Remote - Spring 2014 - (Page 6)

Feature Article Top 10 Security Tech Trends for 2014 Steve Surfaro, Security Industry Liaison Axis Communications, Inc. New technologies that enhance the experience and situation awareness for remote users have arrived for 2014. In cyber security, many organizations will embed security into their business and organizational strategies, as well as devices, at all levels. Smarter security devices will help improve campus or city-wide domain awareness. Yet as more devices get to use newer, resilient networks that create device grids, it will also create opportunities for rogue users. 1) Smarter Cities, Smarter Devices Increasingly secure and smart cameras, RFID, vehicle plate capture, vehicle motion detection technologies expand the public safety and operational sensor network. Cloud-enabled apps can connect transportation, emergency medical services, fire and life safety response, lighting and environment data. Once collected, some data like vehicle velocity can easily be made actionable with metered freeway entries, reducing traffic congestion. Today's smart cameras can be transformed into purpose-built, selfcontained mini-systems that can perform one automated detection task over and over and then switch to a different one by activating another recognition application. A camera running a vehicle license plate application in an office parking area during the day can automatically switch to a "cross-line" detection mode that helps fortify the perimeter. 2) Cyber Security Measures Diversify to Mobility Last year proved to be an eye-opening year for cyber security. IBM's X-Force 2013 Mid-Year Report introduced newer zero-day attacks like "watering holes," where exploit code is deposited and used for a later attack. The NSA's data breach illustrated how virtually any organization is vulnerable to insider threats, and cyber security is a journey, not a destination. After RSA coined the first water holes as VOHO in 2012, both NIST (National Institute of Standards and Technology) and OWASP (Open Web Application Security Project) updated both server hardening and application protection guidelines in 2013. Both areas will continue to be guidance areas to protect critical assets. The BYOD (bring your own device) policies continue to extend mobile device consumerization at the workplace including critical infrastructure. By 2017, according to some reports, there will be more than one billion Android devices in use, attracting more attention from malware authors. Applications verification, improved device permissions status and SMS send notifications will continue to provide both countermeasure and device hardening. 3) Wearable Devices Established as Growth Sector Google Glass has been joined by smartwatches and many other tools that bring information, including enhanced situation awareness, to the mobile professional. CES 2014 saw an introduction of thousands LiVest image courtesy ONSSI. Disclaimer - This is a concept offered by of devices, many OnSSI 3rd party Technology Partners. fueled by the investments in wearables through crowd-funded efforts. These consumer activities will help drive the use of wearable miniature video cameras already being used by law enforcement into utilities, transportation surveillance and security. Today's "connected" law enforcement officer offers more opportunity for individuals protecting and monitoring 6 www.RemoteMagazine.com critical infrastructure. For example, a wearable vest equipped with IP cameras, environmental sensors and power bring connected reality to the remote first responder. 4) Tablets and Hybrids Grow as Security Officer Tools Tablet computing is increasingly attractive and affordable making them not only useful as education tools, but also for running multiscreen video management apps. Today's security guard can keep watching other areas while performing a routine physical tour. Multiple alarms and electronic access control system status may also be easily viewed side-by-side with video verification. Business professionals already adopted this class of mobile devices and anticipate these tools will displace traditional desktop PCs, notebook or laptop computers. 5) Low Light Devices See in Darker Environments Thermal Imaging Gets Smarter Today's IP cameras deliver not only HDTV images, but also provide the ability to "find the light" in dimly lit areas, often around critical infrastructure facility perimeters. Thermal imaging is also a function of the latest breed of "smart" cameras enabling perimeter detection of people and vehicles in the absence of visible light. 6) 4G LTE FDD Continues Momentum LTE TDD Will Start to Roll Out LTE's global users are estimated to double in 2014. Although many of these LTE deployments are FDD or asymmetric, which optimize the download of media, the promise of a symmetric LTE-TDD will continue to be rolled out and better support IP camera networks that stream digital multimedia content and meta data "up" to the network. 7) Alarm Automation Accelerates 911 Centers The Central Station Alarm Association's PSAP to ASAP program is just one example of how public/private data interchange can speed response to critical infrastructure alarms. There are a number of central monitoring alarm companies currently participating in the PSAP to ASAP program, which speeds alarm notifications by providing information to 911 centers via computer instead of a phone call. 8) Video Surveillance Works Together with Picture Messaging Video can be a powerful resource for law enforcement, from notification to situation awareness during incidents. To help capitalize on available data, many technology companies are working together to create informating sharing systems. For example, SendUs, a video and image portal, is partnering with leading public cloud service provider Amazon Web Services to provide a Large Emergency Event Digital Information Repository (LEEDIR) service free of charge to federal, state and local law enforcement immediately following a large criminal act, terrorist attack or major disaster. The LEEDIR technology service will enable participating law enforcement and relief agencies to receive and rapidly analyze surveillance, eyewitness videos and photo information submitted by citizens during large emergency events. IP video cameras will be an invaluable source of content for this service. Similarly, eLerts offers agencies a video surveillance "Attention Engine" http://www.RemoteMagazine.com

Table of Contents for the Digital Edition of Remote - Spring 2014

Editor's Choice
Top 10 Security Tech Trends for 2014
Facility Realities: An Inevitable Trend - Centralized Facility Management (CFM)
Unified Push-to-Talk: The Future of Remote Site Communications
Using PAS 55 to Manage Oil & Gas Assets
Wireless Field Area Communication Networks for Digital Oil & Gas Fields
100 Tunnels Under Control
Unique Spacer Cable System Powers Renewable Energy Plant Pipeline
Internet of Things North America
SCADA
Networking
Security
Onsite Power
Industry News

Remote - Spring 2014

https://www.nxtbook.com/nxtbooks/webcom/remote_2016winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2016fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2016
https://www.nxtbook.com/nxtbooks/webcom/remote_2016spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2015fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2015m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2015spring
https://www.nxtbook.com/nxtbooks/webcom/remote_industrialnetworking2014
https://www.nxtbook.com/nxtbooks/webcom/remote_2014fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2014m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2014spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2013winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2013m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2013fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2013summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2013spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2012winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2012m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2012fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2012summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2012scada
https://www.nxtbook.com/nxtbooks/webcom/remote_2012spring
https://www.nxtbook.com/nxtbooks/webcom/remote_201112
https://www.nxtbook.com/nxtbooks/webcom/remote_201110
https://www.nxtbook.com/nxtbooks/webcom/remote_201108
https://www.nxtbookmedia.com