Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalTechnologies & SolutionsCyber ProductsNew Security TechnologyPhysical SecurityVideo Surveillance

2016 Technology Report: New Security Solutions and Risks Go Hand-in-Hand

Security’s Tool Box: Bigger, Better and Sometimes Bad Edged

By Bill Zalud
2016 Technology Report: New Security Solutions and Risks Go Hand-in-Hand
College of Business, Oregon State University

Innovative interoperability of diverse systems including event management, enterprise resource management, customer relationship management and a data management engine all integrate with an access control system to provide wireless networked door control locks and room scheduling at Austin Hall. Photos courtesy of the College of Business, Oregon State University

Mitchell Kane of Vanderbilt

Smartphones may one day replace access cards but not in a big way. Some tests used near field communications technology built into some phones but needed special programming. Mitchell Kane of Vanderbilt sees more promise in Bluetooth approaches. Photo courtesy of Vanderbilt

Guy Grace

Littleton Public Schools’ Guy Grace (pictured standing in a newly energized command center) sees value with multifunctional innovations such as a new network-based communication and security system. Photo courtesy of Guy Grace

Kevin Miller, corporate director of security for the Davenport Hotels in Spokane, Washington

Innovative IP-based megapixel cameras make business sense to Kevin Miller, corporate director of security for the Davenport Hotels in Spokane, Washington. They cover more ground with fewer cameras needed. Photo courtesy of Davenport Hotels

Kindred Health Transitional Care and Rehabilitation

Kindred Health Transitional Care and Rehabilitation deployed an innovative security solution. With IP cameras already installed and connected, the technology now connects directly to the nursing network with no computer or software needed. Photos courtesy of Eizo

City of Bethlehem

Millimeter wave radio technology secures the new Hoover Mason Trestle at SteelStacks, a 10-acre campus dedicated to arts, culture and family events that was once home to Bethlehem Steel. Photo courtesy of the Redevelopment Authority of the City of Bethlehem

SpotterRF

There now is perimeter protection beyond fences for critical infrastructure: Compact surveillance radar systems that can work with security video and other perimeter alarms. In some cases, a unique three-band approach ensures a “never-blind” outcome for vital security environments. Photo courtesy of SpotterRF

Protecting Pope Francis during 2015

Protecting Pope Francis during his 2015 visit to the United States included easily deployable crash barriers. Innovative design lets security and law enforcement set-up the barriers within a few minutes. Pictured is a unit in use on the streets of Philadelphia during the Pope’s visit there. Photo courtesy of Delta Scientific

Gasan Awad, vice president, global identity and fraud product management at Equifax

Fighting fraud calls for an innovative balance of better security and a better customer experience. You want to mitigate risk but not risk running off your customers or client, observes Gasan Awad, vice president, global identity and fraud product management at Equifax. Photo courtesy of Equifax

Willow Lane Trading Estate in Surrey, England

A multi-point wireless mesh unit, located on a roof, covers a wide portion of the Willow Lane Trading Estate in Surrey, England. Photo courtesy of Fluidmesh Networks

gunshot detector

Using audio data, a gunshot detector accurately analyzes gunshots from a variety of weapons including handguns, shotguns, rifles and automatic rifles. Photo courtesy of Louroe Electronics

automated license plate recognition systems

There are law enforcement and revenue-generating applications for automated license plate recognition systems. Photo courtesy of PlateSmart Technologies

iris recognition

Using iris recognition, innovative technology can identify and provide secure access into such areas as data centers through a device as simple as a wall-mounted tablet. Photo courtesy of SRI International

EMV standard

Credit and debit cards converted to the EMV standard using a chip and soon an accompanying PIN will move fraud to card-not-present environments such as Web, tablet and smartphone purchasing.Photo courtesy of Bank of America

Body-worn cameras

Body-worn cameras (pictured) and in-car cameras are growing in number and use by law enforcement and so is the need to better secure the captured evidence. Photo courtesy of Panasonic System Communications Company of North America

Rapid Emergency Response System

A unique Rapid Emergency Response System takes an innovative riff on fire pulls. Its blue color, separate communications to a central monitoring service, location and mapping of an incident all encourage a quicker more knowledgeable jump on incidents by first responders. Photos courtesy of BluePoint Alert Solutions

Tony Diodato of Cypress Integration Solutions

There are myriad benefits from Power over Internet with more innovations to come, says Tony Diodato of Cypress Integration Solutions. Photo courtesy of Cypress Integration Solutions

Net Payne of March Networks

Customers should ask their providers to demonstrate how they are staying on top of potential security vulnerabilities, according to Net Payne of March Networks.

