At ISC West this year, emerging technologies will be on display to help organisations manage their environments, from the building itself to who’s on the premises and what’s going on at any given moment. Top of mind this year is cybersecurity, compliance and management of security assets as threats rise and governing bodies put regulations in place that businesses need to react to. The good news is that the shift in approach to holistic monitoring of cyber and physical assets can move enterprises to a place of digital transformation and proactive management rather than reactive practices based on threats and changing regulations. The show provides an opportunity for both vendors and potential customers to learn from each other about what’s out there and what’s needed in terms of future solutions as the industry evolves.

Are you in cyber and physical security compliance?

At this year’s show, we’ll continue to see developments focused on integration of cyber physical security that will lead to deeper understanding of the relationship between devices, device monitoring and spaces in which all devices physically reside. Digital solutions help achieve a digital transformation which stitches the data relationships together to provide better threat vector impact and overall understanding of risk. The technologies in smart buildings are subject to cyberattacks, which pose not just a threat to data and privacy but can compromise the physical space as well. Think of the locked door in a smart building that now is opened with access control via key cards or mobile devices given only to certain members of staff. These integrations increase safety and restrict access across the enterprise, but a bad actor can access and duplicate the necessary data to open the door with a copycat device while hiding the event from the surveillance system. By having a comprehensive cyber whitelist of installed devices, potential rouge devices are prevented from transmitting on the network, therefore providing an automated guard against internal and external attacks. When systems are compromised due to a hack or physical intervention, it puts what’s behind the door at risk, whether it’s money in a bank or information in a sensitive work environment, such as a laboratory.

Digital solutions help achieve a digital transformation which stitches the data relationships together

It’s increasingly important to highlight the relationship between cyber and physical security. A great illustration of this is the digital twin. A digital twin is a replica of a physical space that uses both informational and operational technology to give real-time information about what’s going on in a space.  These can include things like floor plans for the building as well as real-time sensor data from the building management system, HVAC systems, lighting, fire, security, and more. By getting a complete picture of the physical and digital assets of an organisation, it becomes possible to monitor all systems from one central location to see how they’re working together and act on the insights they provide. So, in the example of a breach from before, it’s possible to flag that hack, isolate its exact location and devices involved, and resolve it quickly while maintaining preservation of evidence.

Compliance: how to get there safely, efficiently and effectively

As these threats evolve, governing bodies are taking action to ensure that data is protected to minimise these kinds of threats and ensure that organisations feel confident in the security of their data. Norms and compliance measures are emerging quickly, such as General Data Protection Regulation (GDPR) which began to be enforced in March 2018, and the California Cybersecurity Law, which went into effect in the US just this past January. The regulations of what can be done with data mean that companies need to react or face penalties such as fines, which can be as high as 4% of worldwide annual revenue of the previous year. These are also fluid and can change rapidly, meaning flexibility is important in compliance solutions. However, this presents an opportunity for companies to invest in innovation to ensure they’re prepared for those changes and to protect the safety of not just employees, customers and target markets, but of the larger organisation.

Getting to a place of compliance can seem costly and time consuming at the beginning

Getting to a place of compliance can seem costly and time consuming at the beginning, especially for larger organisations. They may have thousands of security assets (cameras and sensors, for example) and might not even be fully aware of what they have, where they are, and whether those assets are functional, never mind compliant with data protection legislation. The right solution takes all the steps to becoming safe and compliant into account, beginning with inventory and mapping of all assets to get a complete picture of where things stand and where changes need to be made. One large financial institution, upon embarking on this journey, identified an additional 10% of assets that they didn’t know they had, and additional ones that were nonfunctioning and needed to be repaired or replaced for compliance and safety.

