Security Systems News

MAR 2018

Security Systems News is a monthly business newspaper that reaches 25,100 security installers, product distributors, central stations, engineers & architects, and security consultants. Our editorial coverage focuses on breaking news in all major se

Issue link: https://ssn.epubxp.com/i/947493

Contents of this Issue

Navigation

Page 34 of 36

www.securitysystemsnews.com Ma RC h 2018 SECURITY SYSTEMS NEWS Quoted/Ad Index/M A rketpl A ce 30 Quot ED a D v E rt I s E r In DEX Co M pa NY pag E WE b SITE M ar KE tp L ac E Na ME Co M pa NY p ag E continuted from page 26 CLOUD cloud we are referring to. "People who are sophisticated with this don't form a general opinion on, 'Is the cloud safe?' or 'Is the cloud not safe?'" Van Till explained. "It is more about, 'Is Steve's cloud safe, and does he run it properly' because it is all about how you take care of it. So to say the cloud is safe or not safe is kind of meaningless because you can run a really crappy website and web applica- tion that is as insecure as the day is long or you can run something that is really buttoned down tight." Arrehed agrees, noting that moving to the cloud "requires both significant investment and thorough knowledge of what it takes to build and offer a truly secure cloud-based solution for physical access," he said. "Given our large and global base of enterprise customers, HID has risen to the challenge of meeting various demands and regional require- ments, which has in return helped us to gain a broad and solid understand- ing of our customers' needs when mov- ing to the cloud. This has enabled us to evolve to where we are today. Not every player in the physical access space is yet equipped to take this step or is able to offer cloud solutions that can meet the stringent security and privacy regula- tions that we are able to deliver." Arrehed continued: "Cloud host- ing allows continuous threat monitor- ing, vulnerability scanning, advanced encryption and provides various other privacy-preserving features." In addition to providing cybersecu- rity advantages, the cloud also provides great potential for leveraging emerging technologies. "The cloud is implicated in easier installation, greater ease of use for the users, but the other thing with the cloud is it really is the platform for every- thing," said Van Till. "All of the inter- esting things that are happening with mobile are connected to the cloud. All of the interesting things happening with AI are happening in the cloud, so if you go through any of the advancing tech- nology sectors, cloud is foundational to all of them. If you want to be part of AI, big data and IoT, you are going to be on a cloud platform. So saying you are not going to believe in the cloud or the cloud is not secure, you are really cut- ting yourself off from most of the new advances in technology generally." Arrehed believes "there is huge prom- ise in data analytics in the context of physical access control," he said. "We believe that devices related to physical access control will be increasingly con- nected to the cloud and the data rang- ing from virtual/digital identities, mobile access, video streaming and biometrics, to IoT applications, BLE sensors and location services can be consolidated to and used for machine learning analyt- ics. Combined, we believe that the data from these technologies, coupled with advanced data analytics, can provide services such as 'intention detection' for a more seamless, secure and connected user experience." Data analytics "is key to our business," noted Shillington. "I heard a quote that data is the new oil, and I firmly believe that. Now for that to be true, though, the data has to be meaningful and it has to be aggregated across a number of different vectors. Once you start to have all of that information coming into a single reposi- tory and being handled by a single man- agement pipeline, then you can start to do some very interesting predictive analysis. Over the course of the next year, you will see a lot more from us in that area." Hébert added that the proper aggre- gation of data also provides "greater operational efficiencies, business intel- ligence and business continuity" that can benefit the integrator from a selling standpoint and the end user from an ROI perspective. ssn Acquisition & Funding Services 30 www.afssmartfunding.com Affiliated Monitoring 12-13 www.affiliated.com Alarm.com 3 www.alarm.com AvantGuard Monitoring Centers 7 www.agmonitoring.com/eguide Dahua Technology USA Inc. 9 www.dahausecurity.com Dice Corp. 2 www.dicecorp.com Digital Monitoring Products HW,8 www.dmp.com Dynamark Monitoring 21 www.dynamarkmonitoring.com ESX-Electronic Security Expo 25 www.esxweb.com Guardian Protection Services 22 www.guardianprotection.com Hikvision 15 www.hikvision.com Honeywell 32 www.hwsproducts.com/camera/ssn Inovonics 11 www.inovonics.com IPR Inc. 6 www.ipdatatel.com/helix Mission 500 5 www.mission500.org National Monitoring Center 4 www.nmccentral.com Rapid Response Monitoring 16-17 www.rrms.com Security Central 19 www.security-central.com SSN Leadership Talks 27 www.securitysystemsnews.com/webcasts Alter, Trey Dynamark Security Centers 19 Arrehed, Hilding HID Global 25 Bateman, Jillian ESA 10 Bozeman, Bill PSA 11, 14 Buckingham, Mike August Pro 22 Deaton, Keith Sargent and Greenleaf 24 Egan, Patrick Security Partners 18 Ein, Mark Kastle Systems 5 Garner, Josh Becklar 18 Gelinas, Dan Norris Inc. 5 Gordon-Carroll, Clint Vivint 20 Groff, Hank Dynamark Security Centers 19 Guan, Shawn Umbo Computer Vision 1 Hall, Randy Security Partners 18 Hébert, Denis Feenics 25 Jones, Steve Allied Universal 14 MacDonald, Megan My Alarm Center 20 McCormack, Jeff AECOM 6 Meyer, Thom Secure Global Solutions 5 Miller, Jared Protect America 22 Moceri, Dan Convergint 1 Peninger, Greg Dynamark Security Centers 31 Peterson, Chris Vector Firm 15 Roberts, Kimberly SIA 8 Samuels, Patrice Parks Associates 2 Sessa, Sherida ISC Events 8 Shillington, Ralph Feenics 25 Stenger, Melissa ISONAS Inc. 1 Trapanese, Pierre Northland Controls 14 Van Till, Steve Brivo 1 WE HAVE QUALIFIED BUYERS READY TO PURCHASE YOUR SECURITY, FIRE, TEST AND INSPECT BUSINESS AND/OR ACCOUNTS. Call 1-800-354-FUND (3863) WE HAVE QUALIFIED BUYERS WANTED SECURITY, FIRE, TEST AND INSPECTION Sell Your Business and/or Accounts Now! Call Rory Russell at 1-800-354-FUND. Speak with the Industry Leader in Aquisitions and Funding and get a Complete Business Valuation.

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Systems News - MAR 2018