Remote - Spring 2014 - (Page 6)
Feature Article
Top 10 Security Tech Trends for 2014
Steve Surfaro, Security Industry Liaison
Axis Communications, Inc.
New technologies that enhance the experience and situation awareness
for remote users have arrived for 2014. In cyber security, many organizations will embed security into their business and organizational strategies,
as well as devices, at all levels. Smarter security devices will help improve
campus or city-wide domain awareness. Yet as more devices get to use
newer, resilient networks that create device grids, it will also create opportunities for rogue users.
1) Smarter Cities, Smarter Devices
Increasingly secure and smart cameras, RFID, vehicle plate capture,
vehicle motion detection technologies expand the public safety and operational sensor network. Cloud-enabled apps can connect transportation,
emergency medical services, fire and life safety response, lighting and environment data. Once collected, some data like vehicle velocity can easily be
made actionable with metered freeway entries, reducing traffic congestion.
Today's smart cameras can be transformed into purpose-built, selfcontained mini-systems that can perform one automated detection task over
and over and then switch to a different one by activating another recognition application. A camera running a vehicle license plate application in an
office parking area during the day can automatically switch to a "cross-line"
detection mode that helps fortify the perimeter.
2) Cyber Security Measures Diversify to Mobility
Last year proved to be an eye-opening year for cyber security. IBM's
X-Force 2013 Mid-Year Report introduced newer zero-day attacks like "watering holes," where exploit code is deposited and used for a later attack. The
NSA's data breach illustrated how virtually any organization is vulnerable to
insider threats, and cyber security is a journey, not a destination.
After RSA coined the first water holes as VOHO in 2012, both NIST
(National Institute of Standards and Technology) and OWASP (Open Web
Application Security Project) updated both server hardening and application
protection guidelines in 2013. Both areas will continue to be guidance areas
to protect critical assets.
The BYOD (bring your own device) policies continue to extend mobile
device consumerization at the workplace including critical infrastructure. By
2017, according to some reports, there will be more than one billion Android
devices in use, attracting more attention from malware authors. Applications
verification, improved device permissions status and SMS send notifications
will continue to provide both countermeasure and device hardening.
3) Wearable Devices Established as Growth Sector
Google Glass
has been joined by
smartwatches and
many other tools
that bring information, including
enhanced situation
awareness, to the
mobile professional. CES 2014
saw an introduction of thousands
LiVest image courtesy ONSSI. Disclaimer - This is a concept offered by
of devices, many
OnSSI 3rd party Technology Partners.
fueled by the
investments in
wearables through crowd-funded efforts.
These consumer activities will help drive the use of wearable miniature
video cameras already being used by law enforcement into utilities, transportation surveillance and security. Today's "connected" law enforcement
officer offers more opportunity for individuals protecting and monitoring
6
www.RemoteMagazine.com
critical infrastructure. For example, a wearable vest equipped with IP cameras, environmental sensors and power bring connected reality to the remote
first responder.
4) Tablets and Hybrids Grow as Security Officer Tools
Tablet computing is increasingly attractive and affordable making them
not only useful as education tools, but also for running multiscreen video
management apps. Today's security guard can keep watching other areas
while performing a routine physical tour. Multiple alarms and electronic
access control system status may also be easily viewed side-by-side with
video verification. Business professionals already adopted this class of mobile devices and anticipate these tools will displace traditional desktop PCs,
notebook or laptop computers.
5) Low Light Devices See in Darker Environments Thermal Imaging Gets Smarter
Today's IP cameras deliver not only HDTV images, but also provide the
ability to "find the light" in dimly lit areas, often around critical infrastructure facility perimeters. Thermal imaging is also a function of the
latest breed of "smart" cameras enabling perimeter detection of people and
vehicles in the absence of visible light.
6) 4G LTE FDD Continues Momentum LTE TDD Will Start to Roll Out
LTE's global users are estimated to double in 2014. Although many
of these LTE deployments are FDD or asymmetric, which optimize the
download of media, the promise of a symmetric LTE-TDD will continue
to be rolled out and better support IP camera networks that stream digital
multimedia content and meta data "up" to the network.
7) Alarm Automation Accelerates 911 Centers
The Central Station Alarm Association's PSAP to ASAP program is just
one example of how public/private data interchange can speed response
to critical infrastructure alarms. There are a number of central monitoring
alarm companies currently participating in the PSAP to ASAP program,
which speeds alarm notifications by providing information to 911 centers
via computer instead of a phone call.
8) Video Surveillance Works Together with
Picture Messaging
Video can be a powerful resource for law enforcement, from notification to situation awareness during incidents. To help capitalize on
available data, many technology companies are working together to create
informating sharing systems. For example, SendUs, a video and image
portal, is partnering with leading public cloud service provider Amazon
Web Services to provide a Large Emergency Event Digital Information
Repository (LEEDIR) service free of charge to federal, state and local law
enforcement immediately following a large criminal act, terrorist attack or
major disaster. The LEEDIR technology service will enable participating
law enforcement and relief agencies to receive and rapidly analyze surveillance, eyewitness videos and photo information submitted by citizens during large emergency events. IP video cameras will be an invaluable source
of content for this service.
Similarly, eLerts offers agencies a video surveillance "Attention Engine"
http://www.RemoteMagazine.com
Table of Contents for the Digital Edition of Remote - Spring 2014
Editor's Choice
Top 10 Security Tech Trends for 2014
Facility Realities: An Inevitable Trend - Centralized Facility Management (CFM)
Unified Push-to-Talk: The Future of Remote Site Communications
Using PAS 55 to Manage Oil & Gas Assets
Wireless Field Area Communication Networks for Digital Oil & Gas Fields
100 Tunnels Under Control
Unique Spacer Cable System Powers Renewable Energy Plant Pipeline
Internet of Things North America
SCADA
Networking
Security
Onsite Power
Industry News
Remote - Spring 2014
https://www.nxtbook.com/nxtbooks/webcom/remote_2016winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2016fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2016
https://www.nxtbook.com/nxtbooks/webcom/remote_2016spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2015fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2015m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2015spring
https://www.nxtbook.com/nxtbooks/webcom/remote_industrialnetworking2014
https://www.nxtbook.com/nxtbooks/webcom/remote_2014fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2014m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2014spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2013winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2013m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2013fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2013summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2013spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2012winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2012m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2012fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2012summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2012scada
https://www.nxtbook.com/nxtbooks/webcom/remote_2012spring
https://www.nxtbook.com/nxtbooks/webcom/remote_201112
https://www.nxtbook.com/nxtbooks/webcom/remote_201110
https://www.nxtbook.com/nxtbooks/webcom/remote_201108
https://www.nxtbookmedia.com