Monitoring: centralised and remote for rapid response

Once assets and data are centralised and a complete inventory is taken, it’s much easier to effectively monitor the complete enterprise. At this year’s show, smart technologies will be on display that reduce cybersecurity risks and monitor assets for compliance. If something changes, that can be flagged, and appropriate parties can be quickly notified to act and neutralise security threats or avoid the expensive penalties that come with noncompliance. Since all these components are centralised in one location, it becomes possible to monitor much more effectively and fix issues remotely in minutes rather than scheduling a trip to a location that may not happen for days or even weeks. A security camera for a large chain enterprise such as a retail store or bank in a small-town location deserves service just as quickly as one in a major city, since the threat that each non-functional device poses is the same to who and what it is there to protect.

Keeping it up: a proactive approach to service and maintenance

One of the ways that emerging technologies can be a game changer is when it comes to the cost and approach

One of the ways that emerging technologies can be a game changer is when it comes to the cost and approach to systems maintenance and operation. In addition to performance and compliance, other types of data, such as historical events, can also be monitored centrally. This gives context to security events and can move organisations from a reactive to a proactive approach to their security as well as operations. If small problems are identified and resolved before they become larger problems, it means that security events can be mitigated more quickly or prevented entirely due to early intervention. On the operations side, early insights into asset performance means that fewer resources are expended on noncompliance fees and large-scale, emergency repairs. These resources can take the form of money, but also of time spent by employees and enforcement agencies to ensure continued compliance. Staff can spend time engaged in active monitoring rather than generating reports, since that can now be automated.

In the new decade, it’s time to use the technological resources available to better protect systems for smarter, safer and more sustainable environments. On every level, compliance is important not just for its own sake, but so are the other benefits associated with intelligent management.

The show presents an educational opportunity for vendors and customers alike. Walking around the show floor and talking to everyone is a unique way to see what’s out there and evaluate what is and isn’t working for a business while getting information from all the industry experts. Even if they’re not ready for a complete overhaul, taking stock of what’s available, where things are heading and how their operations and mission can be better served by implementing one or more of the solutions showcased is more important than ever. On our end, those conversations about needs and concerns are invaluable in driving innovation.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Jason Pelski General Manager Assurance Services, Data Enabled Business, Johnson Controls, Johnson Controls, Inc.

In case you missed it

Securing your business while working remotely
Securing your business while working remotely

