Implementing Service Assurance to Improve Operations

    [fa icon="calendar'] Oct 26, 2018 2:38:02 PM / by John Gallagher posted in service assurance

    [fa icon="comment"] 0 Comments

    There’s a popular business quote that goes something like, “if you can’t measure it, you can’t manage it.” But when it comes to physical security it’s not so easy – because the most meaningful measure is in what does not happen. How many intruders were discouraged and denied? How many secrets and goods were not stolen? And how many damaging data breaches didn’t happen?  In demonstrating the value of a physical security team, can we get to a point where these values could be measured, tracked, and have rewards based on it?  While for now that may be wishful thinking, maybe we’re a lot closer than you might think. The growth of metrics, analytics, and machine learning in physical security is heading us in that direction.

    Read More [fa icon="long-arrow-right"]

    Tips for Avoiding Physical Security IoT Issues

    [fa icon="calendar'] Aug 31, 2018 2:07:01 PM / by John Gallagher

    [fa icon="comment"] 0 Comments

    Do you think IoT devices as part of a physical security network are a blessing or a curse?

    Read More [fa icon="long-arrow-right"]

    How to Recover from a Physical Security System Failure

    [fa icon="calendar'] Aug 28, 2018 8:18:49 PM / by John Gallagher posted in physical security, benchmarking, ASIS

    [fa icon="comment"] 0 Comments

    It’s happened:  you had a major failure of one (or all) parts of your physical security system.  Maybe it’s something relatively minor (like the CEO not being able to get access to their office), or something truly catastrophic that is in the news and has dramatically impacted the reputation of your company (and your team).  What you should do (after taking a deep breath) to regain and rebuild not just the protection offered by physical security, but the trust and belief that this will never happen again?  Here’s a few “best practices” that will start to repair the damage done. 

    Read More [fa icon="long-arrow-right"]

    Opportunity Knocks:  Service Assurance from Integrators

    [fa icon="calendar'] Jul 24, 2018 2:53:11 PM / by John Gallagher posted in IoT, physical security, cyber

    [fa icon="comment"] 0 Comments

    Every security integrator faces this issue.  Your customers purchase new physical security systems and devices in order to benefit from the security and risk-reduction features they offer. Once deployed, however, these devices can actually increase risk and liability if they stop operating properly without the user becoming aware of the disruption. The risk compounds when you consider that new IoT (Internet of Things) enabled devices are being introduced to the market and added to users’ networks at an accelerating rate.

    Read More [fa icon="long-arrow-right"]

    Physical Security, As Told by Numbers

    [fa icon="calendar'] Jul 17, 2018 7:40:54 PM / by John Gallagher posted in benchmarking, big data, IoT

    [fa icon="comment"] 0 Comments

    To sense the scale and magnitude of changes happening in physical security it helps to put numbers to what is happening across the industry.  There is no doubt that the last 5 years have brought a lot of changes to the industry – but can you put data to those changes and trends?  To be able to do so is useful for multiple reasons. 

    Read More [fa icon="long-arrow-right"]

    AI Really Will Change Physical Security

    [fa icon="calendar'] Jun 1, 2018 4:15:00 PM / by John Gallagher posted in IoT, AI, machine learning

    [fa icon="comment"] 0 Comments

    Everybody is talking about it, and more and more people are using it. From self-driving cars to predictive analysis and everything in between, artificial intelligence, or AI, is the next big thing in technology (including physical security). 85% of Americans already use AI in some way, from smart devices to complex intelligence for business operations. AI can detect and react much faster than human eyes and hands, and manage complex technology easily, relying on highly sophisticated software to ensure constant and repeatable success. Most importantly, problems or issues that may get missed or overlooked by humans can be reacted to and prevented from becoming serious. In physical security, what might be easily overlooked can quickly become life safety critical. 

    Read More [fa icon="long-arrow-right"]

    Why New Grads Are Drawn to Physical Security

    [fa icon="calendar'] May 2, 2018 5:22:36 PM / by John Gallagher posted in physical security, IT, cyber

    [fa icon="comment"] 0 Comments

    Physical Security competes with other industries for talent, and there is (right now) a giant opportunity for the industry to be a career magnet for people at the forefront of technology and innovation.  To be deeply involved in IoT, cyber-security, machine learning, and cool-as-could-be drone technology and robotics is a giant draw for the best new talent. And those are exactly the leading-edge needs facing the physical security industry. 

    Read More [fa icon="long-arrow-right"]

    2018: Critical Year for Integrators at ISC West

    [fa icon="calendar'] Feb 26, 2018 3:22:52 PM / by John Gallagher posted in Blog

    [fa icon="comment"] 0 Comments

    ISC West (International Security Conference & Exhibition) is the largest security industry trade show in the United States, where security professionals can meet and mingle with over 30,000 of their peers to discover technology innovations and network with other professionals. Over 1000 exhibitors and brands are slated to attend the 2018 conference, taking place in Las Vegas at the Sands Expo Center from April 10-13. ISC West sees attendance from both physical and IT security professionals in many disciplines—dealers and integrators, architects and engineers, and end users from a wide variety of industries. Integrators in particular should be excited to experience the opportunities to improve their business by attending ISC West.

    Read More [fa icon="long-arrow-right"]

    Data Gravity and Viakoo

    [fa icon="calendar'] Feb 13, 2018 7:33:11 PM / by John Gallagher posted in IoT, cyber, big data

    [fa icon="comment"] 0 Comments

    There are ideas and concepts that you come across that you realize immediately were not developed for your particular endeavor, but nonetheless are very appropriate. As physical security is becoming more oriented around industrial IoT, Big Data, machine learning, and other areas of data science there are some useful ideas for physical security professionals to consider. One of these is “data gravity”; the nature of large amounts of data to draw in applications and processes that take advantage of the presence of that data. If you’re running an IP-based physical security system, you may have already noticed that whether it’s a PSIM (physical security information management), Viakoo for automated system verification, or numerous advanced video analytics applications, there are now a lot more applications being drawn towards the data present in IP-based physical security systems.

    Read More [fa icon="long-arrow-right"]

    Securing The Physical Security Network with a Single Pane of Glass

    [fa icon="calendar'] Feb 6, 2018 8:35:46 PM / by John Gallagher posted in IT, physical security, IoT

    [fa icon="comment"] 0 Comments

    As with most things in life that develop at a rapid pace, the Internet of Things (IoT) may have early adoption issues but ultimately will function smoothly over time. Both the personal and enterprise benefits of living in a fully connected world where everything has some connection to a network will ensure that IoT adoption continues to expand. The current issues around cyber secure and functionality of systems are being addressed, paving the way for future IoT growth. But with today’s reality no CSO or CISO wants to be responsible for IT and/or physical security operations when they don’t have control of what’s connected to the network; they don’t know which security systems were offline or not working; and can’t easily determine which devices were impacted by downtime, data breaches, or compliance issues. No one wants to be that person.

    Read More [fa icon="long-arrow-right"]