Q. What role can technology play in the security industry ?
Security has traditionally been considered as the protection of assets via the use of perimeter security, access control, CCTV etc. Modern security is as much about people management as it is about asset protection.
Creating a safe and secure work environment is becoming increasingly important, and increasingly challenging. The pace of modern business is such that the human element alone cannot keep up without the aid of technology. There are many factors to consider when providing a safe and secure workplace:
- Are the staff suitably trained to carry out their tasks ?
- Are the staff fit for work ?
- Are visitors or contractors where they should be ?
- Can personnel be quickly accounted for in an evacuation ?
- Are dangerous zones clear of people ?
- Is the compliance and regulatory standards being met?
Technology can be deployed to ensure these questions are answered and become an integral part of implementing best practise for safety and security whilst also delivering improved business efficiency and profitability.
Q. What trends will drive the security industry in the near future ?
As security systems become more IP based they must keep up with the latest cyber security standards. Customers should challenge vendors with such questions as;
- Can you provide a SHA-2 hash of the installation files to verify the software has not been corrupted or tampered with ?
- Can the IP based hardware detect and resist a Distributed Denial of Service (DDoS) attack?
- Does the IP based hardware support IPV6?
- What levels of encryption are deployed ?
- What steps are undertaken to ensure the systems are resistant to cyber attacks (i.e. penetration testing from external organisations )?
With the growing sophistication of drone technology, they are increasingly being deployed in security applications. For example; if the security management system detects suspicious activity on a section of the perimeter, the coordinates are passed to the drone which is immediately despatched to the area of concern to stream video back to the control room.
Blockchain technology is a distributed database which is continuously shared and synchronised. It is always available to any of the participants in the network. A blockchain database isn’t stored in one place and is considered very secure. Blockchain has the potential to verify video content from sources like mobile phones, CCTV cameras etc, as well as the authenticity of devices connected to the network. Blockchain solutions, which are distributed across multiple nodes rather than a single server, can also ensure data stored in the cloud won’t be lost or tampered with.
Adaptable Security Management Systems
Security Management Systems should support industry standard protocols such as OPC, BACnet, XML, REST, SNMP to allow for easy integration as part of a larger connected system. Manufactures need to have APIs available to allow third parties to easily integrate with the SMS.
Q. What are your plans for coming years to stay ahead of competition ?
Gallagher spends significant time in market talking to customers to gain a thorough understanding of their business problems. Being the manufacturer allows us to be agile and innovative and create customised solutions to suit our customers’ needs.