Security Systems News

APR 2017

Security Systems News is a monthly business newspaper that reaches 25,100 security installers, product distributors, central stations, engineers & architects, and security consultants. Our editorial coverage focuses on breaking news in all major se

Issue link:

Contents of this Issue


Page 26 of 54

smarter security solutions. april 2017 SECU ri TY SYSTEMS NEWS Commer C ial & systems integrators 20 Success in business goes hand in hand with knowledge. Axis Communications' Academy empowers you to deliver smarter security solutions. Axis Communications' Academy – Empowering knowledge. Visit Success in business goes hand in hand with knowledge. Axis Communications' Academy empowers you to deliver Learn. Succeed . Big data's value in security will start to play a bigger role in the ultimate goal, in my opinion, which is the predictive analysis—or the predictive analytics—within physi- cal security." "True big data and predictive analytics are when you can take the human out and let the machine do everything, and we're clearly not there yet," Urban said. Phillips said that his company is currently retaining a lot of its data, but that has not yet stretched to include data from physical security systems. "While it may not be the cheapest thing, it's gotten a lot cheaper now to store some of that data," said Phillips. "I think we'll see it in physical security once we get a few pioneers to do it and talk about it, so that everyone else gets that comfort level that it's going to work," he continued. Is big data just having a PSIM, Phillips asked the panelists, or is there more? "I think there's more," Urban said, adding that events within PSIM systems, and the users' responses, can be data points that end up help- ing big data or predictive analytic environments. "PSIM is its own animal," Carney said. "It's not making the data, it's not storing the data, it's not necessarily analyzing the data, so it really does have a different function." Big data gathered from access control systems can help insider threat detection, Phillips said. "Take a person's badge history, and cre- ate somewhat of a profile for that person, figure out their badging trends. If I come in on a typical day, Monday through Friday, 9 to 5, and I go exactly where my office is—why am I now at 6 p.m. or 7 p.m. trying to scan the CEO's office, where I don't have access? Or, why am I coming in at 2 a.m. on a Saturday?" All agreed, big data is still emerg- ing in the physical security space. "First and foremost, it's early days in this space," Carney said. "If you are interested in getting in this, understand first where you want to be in the value chain—data has value —and who are your customers." He continued, "If you're dealing with large enterprises, one of the things that getting into big data does for you is it allows you access to that customer beyond just the security director; the IT department, facilities, they may have a supply chain—they are all interested in the type of data that can help them." Carney recommended one pos- sible first step: hiring an employee with a data-focused background. "It's really about starting small, trying to find the value for your customer, … refining your understanding and the capabilities, proving it out, showing the value, and moving on. We really think that that's how big data really proliferates through the physical security business." Big data can include more sources than just the systems that are inter- nal to a location. Carney listed two offerings, Rapid Miner and DataRobot. "Those are off-the- shelf tools that will help aggregate data. Data comes in two flavors, structured and unstructured data. One's easier to manage, one's a little bit harder—but the tools out there will help." Phillips mentioned another tool: GDelt, an index of online and print news. "I think we get just as much out of open source as we do out of our paid services," he said. There are some pitfalls to big data, its storage and its usage. "I read a book on big data and one of the biggest pitfalls was drawing correlations that aren't there. When you have all of these big sets of data, there is coincidence," Phillips said. "There are two primary concerns in the space of big data. One of which is something we all deal with every day and that is cybersecurity," Carney said, and big data can extend a company's risks with cybersecurity. "If you are using a public cloud or some other type of data repository, you have the third-party's cybersecu- rity profile to be concerned about." Privacy can be particularly concern- ing as countries have different laws around data privacy, he said. Urban pointed out that the costs "to implement, maintain and operate these sorts of systems is still out of reach, I think, for a lot of the smaller types of companies that might get benefit from these things." Storage is another challenge, which is also related to cost, he added. Closed access control systems can be another difficulty in big data within the physical security realm, Phillips pointed out. "Not all access control systems have an open and friendly API to integrate to. That can be very complicated." How does a company get started? "There's still a lot of confusion around what is the cloud, what is big data, what is predictive analytics, and I think a lot [of] understand- ing where to start is really about educating and trying to figure out what your needs are and what— exactly—each one of these things means," Urban said. "It's a service revenue around data. First and foremost, your organiza- tion has to start thinking about how to manage service-oriented revenue, versus just product sale and main- tenance," Carney said. "I would say start small, and find a good customer that you could partner with—you've partnered with before—and will work with you on shared insight," Carney said. Carney pointed out the relative value of data gathered from differ- ent sources. "Data is a wave of the future for us, and a video camera is by far the richest source of data there is in sensors out there between size, shape, speed, color, amount, duration." One attendee shared his expe- rience with "midland data," as opposed to big data; his company was able to use access control infor- mation to look at the number of people coming and going from a building, which gave the building owner a better idea of the size of real estate needed for their facility. SSN Continued from page 16

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Systems News - APR 2017