Security Systems News

APR 2016

Security Systems News is a monthly business newspaper that reaches 25,100 security installers, product distributors, central stations, engineers & architects, and security consultants. Our editorial coverage focuses on breaking news in all major se

Issue link: http://ssn.epubxp.com/i/657862

Contents of this Issue

Navigation

Page 19 of 60

Dual Side Dewarping SUPER DEWARPING Mobile Dewarping Smooth Dewarping 801 Hammond Street, Suite 200, Coppell, TX 75019, U.S.A. T 1 (866) 986-1312 P 1 (469) 444-6538 F 1 (469) 464-4449 E sales_americas@idisglobal.com IDIS America Thanks for visiting IDIS in booth #18063 at ISC West! Security Technologies, represented the small business owner on the panel, and said that cloud-based services had truly freed her team to spend more time on client-based tasking vs. spending time working on internal IT systems. IST has outsourced all of its HR, IT, and CRM systems, real- izing gains in workforce mobility, workfow management, and work- fow consistency. She said IST will continue to leverage cloud-based services for even greater gains in the future. I have seen the results at IST frsthand. In my opinion, effciency gains are out there for small busi- nesses of every kind. We just have to take the time to sift through and test the cloud offerings. Oh yeah, and don't forget about strong daily backup measures. Rich Lyman, regional sales manager for Lenel/UTC believes his enterprise clients—a virtual who's who of Silicon Valley—are absorbing technology and replac- ing technology at a rapid pace. He sees the integration of the access control platform with other sys- tems in the enterprise as a key component for operational sav- ings, with enhanced security along the way, of course. My experience is that the Hawaii enterprise-space has been decid- edly slower-paced. Municipal government, health care, and our critical infrastructure sectors are well behind the deployment curve, and thus the effciencies-gained- curve, when it comes to leverag- ing integration across their oper- ating units. I'm looking forward to exploring ways to help these entities capture some of the value that is being realized by our main- land counterparts, unfortunately it looks like it'll be happening on "Hawaii time." the enterprise. Gill demonstrated how gath- ering, normalizing, and then analyzing the large amounts of data generated within enterprise operations, patterns of behavior, operation and environment can be graded for risk and then monitored dynamically. Gill's presentation truly excited the possibilities in my integrator's mind. I believe that by monitor- ing and measuring the relation- ships between objects [people and things], time, and space we can offer new solutions for problems that have escaped the scrutiny of existing siloed physical security systems. Enterprise security management requires analysis of relational data to truly understand the chang- ing nature of risk throughout the enterprise operational ecosystem. A second breakout session fea- tured a presentation on identity by Sal D'Agostino. D'Agostino brings a thinktank-level perspective to this topic, but he made it digestible for all of us in the room. Essential- ly, we haven't yet answered the call for a unique identity in the United States. It's clear to me that Social Security numbers have failed. And we have different drivers licenses for every state: fail. How do we begin to constitute a reliable identity is not a question I ask myself very often; I've grown too used to living with many. Attri- butes that could uniquely defne, and differentiate people (maybe an IPv6 address?) resist deployment, leaving gaps in the trust-and-secu- rity of our transactions with others and the world. It occurs to me that identity (and privacy by association) may be the single slice of pie preventing us from normalizing trusted identi- ties and transactions. Ongoing work in this area is being conducted by the Iden- tity Ecosystem Steering Group (IDESG), in a mission to evolve an Identity Ecosystem Framework (IDEF). This framework effort stems from the National Strategy for Trusted Identities in Cyberspace (NSTIC) that will encourage and enable online communities to share "technologies, processes and policies with a strong base- line commitment to privacy, ease of use, interoperability and security." I was previously unaware of the depth of work in this area and I do believe that a national ID of some type would make everyday transactions with my bank, my medical provider, my business, and even my grocery store simpler and more secure. Let's hope we get there soon. The day's fnal panel discussion was focused on fnding effciencies in business while keeping up with "Trends in Technology." Christine Lanning, president of Integrated LANNING see page 18 Continued from page 16 SECURITY SYSTEMS NEWS APRIL 2016 www.securitysystemsnews.com Guest Commentary 17

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Systems News - APR 2016