Getting Serious About Remote Problem Resolution

    [fa icon="calendar'] Mar 19, 2020 8:30:44 PM / by John Gallagher posted in service call, physical security, service assurance

    [fa icon="comment"] 0 Comments

    In talking with several end users and security integrators this week, one thing is clear:  we are facing severe limitations on being able to service and maintain physical security systems.   Many end users are not letting people onsite, and in some parts of the country there are shelter-in-place orders that limit the ability of technicians to do their normal work.  Yet, especially for healthcare and other people working at the frontlines to combat COVID-19, this is a time when they need to know that they and their facilities are secure.  In other words, it’s time for the industry to get serious about using digital connections and automation to ensure security systems are always operating as they should. 

    Read More [fa icon="long-arrow-right"]

    Edge Data Centers Drive Changes in Physical Security

    [fa icon="calendar'] Feb 12, 2020 4:45:00 PM / by John Gallagher posted in big data, cyber, physical security

    [fa icon="comment"] 0 Comments

    According to a recent report from the research firm IDC entitled Data Age 2025, more than 33 zettabytes of data were generated in 2018. (A zettabyte is one sextillion bytes – or 1000 to the 7th power) Within seven years IDC predicts that number will explode to an incredible 175 zettabytes, with more than 30 percent of that data requiring real-time processing. Where will all this data be held, processed, and stored?

    Read More [fa icon="long-arrow-right"]

    Benefits of Assuring Access Control

    [fa icon="calendar'] Dec 30, 2019 2:24:00 PM / by John Gallagher posted in physical security, service assurance, compliance

    [fa icon="comment"] 0 Comments

    Access control is one of the most prevalent physical security technologies deployed, and not surprisingly it is getting a lot more complicated.  Many organizations operate within a facility or controlled area, with an access control system used to protect the perimeter and enable appropriate access inside the facility. In recent years the combination of environmental design (e.g. “man traps” designed into entrances), need for fast response time when breaches occur, and the need to communicate with first responders with accurate information have placed new data reporting burdens on operators of access control systems. 

    Read More [fa icon="long-arrow-right"]

    How to Get Physical with Cybersecurity

    [fa icon="calendar'] Oct 29, 2019 6:04:01 PM / by John Gallagher posted in cyber, physical security, IT, IoT

    [fa icon="comment"] 0 Comments

    Earlier this summer the Center for Cyber and Homeland Security (CCHS) at Auburn University in conjunction with the International Security Management Association (ISMA) released a new survey that reflected how the C-suite views the evolving roles of cyber and physical security risks and mitigation strategies within their organizations. As October is National Cybersecurity Awareness Month, the timely findings of the research highlight the fact there has been a seismic shift in how organizations approach the relationship between the cyber and physical security threats they face.

    Read More [fa icon="long-arrow-right"]

    What is Your Mean Time to Innocence

    [fa icon="calendar'] Aug 28, 2019 3:09:53 PM / by John Gallagher posted in physical security, IT, IoT, service assurance, uptime

    [fa icon="comment"] 0 Comments

    If you’re responsible for physical security, then you might be familiar with the concept of “mean time to innocence”.  It’s an IT term that highlights how the network is often blamed for problems, and how the IT team needs to quickly get to the real root cause in order to show that the network is “innocent”.  Same thing happens in physical security; for example, if video is not recording properly it often is blamed on the camera device when the root cause may be an issue with storage. 

    Read More [fa icon="long-arrow-right"]

    What I Learned at Campus Safety Conference

    [fa icon="calendar'] Jun 24, 2019 3:28:58 PM / by John Gallagher posted in physical security, school safety

    [fa icon="comment"] 0 Comments

    This past week I was fortunate to attend the Campus Safety Conference in Las Vegas as a sponsor, and to meet with many education safety professionals. School safety has been around for as long as schools have, but the last few years have changed the nature of it – a lot more focus now is on shootings (in particular) and dealing with traumatic incidents (in general). In no particular order here’s what really stood out to me:

    Read More [fa icon="long-arrow-right"]

    How Viakoo Can Make Elections Secure Again

    [fa icon="calendar'] May 28, 2019 3:41:05 PM / by John Gallagher posted in cyber, physical security, service assurance

    [fa icon="comment"] 0 Comments

    This past Thursday evening Viakoo participated in a great event hosted by CapitolSec 2020 in Sacramento – a “pitchfest” where multiple technology companies came to share ideas in front of a judging panel on how their technology could be used to improve the security of election systems.  While we’re proud that we were awarded as the winner based on having the most compelling technology solution to this problem, the more important takeaway is that solutions for IoT service assurance and cyber hygiene are needed for broad societal issues, not just commercial or industrial applications. 

    Read More [fa icon="long-arrow-right"]

    Digital Twins – Secure Enough For Security?

    [fa icon="calendar'] May 7, 2019 7:19:59 PM / by John Gallagher posted in cyber, physical security, IoT, service assurance

    [fa icon="comment"] 0 Comments

    Because they model a part of the real world, “digital twins” are quickly becoming important business tools for organizations that deploy Internet of things (IoT) devices. Digital twins can help maintain industrial processes, explore new business opportunities, and develop new and enhanced connected products and services. They are particularly applicable to distributed systems such as physical security systems that include many IoT devices, where they can help solve operational issues more quickly and effectively than field diagnostics.

    Read More [fa icon="long-arrow-right"]

    Convergence is Back with a Vengeance

    [fa icon="calendar'] Mar 20, 2019 4:25:00 PM / by John Gallagher posted in cyber, physical security, IoT, firmware

    [fa icon="comment"] 0 Comments

    A few years ago at physical security industry conferences the word I heard the most was “convergence”. At that time the meaning of it was how Physical Security and IT were coming closer together, and it was a hot topic because analog technology was quickly giving way to IP-based approaches. With access control becoming tied to identity management, and surveillance being managed, stored, and analyzed on computer networks, it’s easy to see now why that convergence was critical for the industry and one that required rethinking old approaches.

    Read More [fa icon="long-arrow-right"]

    Are You Automating Camera Firmware Updates? You Should.

    [fa icon="calendar'] Dec 7, 2018 3:56:27 PM / by John Gallagher posted in cyber, physical security, IoT, firmware

    [fa icon="comment"] 0 Comments

    The now infamous Target data breach was transacted by malware being placed on the HVAC system servers.  A casino had its “high roller” database stolen by leveraging the network connection of an aquarium thermostat to export the file from the internal network.  Leveraging the physical security system’s camera devices a bank was hacked, revealing confidential information.  These are just some of the examples of how IoT devices, especially at the edge of a network, can be exploited by cyber-criminals. 

    Read More [fa icon="long-arrow-right"]