Photo courtesy of March Networks

2016 Technology Report: New Security Solutions and Risks Go Hand-in-Hand
College of Business, Oregon State University
Mitchell Kane of Vanderbilt
Guy Grace
Kevin Miller, corporate director of security for the Davenport Hotels in Spokane, Washington
Kindred Health Transitional Care and Rehabilitation
City of Bethlehem
SpotterRF
Protecting Pope Francis during 2015
Gasan Awad, vice president, global identity and fraud product management at Equifax
Willow Lane Trading Estate in Surrey, England
gunshot detector
automated license plate recognition systems
iris recognition
EMV standard
Body-worn cameras
Rapid Emergency Response System
Tony Diodato of Cypress Integration Solutions
Net Payne of March Networks
January 1, 2016

2016 Technology Report: New Security Solutions and Risks Go Hand-in-Hand

Tape to Hard Disc

Drones Doing Bad; Drones Doing Good

Innovative User-Defined Fields

Door Access and Meeting Scheduling

Audio/Video Intercom

Virtual Network Approach

Identity Across the Enterprise

Storage Appliance Unification

Taking Video to the Workers

Outside Video Wireless Transmission

More Sophisticated Analytics

Fraud Fighting

Mesh Goes Beyond

Beyond Thermal, Video Crystal Ball Imaging 


Technology moves quickly, as military and commercial tools and toys merge with security applications to create both new solutions and risks for the enterprise. What should you be on the lookout for this year?

The future, according to scientists and R&Ders, will be exactly like the past, only far more expensive. It can also be less expensive, more practical, more effective and at times more dangerous.

One of the first computers, the ENIAC, consisted of 18,000 vacuum tubes and weighed 30 tons. Today, there is more processing power in a typical lightweight laptop. Back in 1945, a computer bug – really a moth caught in the first Mark II – fried the computer works. Today, whole corporations can be brought to their economic knees thanks to Russian or Chinese cybercriminals.

In March 1876, Alexander Graham Bell famously said: “Mr. Watson, come here. I want to see you.” Today, the number of smartphone users will surpass 2 billion worldwide, representing over a quarter of the global population. Thousands of security professionals can view their cameras on their phones. At the same time, it is reported that global terrorists communicate with encrypted phones.

Major law enforcement organizations are calling for “immediate action” to halt encryption on what some call dark smartphones. The Paris terrorist attacks late last year could have been thwarted, according to some, if officials had access to their dark smartphones. A report, “A Law Enforcement Perspective on the Challenges of Gathering Electronic Evidence,” authored by the International Association of Chiefs of Police and the National District Attorneys Association, maintains that smartphones manufactured by the likes of Apple and Google should no longer come with built-in encryption, unless the government has easy access to encryption keys.

 

Tape to Hard Disc

In 1951, the first video tape recorder, costing over $50,000, captured live images from television cameras. Nowadays, there are millions of security cameras in the U.S. and petabytes of security video stored locally and in the cloud. Crime prevention’s their aim, but some may aim the wrong way.

Biometrics, say the experts, dates back to 1891 when Juan Vucetich started a collection of fingerprints of criminals in Argentina. Today, biometrics is automated and diversified, ranging from finger and palm, iris, retinal and face to voice and even behavior. With attention to better accuracy and faster throughput, biometrics seems destined to be the perfect balance of convenience and security or an imbalance of personal intrusion.

Virtual reality, another innovation, will make a big splash at this month’s Consumer Electronics Show (CES), sponsored by the recently renamed Consumer Technology Association. Newer virtual reality headsets such as the Gear VR from Samsung Electronics, also a physical security tech player, make it practical and less expensive to use immersive video technology. At CES, such headsets are an emerging entertainment device; it’s just a matter of time for the tech approach to nest into physical security and law enforcement for patrols and investigations. But is it good to turn a security patrol into a gamer scenario?

And then there are drones, one of the hottest gifts this last Christmas. The earliest recorded military use of an unmanned aerial vehicle or UAV occurred in 1849 when Austrians attacked the Italian city of Venice with unmanned balloons loaded with explosives. Today, drones are patrolling the Mexico and Canada borders and are credited for thousands of arrests and the seizure of thousands of tons of illegal drugs.

 

Drones Doing Bad; Drones Doing Good

A growing number of utilities, ports and stadiums though are concerned about the dark side of drones. For example, some security operations are using or considering small radar technology to alert to drone intrusions. And drones have intruded into sports stadiums and parades, peeked into windows and landed on the White House lawn.

On the other hand, experts at the University of Maryland's Robert H. Smith School of Business say drones are already into law enforcement and security applications. "We are missing out on a commercial opportunity that other countries have already embraced," says Smith School professor Oliver Schlake, a drone hobbyist who challenges his MBA students to develop business applications for the technology. Hank Lucas, another Smith School professor who wrote “The Search for Survival: Lessons from Disruptive Technologies,” says the impact will be immense as more companies discover commercially viable applications for drones. "It's well beyond our imagination," he says.

Storm watching:Drones can fly into the eye of a hurricane or hover over an active volcano, sending back data without risking lives. Global Hawk drones developed by Northrop Grumman can monitor stormy areas for up to 30 hours, generating data not available any other way.

