SlideShare una empresa de Scribd logo
1 de 18
Descargar para leer sin conexión
Confidential. © 2017 SDI Presence LLC.
SDI PRESENCE
Conference Recap
The SDI Team reports from the ISC West conference,
including industry trends, new technologies and security market observations.
advisory services. technology delivery. managed services.
www.sdipresence.com
2
ISC West 2017 – Takeaways from a Systems
Integrator Perspective
SDI plays an active role in the physical
security industry, from participating in
industry events such as ISC West to our
daily interactions with our security
clients and partner network.
SDI participates at ISC West
with a systems integrator perspective to identify meaningful trends and value-
add products and tools for our clients and projects.
Whether you were in attendance at the ISC West conference or not, please
find our following takeaways to assist you with keeping your organization up
to speed with industry developments.
- The SDI Team
SDI Contributors: Christopher Payne and Don Zoufal
3
Topics Addressed at ISC West
The current hot topics covered at ISC West included:
• Video Technologies
• Access Control Systems
• Multi-Sensor Technology
• Analytics Technology
• Robotics and Autonomous Technologies
• Cybersecurity
• Wearable Technologies
ISC West participants drilled into each of these topic areas, and the application of a
range of technologies to address security and operations concerns.
4
As you read on, consider…
Introducing a new technology deployment into a large enterprise
requires an broad view in the early stages in order to reduce risk and
ensure stakeholder satisfaction, states SDI SVP and security industry
SME Chris Payne. Some initial questions to contemplate, as you
consider some of ISCWest’s technologies for your organization:
Are you ready to take advantage of advanced technology?
• Cost
• Impact on operations
• Risks
What are the first steps?
• Needs Assessment
• ConOps
• Product Selection
What are the critical success factors?
Can your current IT environment support increase in demand and through put?
• Network
• Data Storage
• Support
5
Video
• Most of the premier video management vendors are now offering access
control management.
• There is a lot of interest in facial recognition, but no one vendor has
cornered the market.
• Video Compression Solutions (i.e.: h.265, Smart Compression h.264):
As the trend for higher resolution cameras continues, compression solutions
are a necessity to accommodate storage and bandwidth capacity.
• VMS platforms (and camera manufacturers) are stepping up the quality of
their analytics (facial recognition, search engines etc.): Most VMS
manufacturers are providing state of the art analytics. The need for a third
party analytic solution that integrates with a VMS will be unnecessary –
except for very specialized needs.
6
Access Control
• Most traditional access control vendors are migrating to an open
hardware architecture
• Multi Media Readers (MMR) – or Bluetooth readers:
Multiple vendors were showcasing their ability to utilize Bluetooth
technology with mobile phones. Is the use of a standard access
control card headed towards a thing of the past?
7
Multi-Sensor Technology
With the digitization of a growing number of systems and with advances in computing
power to access and utilize those devices, sensor arrays are multiplying in the security
space. Camera platforms are being joined by a range of other sensor devices:
• One example of advancing sensor technology is audio sensors – technologies that
identify, locate, and monitor sound. These technologies can be used in
conjunction with camera systems to alarm operators, so that attention can be
focused in specific areas. In fact, some cameras are coming equipped with sound
detection technology. These sensors can alert to sounds like gunfire, breaking
glass, and even angry voices.
• Another example of multisensory arrays growing in popularity is smart lighting.
These arrays allow area lighting to be combined with an array of sensors and other
technologies including cameras, motion detection sensors, sound detection
sensors, public address technologies, and even digital signage. These new multi-
sensor arrays afford safety and security professionals with a range of tools that
enhance their ability to understand their operational environments, guide
response activities, and even communicate with individuals in affected areas.
8
Multi-Sensor Technology
The array of sensors is augmented by the growing realization of sensor data already in
the environment.
The Internet of Things—devices in the environment that are already generating data
– further enhance the ability of security professionals to better understand their
environment. Middleware and integration tools allow this sensor data to be used
with traditional security technologies placed in the environment.
The combination can allow for an exponential increase in information for use in
