Why Preventing Disaster Can’t Be Siloed

    [fa icon="calendar'] Dec 14, 2017 11:11:00 AM / by John Gallagher posted in Blog

    [fa icon="comment"] 0 Comments

    In any business, security duties and responsibilities may be spread between different departments to fulfill different needs. The physical security, IT, compliance and facilities departments all may have different responsibilities falling under the heading of ‘security’ to protect employees, assets and company data. While physical security helps keep potential threats at bay by controlling access and surveilling the facility, IT protects the network and servers from hacking, and facilities makes sure that the building itself is maintained and doesn’t pose any risks.

    Prevention has always been a goal for security; proactively averting threats to the business reduces the need for response and remediation and is a the most desirable risk management model for any organization. With today’s technology, IT can install firewalls on the network, while physical security could implement facial recognition software to prevent former employees from entering the building. Compliance regulations ensure that all departments meet standards for protection and prevention.

    Read More [fa icon="long-arrow-right"]

    Looking Ahead: 2018 Trends for Security Systems

    [fa icon="calendar'] Nov 28, 2017 7:38:21 PM / by John Gallagher posted in Blog, surveillance, Trends

    [fa icon="comment"] 0 Comments

    As 2017 is headed to a close we can already see trends that will shape the security landscape in the next year. Some of the trends that we’re seeing for 2018 include the growing recognition of the vital role physical security plays in assuring cybersecurity – and vice versa. We are also seeing new means of how organizations are approaching physical security compliance, and an evolving (and more strategic) relationship between integrators and end-users. Understanding these trends should help organizations plan ahead for how they can benefit most as 2018 unfolds.

    Read More [fa icon="long-arrow-right"]

    Guest Blog: Things have changed a lot since 1897. Customers are the key.

    [fa icon="calendar'] Nov 2, 2017 8:08:00 AM / by Gina Stuelke posted in Blog

    [fa icon="comment"] 0 Comments

    NOTE: This is a guest blog from one of our business partners, Kenton Brothers for Security.  Viakoo's take is that this blog really hits the nail on the head when it comes to how the security integration business has changed, and how leaders like Kenton Brothers have managed their business along with those changes. 

    It’s an interesting experience carrying forward a century old organization in today’s technology driven business environment. Think about the speed at which things move and change today compared to even as little as five years ago. Then compare that back to over 120 years ago when KB was founded…really, almost everything has changed since 1897.

    Read More [fa icon="long-arrow-right"]

    How Proactive Reporting Expands the Value of Your Surveillance System

    [fa icon="calendar'] Oct 17, 2017 6:03:07 PM / by John Gallagher posted in Blog

    [fa icon="comment"] 0 Comments

    For years, the security industry has relied on a ‘reactive’ model for maintenance on surveillance systems. Older, analog systems, working in concert with security officers, guard dogs, and physical barriers, required less maintenance and management than today’s high-technology IP-based systems. When they failed, people knew because there was no image on a screen.  Security systems today are more capable, more powerful, more “virtual”, and more secure—but also more complex, requiring more detailed inspection to ensure their consistent function. Seeing an image on a screen does not mean with IP-based surveillance that video is recording as it should – that’s why so many security teams have faced the “missing video” problem when they go to retrieve video evidence and it is not there.  Because there are more things that can go wrong, and go wrong “silently” without someone knowing a failure has happened, most physical security teams are in the rut of reactive maintenance.  No one knows when the failure happened.  To figure out root cause, a technician is sent to inspect the system.  Then fixes are tried, sometimes iteratively, until it looks like it’s working again. 

    Read More [fa icon="long-arrow-right"]

    How A Digital Twin Protects Your Security Network

    [fa icon="calendar'] Aug 23, 2017 2:36:00 PM / by John Gallagher posted in Blog

    [fa icon="comment"] 0 Comments

    As the Internet of Things grows, adding devices in myriad industries onto IP networks, the ability to leverage a digital twin to maintain these devices becomes a more and more attractive option--simpler to use and more cost-effective to implement. But a digital twin is relatively new technology, and many don’t understand how to use it or what benefits it can provide.

    Read More [fa icon="long-arrow-right"]

    Every Technician Needs a Sidekick

    [fa icon="calendar'] Aug 22, 2017 3:27:30 PM / by John Gallagher posted in Blog

    [fa icon="comment"] 0 Comments

    For several years the move to IP-based physical security has been underway, but if you are responsible for maintaining and servicing these systems the reality is your work life has not improved as expected.  That is about to change, and quickly, as the combination of artificial intelligence, mobility, and analytics makes the old way of performing service on physical security systems seem antiquated and ineffective.  In other words, the transition to IP-based physical security has been hard (and expensive), but massive payoffs are about to emerge from that effort and the first recipients will be project managers and service technicians in the form of an “AI Sidekick”. 

    Read More [fa icon="long-arrow-right"]

    Third-Party Cybersecurity Matters

    [fa icon="calendar'] Aug 15, 2017 3:33:19 PM / by Joel Rakow posted in Blog

    [fa icon="comment"] 0 Comments

    Conventional wisdom suggests employee access is the weakest link in enterprise cyber security. Now, there are good reasons to believe that the cybersecurity hygiene of your third-party vendors may be at least as weak as employee access.  Third-party cybersecurity matters now more than it ever has before.

    Read More [fa icon="long-arrow-right"]

    CSOs Ensure Surveillance System Integrity with Automated Verification

    [fa icon="calendar'] Aug 3, 2017 4:29:04 PM / by John Gallagher posted in Blog

    [fa icon="comment"] 2 Comments

    CSOs count on video surveillance systems to keep an eye on all areas of their facility, employees, visitors, and equipment, and they need those systems to stay online and functional. In the past, video streams in analog surveillance systems followed distinct, closed paths from cameras to coaxial cables to VCRs. Under this closed surveillance model, if video could be viewed on a monitor, there was little or no doubt that it was also being recorded for later review.

    Read More [fa icon="long-arrow-right"]

    Devil’s Ivy, Auditors, and “60 Minutes” – Why They (and You) Are Connected

    [fa icon="calendar'] Jul 26, 2017 3:08:46 PM / by John Gallagher posted in Blog

    [fa icon="comment"] 0 Comments

    Almost daily there is a new cyber-threat announced, and increasingly they target physical security. A recent Fortinet survey showed that over 50% of CISO’s said their greatest security challenge is the rapid evolution of cyber threats. This should be no surprise, as cybercrime has damaged revenues and reputations at many well-known organizations. In a study from the Ponemon Institute in October 2016 they found the average cost of cybercrime for a company to be $9.5M (up 21% from their 2015 study). It’s pretty clear that cyber-attacks using or manipulating physical security systems are increasing in cost, frequency, and urgency.

    Read More [fa icon="long-arrow-right"]

    Data Governance and Physical Security

    [fa icon="calendar'] Jun 28, 2017 8:37:39 PM / by John Gallagher posted in Blog

    [fa icon="comment"] 0 Comments

    Data protection has been in the news a lot recently; not only the issues around hacking and malware, but perhaps more importantly on the issues of how data is handled within (and across) organizations. In 2018 the EU will have the General Data Protection Regulation (GDPR) go into effect, covering millions of people’s personal information. As shown in this chart from DLA Piper, much of the world today is covered by either “heavy” or “robust” data protection. To pull one number out of many to make the point, the State of California alone has over 25 data privacy and governance laws.

    Read More [fa icon="long-arrow-right"]