Search and rescue:After severe storms hit Texas and Oklahoma in May 2015, the FAA sent drones from one of its test sites to search for survivors along the Blanco River.

Security:Drones equipped with headlamps, cameras and alarms can startle intruders and records their movements – and they often can arrive at the scene faster than police or private security officers. A company with commercial security contracts in New Zealand plans to deploy the technology by the end of 2015.

Innovation and technology as applied to the security industry can, not surprisingly, be a two-edged sword. Still, the good side of that tech sword can slice through crime prevention, situational awareness, forensics and other security tasks with ease.

One example: Innovative integration through diverse software is squeezing more value out of enterprise investments in security technology that evolves from protection and into the natural workflow of an organization.

At Austin Hall in the College of Business at Oregon State University in Corvallis, a security management system (VI Connect from Vanderbilt) represents one of the most unique systems integration projects within the higher education market.

The technology seamlessly integrates building access control into a single data management solution that not only enables school officials to streamline door access, but also allows students and staff to reserve one of 21 project rooms in the facility simply by using their existing credential. In addition to the project rooms, the building also features classrooms, faculty conference rooms, IT closets, a four-room research suite, a mailroom and an assortment of event spaces.

To help manage access control at Austin Hall, which includes credentials for approximately 4,500 students each semester, Kirk Wydner, operating systems network analyst for the College of Business, and his team chose to take an innovative and integrated approach.

 

Innovative User-Defined Fields

According to Wydner, the system, which was installed by security systems integrator Steve Murphy of Chown Security, Portland, Oregon, had to not only work with existing HID Global identification cards used by students across campus; it also had to have an easy-to-access user repository. “A key feature that really helped us was the ability to add in user-defined fields because we needed to have our own unique key,” Wydner says.

The innovative charm of the access system’s technology, however, is its hand- shaking with other software platforms for a completely interoperable access and room reservation system. To accomplish this, Wydner and his team installed the data management engine (Pinwheel DME from SwiftData Technology). Pinwheel integrates data from the access system along with several other enterprise software solutions employed at the facility, including sophisticated room scheduling, Web calendar and online event registration software (from Dean Evans & Associates) and an enterprise resource planning platform from higher education software provider Ellucian.

However, there were several significant hurdles that had to be overcome by both the OSU IT group and others involved to help make these interoperability goals a reality. An integration of this magnitude had never been done before, so much of the project was uncharted water, comments Murphy. “We didn’t know quite where to begin,” Wydner adds. “We knew that we needed to get all of the user data – our faculty, staff members and students. We needed some way of defining who is taking a college business class and which system we were going to pull that out of, whether that’s going to be our central student repository, Active Directory or if we were going to go off of Salesforce.”

Wydner said the university eventually decided the best way to bring this information together was to enter it into Salesforce, the San Francisco, California-based firm known for its Web customer relationship management system and its strength in application programming interfaces or APIs. He started a separate project focused on integrating the identification numbers from the campus HID cards into their Salesforce database. Aside from that, the team also had to figure out a way to format the data from Salesforce so that it would be recognized by the access and Dean Evans event management software solutions.

By using the Pinwheel data management engine or DME platform, students are now enrolled automatically based upon the information entered into the Ellucian enterprise resource planning system. The successful integration of these systems would not have been possible, however, without some of the unique features provided by the access control platform with its innovative way of combining the access levels of students and staff members with their respective rights and privileges through a process known as nesting.

Austin Hall also uses an automated lock system which saved significantly on time and manpower.

 

Door Access and Meeting Scheduling

“The main thing that our faculty and students enjoy about the integration is that they can just walk up to a project room or a meeting room [and] tap their OSU ID on the lock (AD-400 wireless networked locks from Schlage). It then opens up, lets them in, and it also gives them an automatic one-hour reservation on the room,” observes Wydner.

“Multi-tech locks are future-proof and access panels can handle up to 16 locks,” points out Murphy, who believes the project took system integration capabilities to new and innovative heights.

There are other tech trends embedded in such an approach, according to Mitchell Kane, president, Vanderbilt. As compared to security video, it may seem that advances in electronic access control emerge and evolve more slowly. From a hardware perspective, technology moves at a snail's pace, says Kane. What is more innovatively important is the trend of interoperability with other systems and big data. Until recently, most data integration with access management was through HR or IT databases. Kane sees a trend toward integration with workflow applications, working with data on an automated level, based on logic and analytics.

Multifunctional ability can be viewed as innovative.

That’s the bottom line for Guy Grace, manager of security and emergency planning for the Littleton, Colorado, Public Schools, and who is installing a network-based communication and security system (the IX Series from Aiphone) featuring video entry security, internal communication, emergency stations and paging. All units and apps in the systems can unlock doors remotely on a network, assist onsite visitors from an offsite location, broadcast emergency announcements and communicate using Power over Ethernet (PoE).