security operations.
9
As the sensor arrays grow and more data is available to safety and security professionals,
there is an increasing need for assistance in making sense of all that data. To meet that
need, there is growing suites of products that can apply analytics to sensor data. These
analytics platforms help relate differing sensor platforms to provide operators with alerts
and alarms regarding to specified items or actions in designated area of interest.
• The application of analytics is not just occurring at the center of security networks; it
is also happening at the device-level, on the periphery. For example, there are
growing numbers of cameras that are equipped with analytic technologies. These
smart devices can be used at the edge to send data only when certain criteria are met
(e.g. someone entering a designated area; someone loitering in an area; and/or the
presence of an object or an item that that has been abandoned).
• The application of analytics to sensor technology makes the use of sensors more
efficient and effective. They allow for the collection of more data and reduce sensory
overload by operators. While oftentimes the sensitivity of analytics must be adjusted
to reduce false positive results, analytic technologies are becoming increasingly
effective. They also power a growing shift of security technology that is largely
reactive to technology that can be predictive.
Analytics Technology
10
Wearable Technologies
As a corollary to the expanding sensor universe, there is a growing realization
that those sensors can be applied to the humans themselves. In the public law
enforcement sector, there is strong movement to provide body cameras to
officers to enhance accountability and operational transparency. While these
systems are principally forensic in nature at the current time, there is increasing
interest in the ability of these systems to provide real-time data.
• Taking a cue from public sector law enforcement, there is also growing
interest in the private security industry to utilize wearable camera technology.
These cameras can assist in documenting employee conduct during critical
incidents and can serve to improve employee conduct. As real-time use
becomes possible, these systems will offer an opportunity for enhancing the
ability to control response and officer safety.
• Cameras are just one aspect of the wearables revolution. Ability to sensor
things like heart rate, temperature and other vital factors – as well as
providing positioning data – make wearable sensors extremely valuable.
These tools can be used to monitor a range of employee activity, including
health and wellness.
11
Robotics and Autonomous Technologies
The development of robotics and autonomous technology for security operations
continues to provide an interesting path forward for security operations. Robotics are
becoming an increasing presence both on the ground and in the sky. Surface and aerial
vehicles equipped with sensors can be managed by operators, but here is a growing
development of autonomous capabilities for operation.
• The rapidly growing field of drones was well on display for review by security
professionals at ISC West. Drone aircraft equipped with cameras, thermal imaging
capabilities and range of other sensors are growing in both availability and
sophistication. These unmanned aircraft can be equipped and utilized for a range of
security and public safety operations: general area surveillance, search and rescue,
and support functions like providing communication hotspots or delivering supplies.
• Of course, the presence of drones raises the issue of defense against improper use.
Surveillance by individuals looking to cause harm is a real threat. There is also the
growing threat of weaponized drone usage. These threats have spawned a nascent
but growing industry of anti-drone technology.
12
Robotics and Autonomous Technologies
In addition to the aerial drones, there is a growing field of land based unmanned
vehicles for use in surveillance. These robotic technologies – previously relegated
largely to extremely dangerous tasks like analyzing abandoned items for explosives
– are now being expanded to a range of other uses. Robotic vehicles equipped
with cameras and other sensors are now being used to conduct routine patrols of
perimeter areas.
Robots equipped with autonomous technology have been deployed for routine
patrol in areas including shopping malls, hospital campuses, parking lots and
warehouses. These robots can perform observe and report functions previously
reserved for human assets. As autonomous technology continues to be perfected,
the utility of this type of repost will increase.
13
Cybersecurity
One final burgeoning field at the ISC West show was product and vendor attention to
cyber threats and vulnerability. On display were both products and services to assist
safety and security professionals in maintaining a more safe and secure cyber
