one pane of
glass.
Additionally, a centralized video-focused
approach allows information and intelligence
to be shared easily with external agencies,
employees, citizens, and first responders,
which is especially critical in the event of a
safety incident where rapid response is
paramount.
Intelligence On-Demand
To stay one step ahead and leverage
automation and intelligence gathering at
even higher levels, businesses need to be
able to access data remotely. Mobile
devices, such as smartphones, help
organizations gain new levels of visibility
into personal safety. For example, there are
mobile applications that enable users to
immediately alert security to a potential
issue via their mobile device no matter their
location. Operators can then obtain a realtime
view of these users, their site, and their
current status.
Additionally, mobile video applications can
be used to help businesses be more aware
of a situation at any given time. Data can be
pushed to mobile phones to provide
information on an incident so that they know
more about the event before arriving at the
scene. Field personnel can also use these
applications to send video back to a
command center if needed. As you can see,
overall, mobility helps ensure that the
intelligence gathered from IoT sensors can
be accessed on-the-go.
Looking Ahead
As technology providers, we need to focus
on innovation to help our customers meet
the complex and evolving business and
security requirements in today’s modern
environments. As businesses look to the
worlds of Big Data, artificial intelligence,
customer engagement, and the IoT, our
goal is to help organizations access the
information necessary to gain greater
awareness over operations and
infrastructure while enhancing safety for
people around the world. The days of
boxed, cookie cutter solutions ar over.
Investments must go above and beyond to
empower leaders to be more efficient,
effective, and proactive. In our opinion,
that’s the driver behind innovation.
INSIGHTS MAGAZINE | 6
www.verint.com
, perimeter detection, and analytics — need to be
brought together under a common metadata layer.
An operator also needs an intuitive system interface
that allows him to easily understand the correlated
information. An advanced VMS can illustrate events
with a geographic map of the area, allowing operators
to better picture where actions are occurring and take
decisive action.
The Role of Video in Being Proactive
The latest tragic events have forced organizations to
move from simply reacting — using technology to
detect and investigate a security event — to a
proactive approach, providing the ability to see
preliminary factors and possibly prevent a negative
incident. Video plays a key role in this switch, as the
use of analytics can alert operators to potential bad
actors, from specifically geofenced areas to any
movement within certain timeframes. In a retail
setting, for example, it is helpful to identify a crime
before it takes place. In high-level environments such
as airports, early detection is crucial.
Enhancing Investigations
Early detection and threat mitigation, while ideal, are
not always possible in today’s evolving risk
landscape. Ensuring that an organization’s forensic
investigation process is effective is critical.
INSIGHTS MAGAZINE | 9
In following up from a security incident, a videofocused
command center can help investigators
streamline their work, achieve learnings faster, and
improve the organization’s security performance.
By being able to view all of security information in one
place, an operator can better assemble key timelines
and facts about a perpetrator. Additionally, an
advanced search engine for data-driven investigations
provides visual representation of correlated data
collected from both video sources and integrated
systems. Manual collection and evaluation of multisystem
data and sensors is no longer needed to set
up an investigation.
As new and advanced technologies continue to enter
the security space, it may seem as though video is
taking a backseat to the latest intelligent capabilities.
But this will never be the case. Video will always exist
as the core to any system, and with the use of an
advanced VMS, the possibilities grow.
Unifying existing security systems into a single
management solution that prioritizes video at the
center enables organizations to experience simpler
security operations with accurate visualization,
effective response and investigation, and improved
efficiency. These qualities are all paramount to
enhance awareness and maximize control.
www.verint.com
M A R K E T S
The Value of
Transportation SOCs
and the Lesson for
Businesses
When people are traveling — whether it’s a
short trip to work or a vacation across the
country — they are fortunate to have a wide
variety of options to choose from, such as
cars, trains, ferries, and planes. On a larger
scale, these transportation methods also play
a critical role in day-to-day activities that
underpin economic and social stability. The
effective transport of goods and products
across state and country lines is paramount
to facilitating a thriving environment — one
that relies on these items to reach their
destinations in a safe and efficient manner.
It is therefore critical that these intricate and
interconnected transportation systems
leverage the appropriate technology to
protect citizens and prevent disruption.
Individuals, equipment, and cargo must be
secured and protected at every step of the
way, and doing so depends on the unique
needs of various transportation sectors. The
pathways used for travel, like roads or
railways, for example, need to be monitored
constantly to ensure they are clear and
running smoothly. Hubs, such as a train
station or airport, must oversee a variety of
operations, from technical maintenance to
retail. A ferry terminal’s perimeter detection
has to incorporate water elements, while a
train station has to ensure that the railways
leading toward or away from the station aren’t
tampered with or obstructed.
All forms of transportation need to have the
right systems in place to protect what matters
most. The transportation industry also faces
an inherent risk of terrorism and other
threats, whether they are internal or external,
intentional or accidental. While the exact
requirements may vary, all of these
environments demand a comprehensive and
intelligent security solution that can bring
together various elements and associate
events to improve situational intelligence.
VMS and Analytics
A video management system can be crucial
in mitigating security concerns, while
analytics engines that have access to
metadata layers across security platforms
and devices can catch precipitating factors
for key incidents, making an organization’s
security posture more proactive. The ability to
correlate events across different
infrastructures and then locate vulnerabilities
is crucial in providing an effective event
response. With multi-tiered environments, a
VMS in the transportation sector needs to
have efficient ways of communicating
information, such as through representing
alarm and system information on a visual
map of the premises.
INSIGHTS MAGAZINE | 10
In addition to security threats, transportation
networks face logistical concerns every day,
with items that need to be appropriately
monitored and addressed in order to keep
operations running smoothly. An advanced
VMS can be instrumental in the investigation
of equipment breakdown to diagnose
operational problems or monitor device health,
and a properly set up command center will be
poised to act quickly on these matters.
An intelligent SOC is comprised of two key
functions: aggregating data and acting upon it.
The more data is associated in meaningful
ways, the more informed a course of action
can be during a security incident or suspicious
event. The best way to increase intelligence
and improve situational awareness is to
connect data from different systems. An
abnormal motion sensor alert could mean a
variety of things, but when that incident is
paired with video system data and access
control information, it illustrates a more
complete picture of the event in progress.
A command center gathers and connects data
points, but it is the operator that uses it to
make a decision. It takes an intelligent system
to present the right types and amounts of data
so that an operator can make the best
decision, instead of being under-informed or
distracted with unnecessary data points.
The Link Between Intelligence and Action
The next step to ensuring protection is
connecting the intelligence that’s gathered and
analyzed in an SOC with response teams.
Organizations require comprehensive
emergency dispatch solutions that enable
situational awareness, faster and more
efficient emergency response, and enhanced
communications.
By leveraging mobile technologies within an
intelligent SOC, security teams can share
relevant and real-time information with first
responders, making for a safer and more
efficient action plan during security incidents.
Combining situational awareness and mobile
dispatch allows the user to oversee an entire
situation and direct response.
The Complete Picture
A key lesson to note is that transportation
networks are a prime example of many
security technologies in continually changing
threat landscapes. These applications
exemplify how organizations need to utilize
and monitor a variety of technologies to
support the end goals of safety and business
continuity. Ultimately, all organizations are
tasked with protecting the employees, patrons,
and merchandise in their charge.
www.verint.com
PROTECT WHAT MATTERS MOST
SECURITY
INTELLIGENCE
SOLUTIONS
WWW.VERINT.COM