The SDI Team reports from the ISC West conference, including industry trends, new technologies, and security market observations. Whether you were in attendance at the ISC West conference or not, please find our following takeaways to assist you with keeping your organization up to speed with industry developments.
2. 2
ISC West 2017 – Takeaways from a Systems
Integrator Perspective
SDI plays an active role in the physical
security industry, from participating in
industry events such as ISC West to our
daily interactions with our security
clients and partner network.
SDI participates at ISC West
with a systems integrator perspective to identify meaningful trends and value-
add products and tools for our clients and projects.
Whether you were in attendance at the ISC West conference or not, please
find our following takeaways to assist you with keeping your organization up
to speed with industry developments.
- The SDI Team
SDI Contributors: Christopher Payne and Don Zoufal
3. 3
Topics Addressed at ISC West
The current hot topics covered at ISC West included:
• Video Technologies
• Access Control Systems
• Multi-Sensor Technology
• Analytics Technology
• Robotics and Autonomous Technologies
• Cybersecurity
• Wearable Technologies
ISC West participants drilled into each of these topic areas, and the application of a
range of technologies to address security and operations concerns.
4. 4
As you read on, consider…
Introducing a new technology deployment into a large enterprise
requires an broad view in the early stages in order to reduce risk and
ensure stakeholder satisfaction, states SDI SVP and security industry
SME Chris Payne. Some initial questions to contemplate, as you
consider some of ISCWest’s technologies for your organization:
Are you ready to take advantage of advanced technology?
• Cost
• Impact on operations
• Risks
What are the first steps?
• Needs Assessment
• ConOps
• Product Selection
What are the critical success factors?
Can your current IT environment support increase in demand and through put?
• Network
• Data Storage
• Support
5. 5
Video
• Most of the premier video management vendors are now offering access
control management.
• There is a lot of interest in facial recognition, but no one vendor has
cornered the market.
• Video Compression Solutions (i.e.: h.265, Smart Compression h.264):
As the trend for higher resolution cameras continues, compression solutions
are a necessity to accommodate storage and bandwidth capacity.
• VMS platforms (and camera manufacturers) are stepping up the quality of
their analytics (facial recognition, search engines etc.): Most VMS
manufacturers are providing state of the art analytics. The need for a third
party analytic solution that integrates with a VMS will be unnecessary –
except for very specialized needs.
6. 6
Access Control
• Most traditional access control vendors are migrating to an open
hardware architecture
• Multi Media Readers (MMR) – or Bluetooth readers:
Multiple vendors were showcasing their ability to utilize Bluetooth
technology with mobile phones. Is the use of a standard access
control card headed towards a thing of the past?
7. 7
Multi-Sensor Technology
With the digitization of a growing number of systems and with advances in computing
power to access and utilize those devices, sensor arrays are multiplying in the security
space. Camera platforms are being joined by a range of other sensor devices:
• One example of advancing sensor technology is audio sensors – technologies that
identify, locate, and monitor sound. These technologies can be used in
conjunction with camera systems to alarm operators, so that attention can be
focused in specific areas. In fact, some cameras are coming equipped with sound
detection technology. These sensors can alert to sounds like gunfire, breaking
glass, and even angry voices.
• Another example of multisensory arrays growing in popularity is smart lighting.
These arrays allow area lighting to be combined with an array of sensors and other
technologies including cameras, motion detection sensors, sound detection
sensors, public address technologies, and even digital signage. These new multi-
sensor arrays afford safety and security professionals with a range of tools that
enhance their ability to understand their operational environments, guide
response activities, and even communicate with individuals in affected areas.
8. 8
Multi-Sensor Technology
The array of sensors is augmented by the growing realization of sensor data already in
the environment.
The Internet of Things—devices in the environment that are already generating data
– further enhance the ability of security professionals to better understand their
environment. Middleware and integration tools allow this sensor data to be used
with traditional security technologies placed in the environment.
The combination can allow for an exponential increase in information for use in
security operations.
9. 9
As the sensor arrays grow and more data is available to safety and security professionals,
there is an increasing need for assistance in making sense of all that data. To meet that
need, there is growing suites of products that can apply analytics to sensor data. These
analytics platforms help relate differing sensor platforms to provide operators with alerts
and alarms regarding to specified items or actions in designated area of interest.
• The application of analytics is not just occurring at the center of security networks; it
is also happening at the device-level, on the periphery. For example, there are
growing numbers of cameras that are equipped with analytic technologies. These
smart devices can be used at the edge to send data only when certain criteria are met
(e.g. someone entering a designated area; someone loitering in an area; and/or the
presence of an object or an item that that has been abandoned).
• The application of analytics to sensor technology makes the use of sensors more
efficient and effective. They allow for the collection of more data and reduce sensory
overload by operators. While oftentimes the sensitivity of analytics must be adjusted
to reduce false positive results, analytic technologies are becoming increasingly
effective. They also power a growing shift of security technology that is largely
reactive to technology that can be predictive.
Analytics Technology
10. 10
Wearable Technologies
As a corollary to the expanding sensor universe, there is a growing realization
that those sensors can be applied to the humans themselves. In the public law
enforcement sector, there is strong movement to provide body cameras to
officers to enhance accountability and operational transparency. While these
systems are principally forensic in nature at the current time, there is increasing
interest in the ability of these systems to provide real-time data.
• Taking a cue from public sector law enforcement, there is also growing
interest in the private security industry to utilize wearable camera technology.