environment. Just as security technology devices are powered by and operated in
virtual environments, the security of those environments becomes increasingly critical.
• The attention to all matters cyber at the show demonstrates that both cyber
threats and cyber vulnerabilities are growing. As more systems utilize the efficiency
and effectiveness of the virtual environment, systems become increasingly
vulnerable to hacking and cyber-attack. Securing these systems requires both
internal and external efforts.
• As physical security products are being developed, data encryption to protect data
is becoming increasingly important. There is also increasing focus on the
transmission and receipt of encrypted data. Services and products for network
monitoring to identify vulnerabilities and detect and defeat threats were also
readily on display. Additionally, services for cyber threat assessment and cyber
security training were also in abundance.
14
Cybersecurity
The proliferation of cyber security solutions at ISC West and in the physical security
market is a testament to the growing importance of considering cybersecurity as part
of an overall security program.
Working with integrators to assess an organization’s cyber hygiene and develop plans
to harden networks against cyber threats is becoming an matter of increasing
importance. Ample tools and solutions exist to assist in that endeavor.
15
Conclusions
The use of technology to address a range of safety and security problems
remains strong among security professionals.
The growing complexity of these systems – and the value derived from achieving
their harmonious use – makes integration services increasingly important.
Integrated sensor and operational platforms are a continuing challenge for
security professionals.
16
Additional Reading
The SDI Team presented several sessions at ISCWest 2017. Please find the
presentations below for further review:
E-Pluribus-Unum-Harnessing-Traditional-and-SoMoLo-Social-Mobile-Location-
Technology-for-Better-Situational-Awareness
The-Real-Force-Awakens-Mutli-sensor-Data-Analysis-for-Predictive-Safety-and-
Security
Sailing-the-Sea-of-Video-Surveillance-Data-Approaches-to-Navigating-Policy-
Development
Please contact SDI directly to discuss how we may assist your organization with
any of the topics in this presentation:
Christopher Payne, SDI Senior Vice President
Direct: 312.590.6868
cpayne@sdipresence.com
Mission-critical systems integrator SDI delivers intelligent technology solutions to
ensure operational performance, security and revenue generation. Addressing the
higher technical requirements of today’s advanced security systems, SDI offers a
hybrid security and IT skill set that significantly reduces risks and optimizes
performance when integrating security technology into enterprise environments. The
firm’s IT engineers are adept in addressing typical CIO concerns about network
utilization, cybersecurity, and overall risk mitigation related to the deployment of
logical and physical security systems such as PSIM, access control, and enterprise
digital video surveillance. SDI’s client portfolio includes some of the nation’s largest
airports, commercial real estate portfolios and national banks and financial services
organizations.
Call SDI for integrated security technology systems and services:
IT Program Management
Security Concept of Operations
Enterprise Systems Architecture /Integration
Hybrid/Hyper-Converged infrastructure
Cybersecurity
Command Center Technology Design/Build Outs
Security IT Managed Services Programs
Digital Video Surveillance/ Analytics
Access Control, Biometrics
Identity Management
Dispatch/Incident Management
PSIM/Event Management
Alarm/Perimeter Intrusion Detection
888-YOUR SDI (888-968-7734) sdipresence.com SDI Presence @sdipresence
18
SDI PRESENCE LLC
33 West Monroe, Suite 400
Chicago, IL 60603
312.580.7500 phone
888.968.7734 toll free
The views and opinions expressed in this article are those of the authors and do not necessarily reflect the
official policy or position of SDI Presence LLC. Any content provided by our authors are of their opinion, and
are not intended to malign any organization, company, individual or anyone or anything.
The information contained in this document is for general information purposes only. We make no
representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability,
suitability or availability with respect to the information, products, services, or related graphics contained herein
for any purpose. Any reliance you place on such information is therefore strictly at your own risk.
Although the information herein is intended to be current and accurate, the information presented may not
reflect the most current developments in the field of security. These materials may be changed, improved, or
updated without notice.
Copyright © SDI PRESENCE LLC. All Rights Reserved.

