Page 20 - Security Today, December 2017
P. 20

means that while manufacturers and developers continue hardening their product with stronger cybersecurity features, they also have to consider how introducing those features might impact every other device, application and operation on the network. IT, physical secu- rity and technology manufacturers will have to work in close concert to ensure that the ecosystem works in synergy at both an operational and cybersecurity level. It will become increasingly important for manufacturers and integrators to actively participating in profession- al cybersecurity forums to stay abreast of vulnerabilities that might compromise the security ecosystem and how to address them.
You will see more manufacturers providing management tools to assist integrators and end users with ongoing maintenance and version control of device firmware and cybersecurity features. But for cyber protection to work, technology has to be complemented by strict policies and procedures for using it. This means cyber aware- ness and cyber security training will continue to be paramount for the foreseeable future.
Users will rely on integrators and manufacturers to play a more proactive role in helping them formulate, publish and enforce harden- ing guidelines to ensure that the IT infrastructure and connected de- vices are properly secured and cyber best practices are being followed.
Big Data: Creating
Business Intelligence from Raw Data
We all know that security systems continually generate massive amounts of data and video surveillance cameras are probably the biggest culprits. This brings me to the third trend: the handling of big data. What’s happening with all that data we’ve collected?
We’re now starting to see the securing industry deploying ever more sophisticated video analytics to extract quantifiable metrics
from visual images that can lead to actionable business intelligence. That could be anything from measuring customer volume through- out the day to determine staffing needs to reprogramming traffic lights based on roadway congestion detected by citywide cameras. With the ability to quickly aggregate and synthesize data from mul- tiple surveillance cameras and other security systems, analytics pro- vide users with a more in-depth assessment of the situation on which to base a timely response.
Big data also provides a fertile ground for new self-learning ana- lytics, also known as artificial intelligence or deep learning, to parse, learn from and make determinations or predictions that can increase accuracy and further aid companies in their quest for broader in- sights and faster alerts to potential threats.
Collecting, transporting and synthesizing this data into mean- ingful business intelligence, however, requires disciplined use of re- sources from the network infrastructure transporting the data to the various technologies storing and disseminating it securely. This opens a window of opportunity for big storage companies and host pro- viders to capitalize on the big data trend and position themselves as strategic partners in the security industry. This highlights the need for video systems to leverage their intelligence interactively to use band- width and storage more efficiently.
Smart Compression:
Customized for Video Surveillance
This brings us to our next trend: smart compression that optimizes video transmission and storage based on retention value. Tradition- ally, the primary variables at a customer’s disposal were frame rates and resolution. But with new, smarter compression algorithms de- signed specifically for the video surveillance industry, security users
FREE ONLINE CUSTOM
JUST ONE HOUR
Book your free VMS demo today
Let Milestone guide you through our world-class Video Management Software. Sign up for a tailored demo online and a Milestone expert will be in touch to schedule a demo that meets your needs and requirements, regardless of your organization’s size and complexity.
Book now
milestonesys.com/book-a-demo
20
Untitled-6 1
11/8/17 2:00 PM
Go to sp.hotims.com and enter 39 for product information.
1217 | SECURITY TODAY
SECURITY TRENDS


































































































   18   19   20   21   22