It's a very common purchase for people to seek a smart security camera to remotely link them to their home whilst at work. Now the emphasis has shifted, with a lot more people working from home, business owners should consider a surveillance device to deter would-be thieves, protecting valuable equipment crucial for businesses to operate successfully. A robust security camera setup can aid existing security staff, and give business owners peace of mind out of hours.    According to a recent report, police forces are having to carry out extra night patrols in empty city and town centres, as burglars target shops, pubs and other commercial premises during the pandemic. During these unprecedented times, investing in a video security system can save you and your business money – and in more than one way. In addition to preventing loss of property from inside, surveillance cameras also prevent acts of theft and vandalism by outside individuals However, technology, improved mobile connectivity, apps, and cloud technologies has changed the security market and made it easy for anyone to set up a surveillance ecosystem with easy installation and constant round the clock, cloud monitoring. Plus, you can access footage from anywhere in the world via devices and apps – just in case you have to skip the country! The best cameras for SMBs Most good cameras have the much same functionality: excellent video and audio capabilities, remote access and programming, motion and sound detection, and the ability to capture still or video images and audio and save the data to the Cloud. But the burning question is, when you're trying to find a need in a haystack, what will work best for a small to medium sized business? A robust security camera setup can aid existing security staff, and give business owners peace of mind out of hours Now you can buy cameras that come packed with features such as integrated night vision, 1080p resolution, microSD card slot for local recording, two-way audio functionality as well as the latest latest 128bit encryption. They also have wide-angle lenses allowing users to see more of their office with a single camera, and some come with free, intelligent AI-Based motion detection. The AI gives users more choices on what is captured by the camera and when they should be alerted. Users can specify what types of motion they would like to detect, such as an intruder as opposed to a dog, an object crossing a defined boundary or into a specific area. They can also define multiple zones, alerting them immediately when movement is detected in particular areas. Easy installation is crucial These security cameras should also be easy enough to install and use that you don't need to fork out for expensive expert installation, and many can work with existing CCTV and CCTV DVR systems you may already have set-up. Many of the business security cameras are Wi-Fi enabled and come with their own apps, so you can view footage on your smartphone or tablet, no matter where you are in the world. It means you don't need to pay for a security team to watch the footage at all times (though if you can afford it, that won't hurt), and you can store your videos locally with an NVR on a HD, in the cloud with mydlink or do both with a hybrid NVR/cloud recorder. The apps use Rich Notifications which send a push notification with snapshot to the mobile device the moment activity is detected. Users can react immediately without the need to log into the app by accessing the camera’s live view or calling one of two pre-assigned contacts with a single tap. Any motion-triggered recordings can be saved in the cloud, or locally on a microSD card. Indoor, Outdoor or both? Indoor cameras can be smaller, more lightweight and are usually less intrusive than bulkier outdoor cameras The primary distinction between indoor and outdoor security cameras is the types of external factors each camera has to be able to withstand. While both types of cameras usually come in similar styles and with comparable features, outdoor cameras need to be able to contend with all types of weather and varying light conditions. Outdoor cameras are also more vulnerable to being tampered with, so they are typically made of more durable materials, like metal, and may be heavier or even housed in a casing in order to discourage easy removal. Indoor cameras can be smaller, more lightweight and are usually less intrusive than bulkier outdoor cameras. Both indoor and outdoor cameras utilise features like infrared, allowing for clear pictures in low light conditions and easy transitions when there is a sudden change in light-changing automatically from colour images in bright light to black and white when it gets darker. When doing your research, features to look out for include: Wide angle lens for optimum room view or full view of the front of your property Full HD 1080p at 30fps   ONVIF compatible - Open Network Video Interface Forum - The forum aims to standardize how IP products within the video surveillance industry communicate with each other. Night vision - look at length of the night vision - 5m is about right Your options will depend on your budget and specific needs, but the above features are a great start when you come to buy.

The future of property security: In-house processing units versus cloud-based video surveillance systems
The future of property security: In-house processing units versus cloud-based video surveillance systems

