Which security systems are more proactive than reactive?
Editor Introduction
The advantages of security systems as forensic and investigative tools are well understood and demonstrated in the market. However, the new trend is toward systems that are useful in real-time and that even predict a security event, before it happens.
We asked this week’s Expert Panel Roundtable: Which security systems are becoming more proactive than reactive?
While the nature of our industry dictates that some work will always be reactive, the fact is that more and more should be proactive. We have the tools and the experience to put plans in place for our clients and reach a level of preparedness that wasn’t possible in previous years. A prime example of this is real-time situational software. Tools like this can create a culture of security and enhanced preparedness, by running exercises in the software, based on any number of scenarios. Teams can train and prepare for various scenarios, so that if and when they do happen, the response is planned out rather than reactive. Software can be accessed by all stakeholders to open lines of communication and manage a security response. This can underpin many other security systems, thereby helping organisations to become more proactive, with every element of their security service.
The role of physical security systems has evolved significantly over the last few years. From being mostly used as forensic tools, modern physical security systems are now being developed for intelligence-led risk mitigation and proactive prevention. With a unified security system that tightly integrates and correlates data from sensors, such as access control, intrusion, video, ALPR and more, organisations can establish a more proactive security operation environment, instead of reacting to a security event, after the fact. New crime analysis and case investigation tools, based on cognitive engineering and the latest in video analytics, can now facilitate intelligence-led policing through data discovery and construction of relationships between people, places, time, objects, and activities. The latest advancements in ALPR technology go beyond recognising licence plate numbers, by also identifying vehicle characteristics, like colour and type, and behaviour analytics, such as speed estimation and direction of travel, under all weather conditions.
While proactive security seems like an obvious goal, it’s important to remember that by their very nature, most security systems (including sensors, cameras, and access credential readers) are inherently reactive to a condition or action in the monitored environment, as it takes place. While these systems are excellent at alerting the security team, they aren’t really proactive. A truly proactive system would require an inherent AI/Machine Learning capability that allows the generation of predictive algorithms, based on actual event data. If the system can accurately monitor and interpret real-world data in its space, then it can become more proactive. However, there is always a danger that a system pre-occupied by this could end up concentrating on expected scenarios, making the unexpected even more of a surprise. Ideally all security systems need to do both – being both proactive to suggest potential issues and fully alert to any breach, however unexpected.
The addition of artificial intelligence (AI) software makes video surveillance a much more proactive technology. Cameras no longer simply transmit live video for security operations centre staff to review and act upon alarm events. Now, AI software rapidly makes judgments on events to eliminate up to 95% of false alarms. Previously, non-threatening activities, such as a stray animal running across the field of vision required an operators’ attention, possibly causing a delay in response or entirely missing an actual event. The same software also automatically identifies loiterers or crowd formations. Watchlists allow security teams to load photos of people or vehicles to observe – or ignore. A camera’s angle being moved or significant scene changes result in an alert to the SOC. The analytic AI software also helps with forensic investigations, tracking objects of similar appearance from all cameras or selected sites. Proactive video surveillance has arrived.
The abundance of data that security systems provide can be overwhelming, to say the least. How that data is handled and how to make that data work for you is the difference between being proactive and reactive. Security systems produce data that can be used proactively in securing facilities and providing a safer environment. Analytics or business intelligence can help identify people who may pose a high risk to an organisation. Anomalies in employees’ or contractors’ patterns, such as unusual arrival or departure times, or trying to access the wrong doors, could easily happen under the radar and be completely overlooked. Analytics systems can notify operators that a closer look at a particular person may be warranted. The access control data, along with other data, can be consumed, assessed, and communicated to other departments, in order to prevent risk proactively.
Security systems have historically been used to detect suspicious behaviour and send alerts, when unauthorised activity occur on-premises. The challenge, however, is that this process is very reactive and alerts are typically triggered, after someone has obtained access to the site. Advanced edge-based analytics can alert in real time, when suspicious activity is detected on or around the protected estate. This provides an opportunity for proactive response and the potential to prevent a malicious event. The ability to ‘see in the dark’ makes region surveillance much more robust and resilient, thereby enhancing the level of protection that a CCTV system can provide. Today, most advances in security systems are focused on proactive alerts and response, which lead to preventive notifications. Utilising edge analytics, motion detection, thermal sensors, and comprehensive rules engines, video management systems can also provide alerts and visibility that can help prevent break-ins, and they provide real-time data and visibility
We often have more data at our fingertips than we know what to do with, but the solutions that have harnessed this information have really changed the user experience. In the security space, we have specifically seen cloud-based card personalisation solutions utilise the card printer data, in order to enable the card office administrators to change from a reactive fire-fighting approach to less stressful proactive approach. Just like you never run out of gas, as soon as you reach your destination, you do not run out of printer consumables, when the last card is printed. This innovative approach is accomplished by providing information, such as the printer status, its consumable levels, and whether a software update is needed in real time, through a dashboard or text notifications. In addition, these cloud-based card personalisation solutions provide the flexibility to see this information from anywhere, using the Cloud to provide user flexibility.
