Security Technology
Does “security technology” enough to cover the broader application possibilities of today’s systems?
he concept of how security systems can contribute to the broader business goals of a business is not new. It seems we have been talking for more than a decade about the benefits of security systems that go beyond “just” security. Given the growing role of technology in the market, including video and access control, is the term “security” too restrictive to describe exactly what our industry is doing? We have come to the panel of experts to get their answers to this premise: is the term “security technology” too narrow in view of the broader application possibilities of today’s systems? Why?
The term “security technology” is very restrictive in describing the applications of many of today’s systems. Biometric technologies are a good example. Iris, fingerprint and face recognition systems primarily began to authenticate the identity of a person requesting door access.
While this is still a common use, it is now only the tip of the iceberg. Payroll solution providers integrate iris recognition readers into their card and hands-free systems. College and university students routinely use iris readers to buy groceries and books without fumbling in a backpack for a smart card. In many countries, a person’s iris replaces cards for obtaining health care and other social benefits, registers for voting, and even acts as a national identity card. We will continue to see more innovative applications of biometrics as more public and private organizations think beyond the traditional safety box. – Mohammed Murad, Iris ID Systems, Inc
It is fair to say that the term “security technology” is overloaded. Those of us in the physical security world would interpret them as technologies that are used in our industry, but I think the vast majority would generally think of technology used to protect us against cyber attacks. Of course, both are true. Today, cameras and video management systems are much more than just devices for protecting property and people. A camera is the richest available data sensor, and we’re starting to see some very creative and focused uses of cameras as a data source. Video management systems (VMSs) for specific markets are no longer focused on displaying the video as their primary point of view, but rather on displaying an aggregation of the data. The information collected by these cameras is the oil for the combustion engine of the management system. How fast can we get this engine to take us? – Stuart Rawling, Pelco by Schneider Electric
The term “security technology” is a challenge for sales and marketing professionals who need to differentiate products and services to reach their audiences. Consider Surveillance: Although we do not have to talk exclusively with security managers, they are crucial in most shopping chains. In retail z. For example, many surveillance manufacturers differ in terms of end-to-end product lines such as cameras, video management software, integration with point-of-sale systems, and analytics. In this area, Analytics often benefits the marketing departments – giving more opportunities to security vendors. However, security and loss prevention managers remain the most important buyers. Retail surveillance continues to be primarily implemented to improve safety. Additional benefits are often seen as added value. As long as there is a strong demand for new / improved security monitoring systems, it makes no sense to abandon the term ‘security technology’, but to extend the offer to end users. – Jamie Barnfield, IDIS
To maximize their investments in safety equipment, customers are finding new ways to spread costs across multiple departments. The results have led to interesting non-traditional security technology applications. Retail marketing departments use surveillance cameras to monitor buyers’ reactions to new product displays. Cameras allow contractors compliance officers to demonstrate that employees meet government security requirements. Video tricks allow administrators from academic departments at a hearing-impaired college to communicate with American sign language. When employees enter and leave, an access control system tracks their time for staff. These are just a few of the non-traditional uses. The design and use of new and existing products are not hindered by the term “security technology”. It is not exactly accurate, but it will do until we can agree on a better term. – Dana Pruiett. Aiphone
The term “safety technology” has definitely become too narrow in recent years. It is more appropriate to consider these systems in broader technological terms that enhance the security of assets / information and the monitoring of vulnerable areas. Physical and logical security are also intertwined, especially as the Internet of Things (IoT) has become increasingly popular. This makes it imperative to ensure the application of strict security principles on ioT devices and to ensure that there are no weak links that could be exploited by nefarious individuals or organizations. Of course, the emergence of fully value-added smart homes / offices / cities requires even safer systems. The use of new technologies is required to secure even modest devices that would never have been risky before. Of course, security development is nothing new, just think of the transition from lock and key to card access to biometric systems and beyond. – John Davies, TDSi
Given the degree of interoperability between the systems, I agree that the term “security technology” is too narrow for the work of many manufacturers. Many solutions on the market today are far more than just keeping a plant safe. For example, access control and building management solutions are now smart enough and able to exchange information to make a building more efficient, such as: For example, changing the temperature setting when nobody is present in a building, lighting savings, etc. Another example is the integration of event management through an access control solution. In higher education institutions, this means that students can request access to specialized study rooms or rooms via an event management system that communicates with the access control system. This works in a number of verticals, such as apartment buildings and recreation centers, too (to reserve a seat on a tennis court as an example). – Lynn Wood, Vanderbilt Industries
Conclusion
Our expert panel members strongly emphasize that the term “security technology” is too restrictive given the many ways in which our industry’s products and systems work in today’s businesses. However, it still looks as if many of the new uses are seen as added value, and security and security are still the main motivation for the adoption of the technologies. As one podium speaker puts it, even though the term “is no longer correct, it will do so until we can agree on a better concept.”