Embracing the Internet of Things

Embracing the Internet of Things

Opportunities and implications for security and beyond

The machine-to-machine (M2M) movement. The Internet of Things (IoT). The Internet of Everything (IoE). Each term may have its subtle differences, but at their core, they all involve connected devices that share information to enhance their intelligence, capabilities and operation. However you refer to the phenomenon, the IoT is here to stay. It’s poised to generate far-reaching implications in the security space—from alarm monitoring to advanced, integration projects—while enhancing efficiencies and business intelligence.

The IoT combines operational technology (OT), devices in the field that capture data, with information technology (IT), back-end software systems that can do something with the data, to create actionable business intelligence and management capabilities. OT devices may include alarm sensors, cameras, readers, panels, environmental sensors and more. Such wired and wireless devices share information with one another and with applications in real time. Standards are being developed so that all a device requires is a communication pathway along with the ability to detect something and capture data.

Real-time data collected by OT devices can be vast and includes information related to alarm conditions, vehicle movement, video detection, doors status, environmental conditions and more. The devices can share this data and send it back to a central management location, likely via a cloud-based solution. From these systems, people can aggregate and analyze the data to identify trends, anomalies and deficiencies, so they can verify positive correlations and make real-time corrective actions as needed to improve their operations.

The IoT promises seemingly endless possibilities, and the security industry is ready to welcome a host of new IoT-enabled capabilities that, if managed well, can greatly enhance security and business operations. Let’s review how the IoT is impacting a variety of industries and how those applications are influencing IoT-related opportunities in the security world.

The IoT Everywhere

The potential of the IoT to drive organizational changes begins with data collection and sharing, and relies heavily on the sophisticated analysis of this data. The capturing of data is nothing new. Corporations have been collecting data—Big Data—from consumers, processes and operations for years. However, in the IoT space, organizations can capture a wider array of data from a wider variety of sources. By combining and purposefully manipulating those data points, organizations can discover deeper correlations and arrive at more intelligent conclusions about their operations. Such capabilities are emerging in a number of industries.

In the utilities market, the IoT is enabling more efficient data collection with smart meters that relay readings to cloud-based servers with no need for human involvement. This capability is leaps ahead of traditional house-to-house manual readings. Beyond providing readings for billing purposes, we can envision a day in which a water company can track realtime usage and historic patterns, and notify a property owner of a potential leak.

In the insurance arena, carriers are using IoT-enabled devices to glean information from consumers’ real-life habits to assess risk and promote safe driving. For example, Progressive’s Snapshot device plugs into a consumer’s vehicle and relays information to a cloud server. Tracking data related to miles driven, hard braking instances and time of day helps Progressive determine appropriate coverage rates. Consumers receive discounts for low-risk driving habits and can track their projected savings online.

For manufacturing operations, IoT-enabled devices can track pallets, containers and processes, informing operators where everything stands in real time. Careful analysis of this data can help organizations predict when a process may fail, identify when to perform proactive maintenance and enhance the visibility of processes throughout a plant on a granular level.

And, let’s not forget the consumer space where IoT applications abound, allowing us to track our exercise habits, set our thermostats from our smartphones and turn our lights on automatically when we arrive at home. One day consumers may use the IoT to control fully-automated homes from a single remote device.

The IoT in Security

If the IoT is all about more efficiently capturing data, understanding what that data means and taking actions to improve outcomes based on that data, then it is more than welcomed in the security space. It’s needed.

Security-related data from IoT-enabled devices may come from people scanning access badges, cameras tracking movements, alarms being activated, sensors monitoring temperature, mobile devices, wearables and vehicles. All of the devices capturing this information are now able to communicate with one another, and they’re able to capture granular information. Collecting, aggregating and analyzing this data can lead organizations to actions that help reduce costs, enhance efficiencies, provide new services and even glean business intelligence that extends far beyond security operations to include information technology, human resources, logistics and other business functions.

As an example of enhancing business intelligence, IoT-enabled devices can give retail loss prevention teams more information to detect, prevent and investigate issues. Connected devices also can serve dual purposes to maximize their value, such as surveillance cameras being used to inform marketing tactics by counting people and tracking heat maps to determine the effectiveness of in-store displays, while making real-time adjustments.

As the IoT security space continues to grow, companies are developing ways to enhance the capabilities of connected edge devices by connecting them to new software systems. The key to enabling these new devices is manufacturers, software companies and integrators providing open architecture systems based on application program interfaces (APIs).

APIs enable the expansion of a system’s capabilities by building customized solutions that leverage applications or services in the cloud as well as onsite. Doing so allows end users to create a more enterprise- focused model for their business that enables richer collaboration and more meaningful information gathering and sharing across departments, sites and organizations.

One example of an API-based system is Diebold’s SecureStat centralized Web-based security management system. It includes a Development Zone Portal in which customers and partners can create solutions with APIs to collect service, installation and monitoring history, access video, automate provisioning and manage security devices in the field. The portal includes documentation, sample code, instructions and an inventory of capabilities and services that organizations can use to create their own interfaces.

Brivo Labs and Eagle Eye Video also have embraced the API space. Brivo Labs offers cloud-based access and video solutions that users can tweak to fit their needs, and the company’s API platform allows developers to build apps that can unlock and lock doors, provision credentials and obtain data. Eagle Eye Video allows organizations to develop apps to automate recording, management and playback of video from any connected camera.

What the Future May Hold

Via low-cost and ubiquitous cellular and wireless transmission technology, the IoT is expanding the capabilities and “smartness” of edge devices, making them even more integral tools for enhancing security. Traditionally, edge devices had to communicate directly to an alarm panel, which relayed information to a receiver or monitoring center, often with some sort of human intervention or interpretation. As edge devices get smarter and communicate directly with one another, they can make decisions and take action on their own to drive efficiencies. To enable even more meaningful outcomes, operators can use a centralized dashboard to conduct targeted analyses on the data that edge devices collect to uncover direct, and sometimes hidden, correlations.

Today, we can envision a future in which the alarm panel as we know it has dramatically changed, replaced by intelligent wireless edge devices communicating directly with a cloud-based service. Via a Web-based interface, an organization can track the information edge devices capture and share it in real time, giving an organization more power than ever before to quickly make adjustments to improve operations. Leveraging software-as-a-service capabilities with APIs enables the organization to pick and choose solution sets to fit its needs, without building its own solutions from the ground up.

With the innovative IoT-related security solutions that are available today, this vision may soon become a reality. As such, the IoT is already empowering the next generation of security.

This article originally appeared in the December 2014 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3