The world of physical security has undergone seismic changes in the last 10 years in video, analytics, and the utilization of security technologies for business intelligence. Technology that once was considered science fiction has now become a reality. In the education market, these technologies have come at a very opportune time with constrained budgets, administrative staff reductions, and tragic incidents requiring lockdowns and video observations reaching an all-time high. One of the greatest advancements that has come to market during this time has been cloud-based access control.
Temperatures here in Montreal have once again settled into the low negative 30s. Rather than complain, we embrace the cold and head outside. And this year, it’s with the added benefit of getting ready for the 2018 Winter Olympics in Pyeongchang, South Korea. To be fair, we are not all Olympic athletes able to compete in bobsledding, skeleton, or moguls. But we do feel like winter sports are an essential part of our everyday lives. We feel personally connected with the event, and, for me, this extends to issues of security. A few years ago, I had the opportunity to talk with Juliette Kayyem, a professor who teaches on homeland security at the John F. Kennedy School of Government at Harvard University. At the time, she said something that has stayed with me ever since: “If you want to have a perfectly safe Super Bowl, don’t have a Super Bowl.”
One of the major challenges that comes with cloud computing, especially for security professionals, is protecting sensitive data that’s stored in the cloud. Consideration also has to be given to various regulatory compliance requirements that have to be met. The most common way to secure this data is via encryption, but the question arises as to who should be responsible for maintaining the encryption keys. With SaaS solutions, it can be difficult to separate encryption key management from the provider, so it’s up to each customer to explore available options. One of the main challenges is to implement encryption that doesn’t hamper user experience or performance. This, coupled with encryption key management, makes the situation very complex.
More companies are moving towards cloud technologies for lower costs, faster time to market, and increased employee productivity. However, the vulnerability of common cloud servers creates many new security challenges, the full impact of which we are just starting to determine. Spohn Security Solutions offers advice on catching vulnerabilities and proofing your company against cloud attacks.
Galaxy Control Systems, a leading provider of integrated access control and security solutions, is featuring its recently launched Cloud Concierge Access Control solution this week at their booth (#2241) at ASIS 2017. Galaxy Cloud Concierge is a complete turnkey, cloud-based, fully hosted and managed access control and monitoring solution that includes professional 24/7 management and supports industry standard access technologies. Available in three configurations, Cloud Concierge provides users and integrators alike with unrivaled versatility and efficiency.
S2 Security, the leading developer of complete enterprise security solutions, announced S2 Cumulus. This new cloud-based service is a major step in connecting the S2 ecosystem, enabling administration and monitoring of S2 products as well as critical communication between people, devices, and third-party systems. S2 Cumulus currently supports S2 NetBox series access control and event monitoring systems, S2 NetVR series video management systems and the S2 Magic Monitor unified client.
Eagle Eye Networks, Inc., today announced that it has launched its first phase of video analytics, which includes line crossing, intrusion detection, and object counting within the Eagle Eye Cloud Security Camera VMS. This is the first analytics-based release, empowering customers to easily and instantly activate analytics on their cameras without having to install additional hardware or software. No on-site technicians or system upgrades are needed.
XenData, the global provider of high capacity data storage solutions, launches its CX-10 Appliance, which can manage a single hybrid file system across two storage tiers: 10 TB of on-premises RAID and unlimited Microsoft Azure blob storage. The appliance allows existing file-based applications to use cloud storage without the need for modification. The CX-10 has highly configurable RAID retention policies that determine which files are written to the cloud, local RAID, or both allowing users to set policy rules for different file types and folders.
Traditionally architected video surveillance does not have the ability to address the upcoming security concerns faced by a business. With increasing agility in business processes, video management software (VMS) service providers cannot afford VMS application to be down, even for a short time. With single-tiered VMS (monolithic architecture), it is nearly impossible to meet the dynamic and evolving surveillance requirements of the modern businesses.
Brivo, the global leader in cloud-based access control systems, announced the release of their new physical security assessment tool created to help businesses calculate the security risk of their facilities. A recent market survey conducted by Brivo discovered a massive gap between perceived safety and actual facility vulnerabilities. The survey found that 61% of facility managers were not concerned about their location’s physical security. Yet 40% were still using lock and key, and 62% used standard keycards and fobs. We feel that this is not a safe approach, especially in a world where technology is prominent and keycards can be easily lost, shared, or duplicated.