What is Your Mean Time to Innocence

    [fa icon="calendar'] Aug 28, 2019 3:09:53 PM / by John Gallagher posted in physical security, IT, IoT, service assurance, uptime

    [fa icon="comment"] 0 Comments

    If you’re responsible for physical security, then you might be familiar with the concept of “mean time to innocence”.  It’s an IT term that highlights how the network is often blamed for problems, and how the IT team needs to quickly get to the real root cause in order to show that the network is “innocent”.  Same thing happens in physical security; for example, if video is not recording properly it often is blamed on the camera device when the root cause may be an issue with storage. 

    Read More [fa icon="long-arrow-right"]

    Viakoo Solutions Harden and Support Cloud-Based Physical Security Services

    [fa icon="calendar'] Jul 16, 2019 6:54:09 PM / by John Gallagher posted in cyber, service assurance, cloud

    [fa icon="comment"] 0 Comments

    Many organizations are implementing, or have already implemented, cloud-based physical security services to supplement or replace instances of on-premises software and processing. The trend to make everything into “as-a-Service” has brought us popular cloud services including CRM systems such as Salesforce, communication systems such as GoToMeeting, and shared storage such as Box. Security systems “as-a-Service” are also rapidly growing, including cloud-based identity management, access control, and video surveillance, among others. With more than 20,000 cloud services available, consumers and businesses alike have quickly become accustomed to their advantages, including greatly improved access from any connected location, and greatly improved collaboration with other contributors.

    Read More [fa icon="long-arrow-right"]

    What I Learned at Campus Safety Conference

    [fa icon="calendar'] Jun 24, 2019 3:28:58 PM / by John Gallagher posted in physical security, school safety

    [fa icon="comment"] 0 Comments

    This past week I was fortunate to attend the Campus Safety Conference in Las Vegas as a sponsor, and to meet with many education safety professionals. School safety has been around for as long as schools have, but the last few years have changed the nature of it – a lot more focus now is on shootings (in particular) and dealing with traumatic incidents (in general). In no particular order here’s what really stood out to me:

    Read More [fa icon="long-arrow-right"]

    How Viakoo Can Make Elections Secure Again

    [fa icon="calendar'] May 28, 2019 3:41:05 PM / by John Gallagher posted in cyber, physical security, service assurance

    [fa icon="comment"] 0 Comments

    This past Thursday evening Viakoo participated in a great event hosted by CapitolSec 2020 in Sacramento – a “pitchfest” where multiple technology companies came to share ideas in front of a judging panel on how their technology could be used to improve the security of election systems.  While we’re proud that we were awarded as the winner based on having the most compelling technology solution to this problem, the more important takeaway is that solutions for IoT service assurance and cyber hygiene are needed for broad societal issues, not just commercial or industrial applications. 

    Read More [fa icon="long-arrow-right"]

    Digital Twins – Secure Enough For Security?

    [fa icon="calendar'] May 7, 2019 7:19:59 PM / by John Gallagher posted in cyber, physical security, IoT, service assurance

    [fa icon="comment"] 0 Comments

    Because they model a part of the real world, “digital twins” are quickly becoming important business tools for organizations that deploy Internet of things (IoT) devices. Digital twins can help maintain industrial processes, explore new business opportunities, and develop new and enhanced connected products and services. They are particularly applicable to distributed systems such as physical security systems that include many IoT devices, where they can help solve operational issues more quickly and effectively than field diagnostics.

    Read More [fa icon="long-arrow-right"]

    How Available is Your Security?

    [fa icon="calendar'] Apr 2, 2019 6:16:58 PM / by Paul Slaman posted in service assurance, uptime

    [fa icon="comment"] 0 Comments

    All too often a massive amount of effort is put into specifying, negotiating, and installing a physical security system, yet after it is installed few people can answer the question “how’s it working?”. In the IT world it is very common for uptime to be a key metric for system availability, and in some cases for the system to be specially configured to be high availability. At Viakoo we believe the same should be true for physical security systems – uptime is one of the key metrics, and it should be used to guide the system towards achieving high reliability and availability. The last thing anyone wants from a security system is low availability, right?

    Read More [fa icon="long-arrow-right"]

    Convergence is Back with a Vengeance

    [fa icon="calendar'] Mar 20, 2019 4:25:00 PM / by John Gallagher posted in cyber, physical security, IoT, firmware

    [fa icon="comment"] 0 Comments

    A few years ago at physical security industry conferences the word I heard the most was “convergence”. At that time the meaning of it was how Physical Security and IT were coming closer together, and it was a hot topic because analog technology was quickly giving way to IP-based approaches. With access control becoming tied to identity management, and surveillance being managed, stored, and analyzed on computer networks, it’s easy to see now why that convergence was critical for the industry and one that required rethinking old approaches.

    Read More [fa icon="long-arrow-right"]

    How Service Assurance Can Help Meet GDPR Goals

    [fa icon="calendar'] Jan 22, 2019 2:28:06 PM / by John Gallagher posted in cyber, service assurance, GDPR

    [fa icon="comment"] 0 Comments

    The European General Data Protection Regulations (GDPR) have been in effect for some time now – since May 2018 – and they have already had some significant impacts on how companies around the globe collect, store, and manage data that includes personal information. In  fact, the first penalty levied against an organization for non-compliance to GDPR was for video surveillance violations. Many companies that are affected by these regulations have implemented specific compliance objectives to stay ahead of requirements, which include both organizational and technical safeguards to protect the specified data.

    Read More [fa icon="long-arrow-right"]

    Automating Lifecycle Management of IP-Based Physical Security Systems

    [fa icon="calendar'] Jan 9, 2019 5:19:00 PM / by John Gallagher posted in cyber, IT, service assurance, firmware

    [fa icon="comment"] 0 Comments

    As the physical security industry has transitioned from analog to IP-based systems, several advantages have been realized. Yet many organizations still use approaches from the old analog days to manage the lifecycle of physical security devices. Perhaps the reason is that at the device level the benefits of moving to IP are more easily realized (for example, self-test health checks by cameras, storage, VMSs, and others). But for something system-level (like lifecycle management) there have been more hoops to jump through to gain these benefits. With the advent of automated service assurance for physical security systems like Viakoo many (if not all) of these barriers are now removed, paving the way to more cost-effective and comprehensive lifecycle management.

    Read More [fa icon="long-arrow-right"]

    Are You Automating Camera Firmware Updates? You Should.

    [fa icon="calendar'] Dec 7, 2018 3:56:27 PM / by John Gallagher posted in cyber, physical security, IoT, firmware

    [fa icon="comment"] 0 Comments

    The now infamous Target data breach was transacted by malware being placed on the HVAC system servers.  A casino had its “high roller” database stolen by leveraging the network connection of an aquarium thermostat to export the file from the internal network.  Leveraging the physical security system’s camera devices a bank was hacked, revealing confidential information.  These are just some of the examples of how IoT devices, especially at the edge of a network, can be exploited by cyber-criminals. 

    Read More [fa icon="long-arrow-right"]