These cameras can assist in documenting employee conduct during critical
incidents and can serve to improve employee conduct. As real-time use
becomes possible, these systems will offer an opportunity for enhancing the
ability to control response and officer safety.
• Cameras are just one aspect of the wearables revolution. Ability to sensor
things like heart rate, temperature and other vital factors – as well as
providing positioning data – make wearable sensors extremely valuable.
These tools can be used to monitor a range of employee activity, including
health and wellness.
11. 11
Robotics and Autonomous Technologies
The development of robotics and autonomous technology for security operations
continues to provide an interesting path forward for security operations. Robotics are
becoming an increasing presence both on the ground and in the sky. Surface and aerial
vehicles equipped with sensors can be managed by operators, but here is a growing
development of autonomous capabilities for operation.
• The rapidly growing field of drones was well on display for review by security
professionals at ISC West. Drone aircraft equipped with cameras, thermal imaging
capabilities and range of other sensors are growing in both availability and
sophistication. These unmanned aircraft can be equipped and utilized for a range of
security and public safety operations: general area surveillance, search and rescue,
and support functions like providing communication hotspots or delivering supplies.
• Of course, the presence of drones raises the issue of defense against improper use.
Surveillance by individuals looking to cause harm is a real threat. There is also the
growing threat of weaponized drone usage. These threats have spawned a nascent
but growing industry of anti-drone technology.
12. 12
Robotics and Autonomous Technologies
In addition to the aerial drones, there is a growing field of land based unmanned
vehicles for use in surveillance. These robotic technologies – previously relegated
largely to extremely dangerous tasks like analyzing abandoned items for explosives
– are now being expanded to a range of other uses. Robotic vehicles equipped
with cameras and other sensors are now being used to conduct routine patrols of
perimeter areas.
Robots equipped with autonomous technology have been deployed for routine
patrol in areas including shopping malls, hospital campuses, parking lots and
warehouses. These robots can perform observe and report functions previously
reserved for human assets. As autonomous technology continues to be perfected,
the utility of this type of repost will increase.
13. 13
Cybersecurity
One final burgeoning field at the ISC West show was product and vendor attention to
cyber threats and vulnerability. On display were both products and services to assist
safety and security professionals in maintaining a more safe and secure cyber
environment. Just as security technology devices are powered by and operated in
virtual environments, the security of those environments becomes increasingly critical.
• The attention to all matters cyber at the show demonstrates that both cyber
threats and cyber vulnerabilities are growing. As more systems utilize the efficiency
and effectiveness of the virtual environment, systems become increasingly
vulnerable to hacking and cyber-attack. Securing these systems requires both
internal and external efforts.
• As physical security products are being developed, data encryption to protect data
is becoming increasingly important. There is also increasing focus on the
transmission and receipt of encrypted data. Services and products for network
monitoring to identify vulnerabilities and detect and defeat threats were also
readily on display. Additionally, services for cyber threat assessment and cyber
security training were also in abundance.
14. 14
Cybersecurity
The proliferation of cyber security solutions at ISC West and in the physical security
market is a testament to the growing importance of considering cybersecurity as part
of an overall security program.
Working with integrators to assess an organization’s cyber hygiene and develop plans
to harden networks against cyber threats is becoming an matter of increasing
importance. Ample tools and solutions exist to assist in that endeavor.
15. 15
Conclusions
The use of technology to address a range of safety and security problems
remains strong among security professionals.
The growing complexity of these systems – and the value derived from achieving
their harmonious use – makes integration services increasingly important.
Integrated sensor and operational platforms are a continuing challenge for
security professionals.
16. 16
Additional Reading
The SDI Team presented several sessions at ISCWest 2017. Please find the
presentations below for further review:
E-Pluribus-Unum-Harnessing-Traditional-and-SoMoLo-Social-Mobile-Location-
Technology-for-Better-Situational-Awareness
The-Real-Force-Awakens-Mutli-sensor-Data-Analysis-for-Predictive-Safety-and-
Security
Sailing-the-Sea-of-Video-Surveillance-Data-Approaches-to-Navigating-Policy-
Development
Please contact SDI directly to discuss how we may assist your organization with
any of the topics in this presentation:
Christopher Payne, SDI Senior Vice President
Direct: 312.590.6868
cpayne@sdipresence.com
17. Mission-critical systems integrator SDI delivers intelligent technology solutions to
ensure operational performance, security and revenue generation. Addressing the
higher technical requirements of today’s advanced security systems, SDI offers a
hybrid security and IT skill set that significantly reduces risks and optimizes
performance when integrating security technology into enterprise environments. The
firm’s IT engineers are adept in addressing typical CIO concerns about network
utilization, cybersecurity, and overall risk mitigation related to the deployment of
logical and physical security systems such as PSIM, access control, and enterprise
digital video surveillance. SDI’s client portfolio includes some of the nation’s largest
airports, commercial real estate portfolios and national banks and financial services
organizations.
Call SDI for integrated security technology systems and services:
IT Program Management
Security Concept of Operations
Enterprise Systems Architecture /Integration
Hybrid/Hyper-Converged infrastructure
Cybersecurity
Command Center Technology Design/Build Outs
Security IT Managed Services Programs
Digital Video Surveillance/ Analytics
Access Control, Biometrics
Identity Management
Dispatch/Incident Management
PSIM/Event Management
Alarm/Perimeter Intrusion Detection
888-YOUR SDI (888-968-7734) sdipresence.com SDI Presence @sdipresence