Más contenido relacionado

La actualidad más candente

Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationStefane Mouille
 
Cyber physical systems and robotics
Cyber physical systems and roboticsCyber physical systems and robotics
Cyber physical systems and roboticstrinhanhtuan247
 
Implementation of-a-motion-detection-system
Implementation of-a-motion-detection-systemImplementation of-a-motion-detection-system
Implementation of-a-motion-detection-systemCemal Ardil
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAAharon Aharon
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn Kingsley
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEurotech
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015Paul F. Roberts
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015Hildebrand Technology
 
Internet of Things with Wearable Devices at Enterprise Radar
Internet of Things with Wearable Devices at Enterprise RadarInternet of Things with Wearable Devices at Enterprise Radar
Internet of Things with Wearable Devices at Enterprise Radariosrjce
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionEnclaveSecurity
 
White Paper - Tracking Assets and Workers in Construction
White Paper - Tracking Assets and Workers in ConstructionWhite Paper - Tracking Assets and Workers in Construction
White Paper - Tracking Assets and Workers in ConstructionJulia McNally
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksYokogawa1
 
Medical & Healthcare IoT M2M Solutions
Medical & Healthcare IoT M2M SolutionsMedical & Healthcare IoT M2M Solutions
Medical & Healthcare IoT M2M SolutionsEurotech
 

La actualidad más candente (20)

Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentation
 
Cyber physical systems and robotics
Cyber physical systems and roboticsCyber physical systems and robotics
Cyber physical systems and robotics
 
Implementation of-a-motion-detection-system
Implementation of-a-motion-detection-systemImplementation of-a-motion-detection-system
Implementation of-a-motion-detection-system
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
CyCron 2016
CyCron 2016CyCron 2016
CyCron 2016
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
Cps sec sg sg2017 conf_iran
Cps sec sg  sg2017 conf_iranCps sec sg  sg2017 conf_iran
Cps sec sg sg2017 conf_iran
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
Internet of Things with Wearable Devices at Enterprise Radar
Internet of Things with Wearable Devices at Enterprise RadarInternet of Things with Wearable Devices at Enterprise Radar
Internet of Things with Wearable Devices at Enterprise Radar
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
 
White Paper - Tracking Assets and Workers in Construction
White Paper - Tracking Assets and Workers in ConstructionWhite Paper - Tracking Assets and Workers in Construction
White Paper - Tracking Assets and Workers in Construction
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
Medical & Healthcare IoT M2M Solutions
Medical & Healthcare IoT M2M SolutionsMedical & Healthcare IoT M2M Solutions
Medical & Healthcare IoT M2M Solutions
 

Similar a SDI @ISCWest 2017: A Systems Integrator Perspective

Innovative Surveillance_ The Rising Impact of Security Robot Services.pdf
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdfInnovative Surveillance_ The Rising Impact of Security Robot Services.pdf
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdfnuwatt966
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarketFinite Moments
 
Video Surveillance Software Market size.pdf
Video Surveillance Software Market size.pdfVideo Surveillance Software Market size.pdf
Video Surveillance Software Market size.pdfshreyaporekar9
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copyevsrao
 
The Invisible Eye
The Invisible EyeThe Invisible Eye
The Invisible Eyeijtsrd
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Unisys Corporation
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
Eye, Wrist, Body … Where Is the Wearables Market Headed?
Eye, Wrist, Body … Where Is the Wearables Market Headed?Eye, Wrist, Body … Where Is the Wearables Market Headed?
Eye, Wrist, Body … Where Is the Wearables Market Headed?szhosain
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021Heidelberg India
 
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxR E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxmakdul
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSource Code Control Limited
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0Osama Shahumi
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
Disruptive Trends Fueled by AI & Camera Edge Analytics
Disruptive Trends Fueled by AI & Camera Edge AnalyticsDisruptive Trends Fueled by AI & Camera Edge Analytics
Disruptive Trends Fueled by AI & Camera Edge AnalyticsMemoori
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesWavestone
 

Similar a SDI @ISCWest 2017: A Systems Integrator Perspective (20)

Innovative Surveillance_ The Rising Impact of Security Robot Services.pdf
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdfInnovative Surveillance_ The Rising Impact of Security Robot Services.pdf
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdf
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
Video Surveillance Software Market size.pdf
Video Surveillance Software Market size.pdfVideo Surveillance Software Market size.pdf
Video Surveillance Software Market size.pdf
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copy
 