Nowadays, everything seems easier in the matter of surveillance. Sophisticated technology safeguards our valuables for us without asking for anything in return. But what if it’s not true? What if it comes with a price? Video surveillance systems are a popular way to keep the property under constant control. It’s not rare that the technological sophistication of these systems puts us in awe. They make us feel, and be, safe. Yet, there are doubts when it comes to ensuring privacy. And these worries are understandable. Privacy abusers wait around every corner. Some of the fish for data coming from our monitoring systems. Should we then give up and go back to the in-person property guarding? Not really. Countless advantages make an intelligent video surveillance system worth trying. How to find the best solution within the video surveillance systems? Which system is the most secure in protecting us from the threats of privacy abuse: in-house processing unit, or the cloud? Desire for safety Every human wants to feel safe. At the bottom of Maslow's "Needs Hierarchy," there are two most essential points. We desire to fulfill our physiological necessities - the need for food, water, warmth, and rest. In the second place, also fundamental is a need for security.Security doesn’t only mean keeping burglars away from the property Today's fast-paced world changes its outer expression, yet the significance of security is constant. We crave to feel safe and we are ready to do a lot to achieve it.  The core truth to begin with when it comes to security is its definition. Security doesn’t only mean keeping burglars away from the property. If it did, we would be content with any camera surveillance system, regardless of its privacy threats. The issue is more complex. Humans value their privacy. Not only keeping our valuables safe but also being away from the sight of others matters to us. We put efforts to protect our privacy, whether it comes to houses, businesses, or sensitive data. Data privacy Why is it so important? Ongoing cases of privacy invasions prove that data finds "new owners" very fast. These data takeovers can result in a major inconvenience and robbery on a large scale. Main privacy threats are information collection, processing, dissemination, and invasion. We want to protect data obtained by video surveillance systems. Privacy and security are sometimes compared to water and oilThese are, for example, video registrations, times of entrance to the property, number and identities of visitors, etc. Privacy and security are sometimes compared to water and oil. They say you can have security but you’ll lose privacy. They say you can have privacy, but you’ll lose security. These common convictions inspired a new generation of companies to create privacy-first security solutions. They are, in other words, security systems focused on not sacrificing privacy. Cloud-based systems Most of the time, popular video surveillance systems but at the same time insecure when it comes to privacy are running on the cloud. There has been a long discussion about its safety and it continues to raise privacy concerns. These systems too often fail in ensuring privacy, and they are vulnerable to hacking. Ring, Nest, and other home security companies experienced compromising mishaps on a large scale. It's not a secret that some cloud-based companies partner up with police departments. Also, if your data is too available, tech companies can sell it to advertisers.Data uploaded onto the cloud is exposed for anyone to meddle with Data uploaded onto the cloud is exposed for anyone to meddle with. According to the book The Age of Surveillance Capitalism_ The Fight for a Human Future at the New Frontier of Power by Shoshana Zuboff “Nest takes little responsibility for the security of that information and none for how other companies will put it to use. In fact, University of London legal scholars Guido Noto La Diega and Ian Walden, who analysed these documents, reckon that were one to enter into the Nest ecosystem of connected devices and apps, each with their own equally burdensome terms, the purchase of a single home thermostat entails the need to review nearly a thousand contracts.” Security and privacy vanish once a smart home system enables remote access. In-house processing units It all leads to the conclusion that keeping data in the in-house processing unit is safer and more private. It keeps us away from the eyes of governments, corporates, advertisers, and hackers. And since the market is proactive, solutions in that department came fast. Thanks to the advances to the internet of things (IoT), edge computing, and machine learning, it will be possible in the near future to find different surveillance private-secure systems on the market. A privacy-centered "architecture" processes and stores camera footage inside the propertyThey will combine the most advanced technology with sophisticated privacy protection. In the in-house option, a privacy-centered "architecture" processes and stores camera footage inside the property. For example, one Seattle-based startup is working on a solution that uses specialised IP cameras that work in groups with an edge computing device. An AI (artificial intelligence) algorithm analyses all the footage taken by the cameras. Once it detects anomalies, it notifies the final user. Those systems don't upload any of the customers' data to the cloud, they keep privacy and all the information at the customer's home. The in-house processing unit can learn to differentiate what its user marks as important. The system captures and saves only those pieces of information. Smart surveillance systems To give an example: users who wish to know when their dog is outside can set the cameras to detect it. If they wish to turn a blind eye to burglars, they are free to do it. Smart surveillance systems work with facial matching and pose detection technology. They can detect individuals that haven’t logged on to the system. This tool respects an ethical protocol. It isn’t sensitive to a specific gender, race, or age. Its purpose is to detect behavior identified as suspicious without targeting individual identities. By identifying people who aren’t a part of your daily routine, the system cuts any kind of security risk. The in-house processing unit video surveillance systems "do the watching" for you. The newest in-house processing unit video surveillance systems will sharpen the feature of crucial importance - privacy protectionThat revolutionises the way we think about security. The system that integrates all the security visual sensors into the “brain” of the system is the smartest and safest idea on the market. This “brain” later decides whether to notify the user about the potential danger or let it go. It deletes every irrelevant piece of data on the spot. This kind of cognitive machinery saves both your time and bandwidth. Thanks to them, you get rid of unnecessary alerts. The newest in-house processing unit video surveillance systems will sharpen the feature of crucial importance - privacy protection. The newest technology offers a plenitude of sophisticated surveillance methods. Our task is to choose the right one. The one that not only protects our properties and valuables but also our privacy. 

