Page 52 - Security Today, September 2020
P. 52

their locations. Processes like adding or revoking user access cre- dentials remotely can be accomplished more effectively with cloud- based access control. Beyond granting privileges, these systems can also enable mobile credentialing as an easy-to-manage contactless solution to reduce viral spread and increase efficiencies. Stored in users’ phones, mobile credentials can be integrated with fingerprint and facial recognition capabilities to increase security.
Coupled with other cloud-based solutions like video surveil- lance as a service and intelligent service assurance monitoring, your access control system can monitor and protect your prop- erty, ensure access is granted to the right people, operational up- time and performance monitoring and allow your team to con- trol everything from anywhere and at any time. You can reinforce your security policies, including whatever changes you’ve made since the pandemic began, to protect your employees and assets.
PROTECT YOUR PREMISES WITH ALARM VERIFICATION
The pandemic has left many communities strained with public resources like police officers and other emergency responders. In efforts to limit human contact, some cities have chosen to limit in-person responses to certain calls like breaking-and-entering reports without suspects or the potential to recover lost proper- ty. Companies may have the right security components in place, however, they also must ensure their security system can verify when a situation is occurring and notify the right people in time.
Alarm verification systems use video and audio technology to enhance the monitoring of your premises when an alarm is trig- gered. A monitoring center operator can then confirm a human presence – rather than a false alarm triggered by a stray animal or an HVAC system kicking on, for example – and assess the threat level to your company. These systems provide actionable intel- ligence that a crime is being committed and capture the details police will need to apprehend the intruder.
Use of advanced alarm verification technology reduces false alarms, thus leveraging police resources for known alarm events and potentially increasing your call priority, which can lead to more apprehensions. Alarm verification vendors have seen that police respond up to 85% faster to verified alarms as opposed to unverified ones, and for one vendor it has led to over 180,000 docu- mented apprehensions – many before entry was made. If your com- pany wants to add more power to your intrusion detection system and avoid costly false alarm fees, consider alarm verification.
SECURE YOUR NETWORK WITH CYBERSECURITY TOOLS
When the workforce shifted primarily to remote officing and business owners/leaders closed access their facilities due to COV- ID-19, the shift in work brought additional cybersecurity threats to the table. In April 2020, a few weeks after stay-at-home man- dates began, the FBI’s Cyber Division reported up to a four-fold increase in daily cyber attack reports. As companies adopt more network-based solutions and add more components to their se- curity systems, cyber attacks can be expected to continue rising.
Adequately protecting new systems is proving difficult for many companies since they struggle recruiting and retaining the right talent. Information Systems Security Association (ISSA) and industry analyst firm Enterprise Strategy Group (ESG) found that almost three-quarters of organizations are affected by a lack of available cybersecurity talent. There’s a dearth of
the needed skills in the marketplace and a lack of resources on the company’s side to retain dedicated cybersecurity staff. Yet, enterprise networks are becoming more complicated than ever before, and with the introduction of cloud-based tools and envi- ronments, cybersecurity is an even more critical need.
In response, companies are turning to technology and profes- sional services to help mitigate cybersecurity risks to their environ- ment. Network protection solutions can keep a company’s net- work, devices and data safe from attacks like intrusions, malware, ransomware, phishing and malicious files. These solutions can also protect remotely connected IoT and other IP-connected devices, which are being exploited more as a result of the pandemic shifting workforces away from the office. Coverage with the proper cyberse- curity tools and supplemental services can prevent future financial disasters and ensure your network stays fully functional.
ADD REMOTE SERVICES TO YOUR PROFILE
Even before the COVID-19 pandemic, remote security solu- tions were a growing trend. But with more strain on company personnel and budgets and increased restrictions for on-site visitors, security teams will rely more on remote security man- agement than ever before. While your security team may have implemented specific remote services to fill in gaps during the pandemic, the future will require a more comprehensive solution that addresses security needs befitting updated company policies and the new norm.
Remote systems for on-premises use include several options for monitoring. After you’ve installed security cameras applied to your specific application needs, a monitoring center operator can conduct remote “guard tours,” visually surveilling the property on-demand or based on a schedule to look for potential threats or intruders. Some systems even allow guards to speak through the camera to anyone on-site, or for the system to play a pre-recorded message when an analytic detects a person breaching the property or perimeter. When compared to an on-site patrol, this system can save you up to 80 percent of your personnel cost.
Beyond monitoring, remote services can include round-the- clock site management. A monitoring center can manage person or vehicle access to the building, conduct video surveillance and speak through intercoms, taking over or supplementing respon- sibilities carried out by on-site staff. A service provider may also offer an online portal for you to manage the services you’re using, view reports and handle issues like service calls and billing. Even when your staff can’t be on-site, remote services can help you pro- tect access to your property and assets.
While the pandemic has brought to light many new challenges and threats to security, you can rely on your security systems to mitigate threats to your premises, assets and people. The addition of technologies like human temperature screening devices, cloud- based access control and video, automated service assurance and remote managed and monitored services can ensure your security solutions have the ability to respond to the immediate challenges created by this new norm and the ability to plan
ahead for the ever-changing challenges that
come within your security landscape.
Rich Mellott is a director of Technology & Prod- uct Management at STANLEY Security.
52
0920 | SECURITY TODAY
POST PANDEMIC


































































































   50   51   52   53   54