The Invisible Eye
The Invisible EyeThe Invisible Eye
The Invisible Eye
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
SCMR.Wearables
SCMR.WearablesSCMR.Wearables
SCMR.Wearables
 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Eye, Wrist, Body … Where Is the Wearables Market Headed?
Eye, Wrist, Body … Where Is the Wearables Market Headed?Eye, Wrist, Body … Where Is the Wearables Market Headed?
Eye, Wrist, Body … Where Is the Wearables Market Headed?
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021
 
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docxR E G U L A R P A P E RUser-centric privacy awareness in v.docx
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
Disruptive Trends Fueled by AI & Camera Edge Analytics
Disruptive Trends Fueled by AI & Camera Edge AnalyticsDisruptive Trends Fueled by AI & Camera Edge Analytics
Disruptive Trends Fueled by AI & Camera Edge Analytics
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
 

Último

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

SDI @ISCWest 2017: A Systems Integrator Perspective

  • 1. Confidential. © 2017 SDI Presence LLC. SDI PRESENCE Conference Recap The SDI Team reports from the ISC West conference, including industry trends, new technologies and security market observations. advisory services. technology delivery. managed services. www.sdipresence.com
  • 2. 2 ISC West 2017 – Takeaways from a Systems Integrator Perspective SDI plays an active role in the physical security industry, from participating in industry events such as ISC West to our daily interactions with our security clients and partner network. SDI participates at ISC West with a systems integrator perspective to identify meaningful trends and value- add products and tools for our clients and projects. Whether you were in attendance at the ISC West conference or not, please find our following takeaways to assist you with keeping your organization up to speed with industry developments. - The SDI Team SDI Contributors: Christopher Payne and Don Zoufal
  • 3. 3 Topics Addressed at ISC West The current hot topics covered at ISC West included: • Video Technologies • Access Control Systems • Multi-Sensor Technology • Analytics Technology • Robotics and Autonomous Technologies • Cybersecurity • Wearable Technologies ISC West participants drilled into each of these topic areas, and the application of a range of technologies to address security and operations concerns.
  • 4. 4 As you read on, consider… Introducing a new technology deployment into a large enterprise requires an broad view in the early stages in order to reduce risk and ensure stakeholder satisfaction, states SDI SVP and security industry SME Chris Payne. Some initial questions to contemplate, as you consider some of ISCWest’s technologies for your organization: Are you ready to take advantage of advanced technology? • Cost • Impact on operations • Risks What are the first steps? • Needs Assessment • ConOps • Product Selection What are the critical success factors? Can your current IT environment support increase in demand and through put? • Network • Data Storage • Support
  • 5. 5 Video • Most of the premier video management vendors are now offering access control management. • There is a lot of interest in facial recognition, but no one vendor has cornered the market. • Video Compression Solutions (i.e.: h.265, Smart Compression h.264): As the trend for higher resolution cameras continues, compression solutions are a necessity to accommodate storage and bandwidth capacity. • VMS platforms (and camera manufacturers) are stepping up the quality of their analytics (facial recognition, search engines etc.): Most VMS manufacturers are providing state of the art analytics. The need for a third party analytic solution that integrates with a VMS will be unnecessary – except for very specialized needs.
  • 6. 6 Access Control • Most traditional access control vendors are migrating to an open hardware architecture • Multi Media Readers (MMR) – or Bluetooth readers: Multiple vendors were showcasing their ability to utilize Bluetooth technology with mobile phones. Is the use of a standard access control card headed towards a thing of the past?
  • 7. 7 Multi-Sensor Technology With the digitization of a growing number of systems and with advances in computing power to access and utilize those devices, sensor arrays are multiplying in the security space. Camera platforms are being joined by a range of other sensor devices: • One example of advancing sensor technology is audio sensors – technologies that identify, locate, and monitor sound. These technologies can be used in conjunction with camera systems to alarm operators, so that attention can be focused in specific areas. In fact, some cameras are coming equipped with sound detection technology. These sensors can alert to sounds like gunfire, breaking glass, and even angry voices. • Another example of multisensory arrays growing in popularity is smart lighting. These arrays allow area lighting to be combined with an array of sensors and other technologies including cameras, motion detection sensors, sound detection sensors, public address technologies, and even digital signage. These new multi- sensor arrays afford safety and security professionals with a range of tools that enhance their ability to understand their operational environments, guide response activities, and even communicate with individuals in affected areas.