Historically, access control was simply about opening doors with PIN codes and later with smart cards. But, intelligent access control systems have been constantly evolving and they now offer an increasing array of proactive features. The sophisticated integration abilities of quality access control systems mean managers can control all aspects of access and security from one unified platform, from CCTV and elevators to visitor management and HR systems. Whether you simply want reminders, when health or safety training needs renewing, proactive measures to manage the flow of people, or insights to drive efficiencies, intelligent access control can deliver. Likewise, if you want a system that automatically pulls up relevant CCTV if an alert is triggered, or elevators that read credentials presented to entry turnstiles and automatically direct users to their fastest elevator, in order to avoid crowding, quality access control can achieve this. It means you can be more proactive too.
It is not that security systems are becoming more proactive, it’s the evolution of technology that is allowing security to become proactive. Advancements in mobile applications, near field communications (NFC), artificial intelligence, predictive analytics, facial recognition, cloud computing etc. are enabling business to become more proactive, security is the use case. To identify the security systems, one must look for the ones that integrate these technologies. What is consistent with these technologies, is that they all center on data, which says that the more data you have the more accurate and proactive security can be and therefore, reduce more risk. For example, Command Centre from Zendelity leverages the latest advancements in mobile devices, NFC and cloud computing to enable safety and security for the first time, to be able to capture operating data in real time, so they can identify potential hazards, before they impact customers, employees, vendors and guests.
Editor Summary
Risk mitigation and proactive prevention are among the ways that security systems are becoming more proactive in the current climate. Security systems provide a lot of data that can be analysed to yield greater insights into possible future risks and scenarios. Artificial intelligence (AI) and machine learning help current systems analyse the past and predict future risks. Being able to predict and/or prevent a future event is a new opportunity for the security market.
HID products
HID news
HID, a pioneer in trusted identity solutions, has achieved Texas Risk and Authorisation Management Program (TX-RAMP) certification for its Public Key Infrastructure as a Service (PKIaaS) solution. This certification demonstrates HID’s commitment to cybersecurity excellence and enables Texas state and local government to confidently engage with approved, trusted providers to procure secure, cloud-based certificate lifecycle management services with faster timelines and reduced administrati...
HID, a worldwide pioneer in trusted identity solutions, announced the appointment of Jos Beernink as Vice President Europe for its Physical Access Control (PACS) business. In this role, Beernink will lead HID’s strategy, sales and operations across the whole European region, helping organisations leverage trusted identity and access control technologies to create a secure, smarter and more efficient workplace and physical spaces. Prior roles of Beernink Beernink brings more than 2...
On Wednesday, November 19, starting at 08:00 CST, ASSA ABLOY hosts its Capital Markets Day in Milwaukee, Wisconsin, USA. Nico Delvaux, President & CEO and Erik Pieder, CFO, will provide an update on ASSA ABLOY’s strategy and direction, including an overview of the company’s strategic objectives and priorities to accelerate profitable growth. The financial targets of an EBIT-margin of 16-17% and annual sales growth of 10% over a business cycle are re-confirmed. No deta...
HID white papers
HID case studies
Enhancing enterprise security is high on the list of priorities for businesses across sectors. Within the retail industry, there is an additional focus on enabling new ways of working through management tools. Integrated solutions and applications help to create a robust security landscape and ensure a future-ready posture as organisations look to address emerging risks and create better experiences for next-gen employees. Physical access control (i.e., the readers on the door and the credentia...
Founded in 2010, Avolon is the third-largest aircraft leasing company in the world with 824 aircraft and 145 customers in 62 countries. Its new global headquarters in Dublin is comprised of 6,967 sq m (75,000 sq ft) of secure office space across six floors that houses its IT, catering, legal, and communications departments. Need for a centralised monitoring solution Avolon’s new premises in the upmarket Ballsbridge area of Dublin provided an opportunity for the company to rethink its app...
How do you rethink and transform building access for a 241-year-old company? BNY started by asking employees. The response was encouraging. The BNY team found that employees embraced the concept of mobile access solutions. The thought of implementing access solutions was already being considered by the company and the team was excited about the idea of providing a modern experience that allows employees worldwide to conveniently access their building spaces with a simple iPhone or Apple Watch....
HID virtual events
Expert commentary
Security beat
Haverhill Business Park, Phoenix Road, Haverhill, Suffolk, CB9 7AE, United Kingdom
Telephone: +44 (0)1440 714 850