Among the “cool things we get from the technology is the intercom’s ability to record audio and video of visitors on our network digital video recorders or NDVRs. So now we have an extra camera, the ability to record all the transactions at the door in voice and video, the ability to talk to the door from the school and the security office miles away. And also these now can be used as call for help stations 24/7,” says Grace.

 

Audio/Video Intercom

Upgrading infrastructure is a crucial way to anticipate emerging innovations, contends Grace, who has spent time and resources on PoE to better handle “cutting edge, not bleeding edge. We can talk to people before they even talk to us by hearing noise before you see something with two-way microphones and mass notification when needed.”

Kevin Miller, corporate director of security for the Davenport Hotels in Spokane, Washington, had a simple though mighty protection challenge and an innovative security video solution. The Davenport Hotels are a unique collection that includes the Davenport Grand with a city convention center and INB Performing Arts Center connected to the hotel via a skybridge. The Spokane Veteran’s Arena, River Front Park, Spokane River and Centennial Trail are all within walking distance.

To provide a comfortable, safe experience for guests, Miller with his IT department sought out proposals for new video technology. The Davenport Hotels have been leading edge since the first in the collection – The Historic Davenport Hotel – opened in 1914. It was the first hotel with air conditioning, a pipe organ, a central vacuum system, housekeeping carts and accordion ballroom doors.

 

Virtual Network Approach

When it came to security video, “I knew where I wanted to place cameras,” he says. And after the vetting process, he picked IP-based megapixel cameras (Omni from Arecont Vision). The manufacturer “gave me a first class proposal, came out and visited. The quality of the cameras was there and the software was user friendly,” contends Miller. “We can cover everything from guest vehicles to slip and falls, and with fewer cameras.” He can easily search 31 days of recorded video and, with a virtual network approach, “I can look in from any angle. I also get alerts on my phone.” The innovative technology has “already paid for itself.”

Of course, there is an even bigger picture when it comes to innovation and technology. It is a challenging view for Philip Lisk, director of information technology at the Bergen County Sheriff’s Office, Hackensack, New Jersey. He put together a top notch technology-based set of solutions which includes a shared wired network as well as wireless net.

When evaluating new technology, “I look at what is applicable to what I need now as my long-term growth needs. Suppliers must be well known and reputable, no flash in the pan,” Lisk advises. “Sure there is convergence and a blending of physical and network security. But don’t put all things in one basket. Intrusion protection is especially important” these days. One innovative trend that’s both exciting and troubling is the so-called Internet of Things or IoT. The endgame is for all devices and things to talk and share among themselves. “As we all invest in IoT, we also must invest in more and better network security,” adds Lisk. “The level of awareness must increase.”

 

Identity Across the Enterprise

Speaking of the big picture, the really BIG picture, global giant Schneider Electric, the supplier of integrated energy solutions, faced a major update to its IT infrastructure. With more than 170,000 employees across more than 100 countries, the company needed an identity and authentication management (IAM) strategy that could scale with the company’s next phase of growth while maximizing efficient use of resources. The goal: Implement an IAM system with single sign-on (SSO) across the whole company; a system that could reuse identities and streamline disjointed “islands of data.”

It implemented a quick and successful proof of concept and selected Auth0 for its new federated identity management system. “What we found (in Auth0) was an authentication-as-a-service solution built by developers with the modern developer in mind,” says Stephen Berard, senior global software architect at Schneider Electric.

“Security is often misunderstood, and when it is an afterthought, left to the end, it tends to bite you in the butt. We didn’t have to kick the proverbial can down the road every time a new security or authentication question came up, whether the question was hypothetical, practical or mission critical,” says Berard. “With the platform, we can plan and integrate identity architecture early to save critical time and ensure a secure system is in place when a project gets off the ground.” The outcome:

  • Empowers the IT team to invest in strategic business, customer demands and innovation;
  • Enables the IT team to be able to plan identity scenarios early and make any necessary integrations quickly; and
  • Provides both traditional enterprise SSO as well serve as the ultimate accelerator to integrate the same identity management into custom applications and APIs.

Workhorse storage is another area of surprising innovation that impacts security.

There is a security strategy about what to put where. Especially for highly regulated organizations, the strategy is to keep storage locally, on premises on the enterprise’s devices.

For chief security officers and chief information security officers, there is game-changing architecture and user experience that fundamentally redefines expectations of what storage should be. Such designs extend far beyond traditional storage by being data-aware and tracking data access and analyzing data as it is stored.

Eric Chapman, network and systems administrator at Radiation Monitoring Devices, Inc., (RMD) the research business unit of Dynasil Corporation of America, uses innovative technology “to create detailed logs auditing who is accessing what,” Chapman says. He works with the Discovery Series (from DataGravity), a unified storage appliance for an organization’s most critical and sensitive data. It enables turnkey data management by combining a flash-optimized storage design with data protection, enhanced data governance and integrated search and discovery capabilities. It elevates storage from just a filing cabinet to a data-aware business asset.