  • 8. 8 Multi-Sensor Technology The array of sensors is augmented by the growing realization of sensor data already in the environment. The Internet of Things—devices in the environment that are already generating data – further enhance the ability of security professionals to better understand their environment. Middleware and integration tools allow this sensor data to be used with traditional security technologies placed in the environment. The combination can allow for an exponential increase in information for use in security operations.
  • 9. 9 As the sensor arrays grow and more data is available to safety and security professionals, there is an increasing need for assistance in making sense of all that data. To meet that need, there is growing suites of products that can apply analytics to sensor data. These analytics platforms help relate differing sensor platforms to provide operators with alerts and alarms regarding to specified items or actions in designated area of interest. • The application of analytics is not just occurring at the center of security networks; it is also happening at the device-level, on the periphery. For example, there are growing numbers of cameras that are equipped with analytic technologies. These smart devices can be used at the edge to send data only when certain criteria are met (e.g. someone entering a designated area; someone loitering in an area; and/or the presence of an object or an item that that has been abandoned). • The application of analytics to sensor technology makes the use of sensors more efficient and effective. They allow for the collection of more data and reduce sensory overload by operators. While oftentimes the sensitivity of analytics must be adjusted to reduce false positive results, analytic technologies are becoming increasingly effective. They also power a growing shift of security technology that is largely reactive to technology that can be predictive. Analytics Technology
  • 10. 10 Wearable Technologies As a corollary to the expanding sensor universe, there is a growing realization that those sensors can be applied to the humans themselves. In the public law enforcement sector, there is strong movement to provide body cameras to officers to enhance accountability and operational transparency. While these systems are principally forensic in nature at the current time, there is increasing interest in the ability of these systems to provide real-time data. • Taking a cue from public sector law enforcement, there is also growing interest in the private security industry to utilize wearable camera technology. These cameras can assist in documenting employee conduct during critical incidents and can serve to improve employee conduct. As real-time use becomes possible, these systems will offer an opportunity for enhancing the ability to control response and officer safety. • Cameras are just one aspect of the wearables revolution. Ability to sensor things like heart rate, temperature and other vital factors – as well as providing positioning data – make wearable sensors extremely valuable. These tools can be used to monitor a range of employee activity, including health and wellness.
  • 11. 11 Robotics and Autonomous Technologies The development of robotics and autonomous technology for security operations continues to provide an interesting path forward for security operations. Robotics are becoming an increasing presence both on the ground and in the sky. Surface and aerial vehicles equipped with sensors can be managed by operators, but here is a growing development of autonomous capabilities for operation. • The rapidly growing field of drones was well on display for review by security professionals at ISC West. Drone aircraft equipped with cameras, thermal imaging capabilities and range of other sensors are growing in both availability and sophistication. These unmanned aircraft can be equipped and utilized for a range of security and public safety operations: general area surveillance, search and rescue, and support functions like providing communication hotspots or delivering supplies. • Of course, the presence of drones raises the issue of defense against improper use. Surveillance by individuals looking to cause harm is a real threat. There is also the growing threat of weaponized drone usage. These threats have spawned a nascent but growing industry of anti-drone technology.
  • 12. 12 Robotics and Autonomous Technologies In addition to the aerial drones, there is a growing field of land based unmanned vehicles for use in surveillance. These robotic technologies – previously relegated largely to extremely dangerous tasks like analyzing abandoned items for explosives – are now being expanded to a range of other uses. Robotic vehicles equipped with cameras and other sensors are now being used to conduct routine patrols of perimeter areas. Robots equipped with autonomous technology have been deployed for routine patrol in areas including shopping malls, hospital campuses, parking lots and warehouses. These robots can perform observe and report functions previously reserved for human assets. As autonomous technology continues to be perfected, the utility of this type of repost will increase.
