As time marches on in physical security, sometimes there are clear markers along the way that fundamental changes have happened. We are all aware that IP-based physical security has taken hold, and the nature of managing and maintaining physical security networks has changed along with it. Is there a line we can draw in the last couple years to say “this is when it all really changed”? I would argue that 2017 is when a distinct change happened organizationally, specifically on how IT is sharing more responsibilities than ever before regarding physical security.
In many organizations, security is still considered an independent issue that is restricted to the security department, and decisions made by the security team are mostly of interest to the board only in relation to their costs or if a significant breach occurs. As physical security continues to take a more central and company-wide role in compliance, brand reputation, and cyber-security, it has consequently become an area your board is likely to want to have more information on – and sometimes will want that information on a moment’s notice.
In any business, security duties and responsibilities may be spread between different departments to fulfill different needs. The physical security, IT, compliance and facilities departments all may have different responsibilities falling under the heading of ‘security’ to protect employees, assets and company data. While physical security helps keep potential threats at bay by controlling access and surveilling the facility, IT protects the network and servers from hacking, and facilities makes sure that the building itself is maintained and doesn’t pose any risks.
Prevention has always been a goal for security; proactively averting threats to the business reduces the need for response and remediation and is a the most desirable risk management model for any organization. With today’s technology, IT can install firewalls on the network, while physical security could implement facial recognition software to prevent former employees from entering the building. Compliance regulations ensure that all departments meet standards for protection and prevention.
An article I saw recently started with this compelling question:
As 2017 is headed to a close we can already see trends that will shape the security landscape in the next year. Some of the trends that we’re seeing for 2018 include the growing recognition of the vital role physical security plays in assuring cybersecurity – and vice versa. We are also seeing new means of how organizations are approaching physical security compliance, and an evolving (and more strategic) relationship between integrators and end-users. Understanding these trends should help organizations plan ahead for how they can benefit most as 2018 unfolds.
NOTE: This is a guest blog from one of our business partners, Kenton Brothers for Security. Viakoo's take is that this blog really hits the nail on the head when it comes to how the security integration business has changed, and how leaders like Kenton Brothers have managed their business along with those changes.
It’s an interesting experience carrying forward a century old organization in today’s technology driven business environment. Think about the speed at which things move and change today compared to even as little as five years ago. Then compare that back to over 120 years ago when KB was founded…really, almost everything has changed since 1897.
Who wants more time spent on service calls? Don’t be shy…
With the advent of the Internet of Things (IoT), more and more of our devices are connected to the network, making it possible to amass data and analyze it for patterns and trends. In this way big data is becoming more of a resource for virtually every industry including security, where video captured by cameras can now be more easily stored and analyzed by software. However, this new technology has taken hold so quickly that some organizations are now sitting with immense quantities of raw data without the knowledge of how to best use it. Since big data is only going to get bigger, security professionals need to understand the best ways that they can put it to use.
For years, the security industry has relied on a ‘reactive’ model for maintenance on surveillance systems. Older, analog systems, working in concert with security officers, guard dogs, and physical barriers, required less maintenance and management than today’s high-technology IP-based systems. When they failed, people knew because there was no image on a screen. Security systems today are more capable, more powerful, more “virtual”, and more secure—but also more complex, requiring more detailed inspection to ensure their consistent function. Seeing an image on a screen does not mean with IP-based surveillance that video is recording as it should – that’s why so many security teams have faced the “missing video” problem when they go to retrieve video evidence and it is not there. Because there are more things that can go wrong, and go wrong “silently” without someone knowing a failure has happened, most physical security teams are in the rut of reactive maintenance. No one knows when the failure happened. To figure out root cause, a technician is sent to inspect the system. Then fixes are tried, sometimes iteratively, until it looks like it’s working again.
Benchmarking has been an important part of business operations for as long as there’s been business—one can easily imagine a prehistoric hunter-gatherer comparing the plants they’ve collected to their neighbor for color, taste, and medicinal effectiveness—and then asking the neighbor where they found better plants. Comparing your operations to your competitors is an extremely helpful tool to help you optimize your activities and increase your own ROI. By benchmarking your security system, you can learn how to improve operations, reduce costs, and create a more efficient system.