 

Storage Appliance Unification

Data awareness is important to RMD, which itself provides innovative solutions across a broad range of security, medical and industrial applications, including radiation imaging and detection, nuclear instrumentation and non-destructive test equipment. The unique storage appliance was easy and fast to set up. “Thirty minutes and you power on and configure,” comments Chapman.

Perry Dickau, DataGravity director of product management, says the analysis of data provides security. Data storage is in mirror form, with a primary side where the data is written and then a duplicate side for redundancy and intelligence. Applying data analysis to this dormant mirror side can show enterprises who is sharing or looking at the data, and helps enterprise security leaders to make create actionable intelligence out of data.

Getting the word out faster and more accurately can be both helpful and innovative.

States such as Wisconsin are turning to solutions (for example, Roam Secure Alert Network from Eaton) for crime alerting systems to communicate to businesses and citizens about crimes committed in their neighborhood. Through alerting systems, law enforcement is able to increase awareness of crimes, build trust with the community and put thousands of additional eyes and ears on the streets looking for suspects.

When a crime is reported in a specific area, the alerting system enables law enforcement officers to send real-time information via email, text message, fax, pager and voice call to registered users. The system provides a description of the alleged perpetrator.

The Wisconsin Department of Justice launched the Wisconsin Crime Alert Network, which partners local law enforcement with residents
and business to keep the public informed, solve and prevent crimes and help find missing people. Today, more than 10,000 Wisconsin citizens, businesses and law enforcement officers are using the network, including approximately 900 police departments. Alerts can be sent quickly based on location or can be targeted to groups from more than 50 categories, such as pharmacies or convenience stores. Officers can choose to issue those alerts to specific, affected groups across the county, a multi- county region or statewide.

Security innovations can extend beyond security and law enforcement personnel.

For instance, Kindred Health Transitional Care and Rehabilitation in Eagle Creek, Indiana, is a nursing home and rehabilitation center specializing in short-term rehabilitation therapy, bridging the gap between hospital and home, as well as long-term care.

 

Taking Video to the Workers

Before using new technology (DuraVision from Eizo), Kindred Health operated two nursing stations that included several clinical systems without an adequate PC storage and cable management solution. Nurses could not monitor the activity in hallways, parking lots and entrances with the previous configuration rendering them vulnerable and susceptible to physical security issues and time away from attending to patients. Their immediate need was to be able to monitor all activities from any nursing station within the facility.

Kindred Health deployed the solution at each nursing station. With IP cameras already installed and connected to an NVR and view stations at security and the manager’s office, the technology connects directly to the nursing network with no computer or software needed. Nurses and administrative personnel now view up to 16 different cameras from any of the nursing stations.

Unique communications can help bring innovative security to tricky locations.

The Pennsylvania Police Department and the Redevelopment Authority of the City of Bethlehem are leveraging millimeter wave radio technology (Siklu and its EtherHaul radios) to secure the new Hoover Mason Trestle at SteelStacks, a 10-acre campus dedicated to arts, culture, family events that was once home to Bethlehem Steel, the second largest steel manufacturer in the nation.

A safe and secure experience is part of the mission of SteelStacks, says Tony Hanna, executive director of the Redevelopment Authority.

Hanna points out that the trestle, which used to be a small gauge railroad line bringing materials to the steel plant, is now a public walkway 40 feet or so off the ground, open day and night with multiple cameras monitoring all the time. Axis Communications provided cameras, while LTW (Let’s Think Wireless) provided system integration, design and installation services.

 

Outside Video Wireless Transmission

The project included building a wireless network that could extend the police department’s video surveillance system to the Trestle. The radios were selected as they transmit on different frequencies than Wi-Fi, and would therefore be able to assure reliable operation of the security video delivery system, even in potentially congested areas. Video from the cameras is aggregated to a rooftop point and then transmitted to the local police department, the Bethlehem Redevelopment Authority and to additional radio links throughout the city.

Small footprint but unique radar technology also is playing an innovative role in enterprise perimeter protection.

A virtual “iron dome” pulls together radar and security video to uniquely protect the nation’s power grid. Recently Honeywell Security Group and SpotterRF Radar were part of a design to cover an electrical generation and transmission facility that features state-of-art generators.

Typically, unmanned plants operate in secluded locations, and are configured for efficient power generation rather than security. Chain link fences have become antiquated in a modern world of heightened access. Following an attack on a substation in California in 2013, the North American Electric Reliability Corporation (NERC) increased its security standards. When these standards are not met, noncompliance penalties can range up to $1 million per day.

 

More Sophisticated Analytics

The resulting innovative installation integrates active surveillance with intelligent video analytics, video management, access control and perimeter intrusion detection and fire. A central management solution (Pro-Watch) for intrusion and access control handles all alarms and system messages.