Key considerations for robust residential security
Key considerations for robust residential security

In the UK, one burglary occurs every 106 seconds. This means by the time you've finished reading this article, at least three will have taken place. Selecting robust physical security options to protect property boundaries and homes is essential to limit crime rates and deter opportunistic intruders. With 58% of burglaries said to take place while the homeowner is in, it seems that even the second wave of lockdowns, and an increased number of people confined to their homes, won't do much to eliminate the risk of burglary. Prioritise security for peace of mind Security is paramount, and in the case of new build projects, should be considered from the very beginning of the design process, not as an afterthought. When it comes to securing pre-existing buildings, there are countless security options which will ensure the perimeter is robust enough to withstand opportunistic attacks. It's also worth noting that security features don't have to be complicated. There are plenty of high-tech digital systems flooding the market, which can go a long way to reduce the risk of burglary and will provide peace of mind to the end user. However, this article will demonstrate how traditional security measures, such as high-quality perimeter fencing, can ensure practical safeguarding of properties for years to come.  Selecting robust physical security options to protect property boundaries and homes is essential to limit crime rates Timber! There are a number of different materials which can be specified to create a strong boundary. From metal railings, to timber fence panels, they will each help deter criminals somewhat. Wooden fence panels are a popular choice for their appearance, and the right product and installation can help to increase security.Our timber acoustic fencing can also reduce noise by up to 32dB and has a solid face with no hand or footholds, while still retaining the attractive natural timber aesthetic of a typical garden fence. However, maintenance is key, and one of the first thing burglars will notice is the condition a fence is in, rather than a particular style. Therefore, old, broken or rotten fence panels are a green light for opportunistic thieves. These can be easily broken or bypassed with minimal effort. When specifying fences as part of a new build housing development, we would suggest opting for high-quality timber, as this will ensure that it is protected against rot. Look for products with an extended guarantee or those that don't need additional treatment over the years. The condition of the fence should still be regularly inspected, and simple methods such as clearing piles of leaves away from the base of the boundary can help to prevent rot which weakens the timber.  Securing fence panels The recent rising cost of timber has led to a dramatic increase in fence panel theft, and panels that can be lifted from the posts are an easy target. Mitigate this risk by screwing the fence panels into the posts. This makes it much harder for the panels to be removed from the posts and creates a more secure barrier.  Concrete posts do offer benefits, but we always advise on timber posts for any fencing. They're strong, just like concrete, but they continue the same natural theme as the rest of the fence. Moreover, if you screwed the panels to concrete posts, they would most likely crack and become damaged, and then be at risk to the elements.  Astute design Design is also important. Installing fence rails on the inside of properties to prevent them from being used as climbing aids is highly recommended. Even better, using panels without rails on high-end developments is a clever tip if you want a secure fence with a high-spec look. Security features don't have to be complicated High fences with solid panels and no gaps in between make it considerably harder for potential burglars to climb over. They also offer better privacy to conceal rear garden areas from intruders, and are much sturdier than other alternative panels.  One common mistake is designing in features such as trees or children's climbing frames too close to the boundary. These can be used by burglars as climbing aids when attempting to scale the fence, making access easy. Investigate the surrounding area, which flanks the outside of the property boundary, as an unfortunately placed bin or bench can also help criminals gain entry. If the removal of these items is not possible, designing in a spiky bush can help deter intruders. It's also worth noting that gardens with numerous large features such as bushes or sheds can also negatively impact the level of security. A clear line of sight across the entire garden is highly recommended where possible. If this view is blocked, it's considerably easy for intruders to hide undetected. Front gardens  While tall, solid fence panels are recommended for rear gardens to prevent intruders from being able to see in and climb over, the opposite is true for front gardens. For street-facing gardens, a low fence or hedge is recommended to provide a clear view from the house. It also makes it much harder for intruders to hide from passers-by or neighbours, who can raise the alarm during a burglary. Another useful security technique to consider is a gravel drive. These create noise, which means the homeowner will know when it is in use. Pair this with a strong boundary fence, the likelihood of burglary dramatically decreases. This article only scratches the surface in unveiling the sheer volume of effective home security options on offer to protect homes and gardens. These investments can help minimise the risk of traumatic break-ins, while also simultaneously boosting the aesthetic of the property and its surroundings.