  • 13. 13 Cybersecurity One final burgeoning field at the ISC West show was product and vendor attention to cyber threats and vulnerability. On display were both products and services to assist safety and security professionals in maintaining a more safe and secure cyber environment. Just as security technology devices are powered by and operated in virtual environments, the security of those environments becomes increasingly critical. • The attention to all matters cyber at the show demonstrates that both cyber threats and cyber vulnerabilities are growing. As more systems utilize the efficiency and effectiveness of the virtual environment, systems become increasingly vulnerable to hacking and cyber-attack. Securing these systems requires both internal and external efforts. • As physical security products are being developed, data encryption to protect data is becoming increasingly important. There is also increasing focus on the transmission and receipt of encrypted data. Services and products for network monitoring to identify vulnerabilities and detect and defeat threats were also readily on display. Additionally, services for cyber threat assessment and cyber security training were also in abundance.
  • 14. 14 Cybersecurity The proliferation of cyber security solutions at ISC West and in the physical security market is a testament to the growing importance of considering cybersecurity as part of an overall security program. Working with integrators to assess an organization’s cyber hygiene and develop plans to harden networks against cyber threats is becoming an matter of increasing importance. Ample tools and solutions exist to assist in that endeavor.
  • 15. 15 Conclusions The use of technology to address a range of safety and security problems remains strong among security professionals. The growing complexity of these systems – and the value derived from achieving their harmonious use – makes integration services increasingly important. Integrated sensor and operational platforms are a continuing challenge for security professionals.
  • 16. 16 Additional Reading The SDI Team presented several sessions at ISCWest 2017. Please find the presentations below for further review: E-Pluribus-Unum-Harnessing-Traditional-and-SoMoLo-Social-Mobile-Location- Technology-for-Better-Situational-Awareness The-Real-Force-Awakens-Mutli-sensor-Data-Analysis-for-Predictive-Safety-and- Security Sailing-the-Sea-of-Video-Surveillance-Data-Approaches-to-Navigating-Policy- Development Please contact SDI directly to discuss how we may assist your organization with any of the topics in this presentation: Christopher Payne, SDI Senior Vice President Direct: 312.590.6868 cpayne@sdipresence.com
  • 17. Mission-critical systems integrator SDI delivers intelligent technology solutions to ensure operational performance, security and revenue generation. Addressing the higher technical requirements of today’s advanced security systems, SDI offers a hybrid security and IT skill set that significantly reduces risks and optimizes performance when integrating security technology into enterprise environments. The firm’s IT engineers are adept in addressing typical CIO concerns about network utilization, cybersecurity, and overall risk mitigation related to the deployment of logical and physical security systems such as PSIM, access control, and enterprise digital video surveillance. SDI’s client portfolio includes some of the nation’s largest airports, commercial real estate portfolios and national banks and financial services organizations. Call SDI for integrated security technology systems and services: IT Program Management Security Concept of Operations Enterprise Systems Architecture /Integration Hybrid/Hyper-Converged infrastructure Cybersecurity Command Center Technology Design/Build Outs Security IT Managed Services Programs Digital Video Surveillance/ Analytics Access Control, Biometrics Identity Management Dispatch/Incident Management PSIM/Event Management Alarm/Perimeter Intrusion Detection 888-YOUR SDI (888-968-7734) sdipresence.com SDI Presence @sdipresence
  • 18. 18 SDI PRESENCE LLC 33 West Monroe, Suite 400 Chicago, IL 60603 312.580.7500 phone 888.968.7734 toll free The views and opinions expressed in this article are those of the authors and do not necessarily reflect the official policy or position of SDI Presence LLC. Any content provided by our authors are of their opinion, and are not intended to malign any organization, company, individual or anyone or anything. The information contained in this document is for general information purposes only. We make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the information, products, services, or related graphics contained herein for any purpose. Any reliance you place on such information is therefore strictly at your own risk. Although the information herein is intended to be current and accurate, the information presented may not reflect the most current developments in the field of security. These materials may be changed, improved, or updated without notice. Copyright © SDI PRESENCE LLC. All Rights Reserved.