Honeywell collaborated with SpotterRF, integrating its active radar technology with intrusion detection and protection of the perimeter and beyond. With a range of 350 meters, the appliance blankets the surrounding 20 acres with complete coverage while using less power than a 10 watt lightbulb. Integrated behavioral filters detect moving targets, automatically analyze behavior and instantly cue cameras to that spot using GPS coordinates for pinpoint accuracy. Thermal capabilities of the HD cameras can determine if movement belongs to a live individual who might present a threat or simply another of the man-sized tumbleweeds that are routinely thrown against the fence by the wind.

According to SpotterRF CEO Logan Harris, the radar device weighs less than two pounds, and its small size enables easier installation in a variety of locations. The device can detect up, down and sideways, setting it apart from a standard spinning radar.

The system also actively monitors the surrounding skies. And the use of thermal imaging along with intelligent video analytics enables accurate visual detection 24/7 at night, in fog, during inclement weather and even behind obstructions.

The integrated solution includes access control, robust reporting to meet strict auditing regulations and constant monitoring of the perimeter surrounding the fence line and hundreds of meters beyond to make it easy for the station to exceed requirements and establish best practices, possible future compliance requirements and operational needs.

It’s all about situational awareness and accuracy of alarms by reducing false ones, according to Angela Oberman, senior channel manager, critical infrastructure at Honeywell. The technology targets four steps, she says: deter, detect, delay and respond. Beyond the lightweight radar, another tech breakthrough is gunshot detection that can even indicate the caliber of the bullet as well as more use of thermal cameras.

Innovative technology for special events often emphasizes ease of set-up, effectiveness and ease of removal after the event. No one knows better than those who protected Pope Francis during his September 2015 visit to the United States.

Mobile deployable vehicle crash barriers (from Delta Scientific) helped police and security personnel protect Pope Francis from vehicle bomb attack and errant drivers as he traveled to various venues in Washington, D.C., Philadelphia and New York City. At each location, the totally self-contained barriers were towed into position and controlled vehicle access within 15 minutes. No excavation or sub-surface preparation was required. Once positioned, the mobile barricades unpacked themselves by using hydraulics to raise and lower the barriers off their wheels. DC-powered pumps then raised or lowered the barriers. The shorter mobile deployable vehicle crash barriers can stop 7.5 ton vehicles traveling 30 mph. Both the operation of the barrier as well as deployment and retrieval are push-button controlled.

When exploring innovative technology that helps prevent crime and mitigate losses, there is a serious race to fight growingly sophisticated fraud. According to a Javelin Strategy & Research study released in 2015, fraudsters stole $16 billion from 12.7 million U.S. consumers in 2014. Technology is helping combat this; but companies also are concerned with creating too much friction in the consumer experience.

Gasan Awad, vice president, global identity and fraud product management at Equifax, the Atlanta, Georgia-based consumer credit reporting agency, and one of the three largest American credit agencies, realizes the need for a balance between higher level security and convenience. “We’ve been helping through big data before it was cool,” he says.

 

Fraud Fighting

“It’s important to have a multi-layered approach. Do things match? There is need to deploy fraud-fighting models that manage the customer experience as well as the assets” that might potentially be lost, Awad points out. One innovation: the Canada Known Fraud Exchange, which collects data on frauds and perpetrators and allows enterprises to dip into the big data to stop a fraudster sooner than later. Equifax is helping establish a U.S. Known Fraud Exchange, too.

There also is a unique organization working on fraud from another perspective.

The Open Identity Exchange (OIX) is a San Ramon, California-based technology agnostic, non-profit trade organization of leaders from competing business sectors focused on building the volume and velocity of trusted transactions online. OIX enables members to expand existing identity services and serve adjacent markets. To effectively provide digital services, businesses and governments need to validate, verify and authenticate identity in a cheap, reliable, repeatable manner. The rapid advancement of open identity technologies has created an interoperable technical platform to make this possible.

While the technology exists for relying parties (such as an online retailer or government agency) to use third-party identity providers, the business and legal policies that set the rules for identity issues such digital transactions have lagged behind. Without clear agreements on the business, legal and technical terms of a transaction, how can parties trust each other? OIX was formed to facilitate the development of the business and legal policies that match open identity technologies, thereby establishing trust that will enable deeper deployments of existing services and rapid deployments of new online products.

Awad sees yet another innovative fraud-fighting avenue: the selfie. At the point of a transaction, selfies, coupled to facial and document biometrics, can speed a fraud-free experience.

Sometimes, when migrating to network video from analog, enterprises look at other ways to innovate and squeeze more value from their investment. A case in point is wireless mesh.

The Willow Lane Trading Estate in Surrey, England, houses more than 150 businesses and employs more than 2,500 people. When the business upgraded an existing analog video surveillance system, the business park chose a wireless mesh networking solution (from Fluidmesh Networks). The new installation uses multiple-input multiple-output MIMO-based wireless radios designed for backhauling mission-critical video, voice and data, and other radios, which host an integrated sector antenna, providing coverage of 120 degrees.

Beyond upgrading to network cameras, another key goal was that the system be designed to enable substantial expansion. And it was critically important that the recorded images provide legible, evidential quality image capture.

This solution didn’t come without its challenges. Among them, there was no existing duct infrastructure, and the system needed to be wholly wireless.

 

Mesh Goes Beyond

Wireless mesh networks (WMNs) are an innovative technology for video surveillance, among mission-critical applications, often because trenching and creating direct cable connections is an expensive undertaking and usually requires permits. And, it also resolves distance issues associated with Wi-Fi, where security exposure can be a liability.

Simply stated, a wireless mesh network is a communications network comprised of radio nodes set up in a mesh topology, which is the arrangement of the various elements (links, nodes, etc.) of a computer network, according to Umberto Malesci, Fluidmesh Networks’ co-founder and CEO.

Wireless mesh networks in outdoor wireless networking applications rank as the third most commonly used topology, following point-to-point links and point-to-multipoint networks.  Every device deployed in a wireless mesh network is called a mesh node, and each is connected to multiple other mesh nodes simultaneously.

WMNs can connect nodes through multiple hops and leveraging other nodes as repeaters, creating inherent redundancy and reliability, says Malesci. This is an advantage for enterprises because mesh networks are able to reroute data traffic through multiple paths to overcome interference, link failures, power failures or network device failures.

Two types of wireless mesh networks are usually deployed for government and commercial applications: Structured wireless mesh networks and unstructured (omni-directional) wireless mesh networks.


Updated 2/22/2016:

This report was updated to add the Expert Commentary Section “Beyond Thermal, Video Crystal Ball Imaging.”


Beyond Thermal, Video Crystal Ball Imaging

Security magazine: Every year, there seems to be a dominant buzz word or trend in the video surveillance industry.  What do you expect that will be this year?

Net Payne, chief sales and marketing officer with March Networks: Without a doubt, organizations will continue to focus on cybersecurity this year, with the goal of securing all possible entry points into their corporate network as effectively as possible.

Most organizations today have some degree of cybersecurity initiative currently on the go right now. Worldwide, it’s estimated that companies will spend $77 billion on IT security by the end of 2015, with that amount set to increase to $101 million on information security in 2018 (CybersecurityVentures Market Report, Q3 2015).

So it’s not surprising that, when it comes to potential video system vulnerabilities, many organizations are turning to trusted technology providers and vendors to help.

For example, this past year there was a comprehensive [security video] audit with a large and long-term banking customer as part of its information technology risk management program. The extensive audit covered a wide range of business policies and practices, including how products are designed with security in mind, track and assess potential vulnerabilities and communicate software updates to mitigate risks. We were able to demonstrate a high level of competency in all key areas and worked quickly to adjust where further effort was needed.

Not every organization is able to initiate an audit of this extent with their vendors, but customers should ask their providers to demonstrate how they are staying on top of potential security vulnerabilities, and take appropriate action.

In our case, there is a security advisories and updates program that’s transparent. We track threats reported by the U.S. Computer Emergency Readiness Team (US-CERT), and do an immediate evaluation to see how they might impact products. If a potential vulnerability is found, proactively a software update is issued as well as Web posts; certified partners and providers are alerted so they can act before there’s a problem.

 

Security magazine: Which video surveillance products or solutions do you think more organizations will adopt in 2016?

Net Payne: We heard a lot about 4K and even 7K cameras this past year and I expect that will continue in 2016. What we’re seeing in a customer base, however, is more of a slow march toward adoption of these very high-resolution cameras, rather than a rush to replace.

In fact, one large retail customer recently trialed megapixel IP cameras in a couple of stores to capture activity at point-of-sales. While impressed with video clarity, they had already seen a noticeable improvement in quality of existing analog video after upgrading hybrid NVRs, and ultimately decided the analog video was sufficient for what was needed – even for new builds. Ultimately, the cost per pixel ROI just wasn’t there.

Another trend that’s definitely gaining momentum is the idea of using surveillance video to provide relevant insights into other parts of the business – whether focused on improving customer service, optimizing their workforce, analyzing business trends or improving operational efficiencies.

Expanding video’s use beyond the more typical security and loss/fraud prevention applications is a real and growing concept that I expect will simply be table stakes for most organizations in time. We started to see this shift in mindset with our retail and banking customers once they started to think of video as yet another source of big data they could gather and combine with other system data to extract intelligence.

For example, a financial institution may want to evaluate speed of service at teller stations in certain regional branches or organization-wide. By integrating a queue length monitoring analytic with surveillance video, they can not only measure the wait times at each teller station and branch, they can also view the video to see what’s contributing to any anomalies. The best solutions will integrate the data in a software dashboard that will generate reports automatically using a customer’s key performance metrics, and provide reporting tools complete with graphics to help parse the data and highlight trends and outliers.

 

Security magazine: What should enterprises demand from their systems integrators and vendors in 2016?

Net Payne: Customer support should be at the top of the list, as organizations continue to evaluate new solutions and capabilities, such as emerging cloud-based offerings and the business intelligence applications discussed above.

Enterprise security executives need to be able to rely on service providers to help guide to products and solutions that will deliver the results needed. A one-size-fits-all approach will not work. The experienced systems integrators know this, and are excellent at advising customers on the pros and cons of different technologies.

Having said that, organizations should demand similar expertise and support from their technology vendors.  How do their vendors train and support their partner integrators? What can the vendor offer in terms of proof-of-concept? What’s their approach to cybersecurity and how do they keep their partners and customers informed?  It’s also a good idea to understand a vendor’s technology vision for the longer-term and how that might benefit your business in the future.


Continue to the next page to read about additional security technology innovations such as audio monitoring, identity management for fraud detection, license plate recognition, multi-megapixel surveillance infrastructure and more.

KEYWORDS: Annual Technology and Innovations Report biometric security Internet of Things (IoT) security leadership security technology Unmanned Aerial Vehicle (UAV) Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Previous 1 2 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cover slide feat

    Top Security Technology and Innovations in 2014

    See More
  • Dave Droster, director, global security for Briggs & Stratton, has been able to shrink the number of security officers

    Top Security Guarding Companies Report 2016

    See More
  • Patrick Talty, general manager (right), and Billy Langenstein, Director of Event Services

    2017 Security Innovation in U.S. Bank Stadium, Where Technology Is King

    See More
×
Innovative interoperability of diverse systems including event management, enterprise resource management, customer relationship management and a data management engine all integrate with an access control system to provide wireless networked door control locks and room scheduling at Austin Hall. Photos courtesy of the College of Business, Oregon State University
Smartphones may one day replace access cards but not in a big way. Some tests used near field communications technology built into some phones but needed special programming. Mitchell Kane of Vanderbilt sees more promise in Bluetooth approaches. Photo courtesy of Vanderbilt
Littleton Public Schools’ Guy Grace (pictured standing in a newly energized command center) sees value with multifunctional innovations such as a new network-based communication and security system. Photo courtesy of Guy Grace
Innovative IP-based megapixel cameras make business sense to Kevin Miller, corporate director of security for the Davenport Hotels in Spokane, Washington. They cover more ground with fewer cameras needed. Photo courtesy of Davenport Hotels
Kindred Health Transitional Care and Rehabilitation deployed an innovative security solution. With IP cameras already installed and connected, the technology now connects directly to the nursing network with no computer or software needed. Photos courtesy of Eizo
Millimeter wave radio technology secures the new Hoover Mason Trestle at SteelStacks, a 10-acre campus dedicated to arts, culture and family events that was once home to Bethlehem Steel. Photo courtesy of the Redevelopment Authority of the City of Bethlehem
There now is perimeter protection beyond fences for critical infrastructure: Compact surveillance radar systems that can work with security video and other perimeter alarms. In some cases, a unique three-band approach ensures a “never-blind” outcome for vital security environments. Photo courtesy of SpotterRF
Protecting Pope Francis during his 2015 visit to the United States included easily deployable crash barriers. Innovative design lets security and law enforcement set-up the barriers within a few minutes. Pictured is a unit in use on the streets of Philadelphia during the Pope’s visit there. Photo courtesy of Delta Scientific
Fighting fraud calls for an innovative balance of better security and a better customer experience. You want to mitigate risk but not risk running off your customers or client, observes Gasan Awad, vice president, global identity and fraud product management at Equifax. Photo courtesy of Equifax
A multi-point wireless mesh unit, located on a roof, covers a wide portion of the Willow Lane Trading Estate in Surrey, England. Photo courtesy of Fluidmesh Networks
Using audio data, a gunshot detector accurately analyzes gunshots from a variety of weapons including handguns, shotguns, rifles and automatic rifles. Photo courtesy of Louroe Electronics
There are law enforcement and revenue-generating applications for automated license plate recognition systems. Photo courtesy of PlateSmart Technologies
Using iris recognition, innovative technology can identify and provide secure access into such areas as data centers through a device as simple as a wall-mounted tablet. Photo courtesy of SRI International
Credit and debit cards converted to the EMV standard using a chip and soon an accompanying PIN will move fraud to card-not-present environments such as Web, tablet and smartphone purchasing.Photo courtesy of Bank of America
Body-worn cameras (pictured) and in-car cameras are growing in number and use by law enforcement and so is the need to better secure the captured evidence. Photo courtesy of Panasonic System Communications Company of North America
A unique Rapid Emergency Response System takes an innovative riff on fire pulls. Its blue color, separate communications to a central monitoring service, location and mapping of an incident all encourage a quicker more knowledgeable jump on incidents by first responders. Photos courtesy of BluePoint Alert Solutions
There are myriad benefits from Power over Internet with more innovations to come, says Tony Diodato of Cypress Integration Solutions. Photo courtesy of Cypress Integration Solutions
Customers should ask their providers to demonstrate how they are staying on top of potential security vulnerabilities, according to Net Payne of March Networks. Photo courtesy of March Networks

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!