Professional Documents
Culture Documents
Full download The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data And IoT Are Transforming Physical Security In The Digital Age 1st Edition Edition Steve Van Till file pdf all chapter on 2024
Full download The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data And IoT Are Transforming Physical Security In The Digital Age 1st Edition Edition Steve Van Till file pdf all chapter on 2024
https://ebookmass.com/product/critical-security-studies-in-the-
digital-age-social-media-and-security-joseph-downing/
https://ebookmass.com/product/people-centric-security-
transforming-your-enterprise-security-culture-1st-edition-hayden/
https://ebookmass.com/product/physical-security-principles/
https://ebookmass.com/product/the-eu-irish-defence-forces-and-
contemporary-security-jonathan-carroll/
IoT for Defense and National Security Robert Douglass
https://ebookmass.com/product/iot-for-defense-and-national-
security-robert-douglass/
https://ebookmass.com/product/the-big-picture-how-to-use-data-
visualization-to-make-better-decisions%e2%80%95faster-steve-
wexler/
https://ebookmass.com/product/cybersecurity-and-decision-makers-
data-security-and-digital-trust-marie-de-freminville/
https://ebookmass.com/product/machine-intelligence-big-data-
analytics-and-iot-in-image-processing-ashok-kumar/
https://ebookmass.com/product/cloud-computing-concepts-
technology-security-architecture-thomas-erl-eric-barcelo-monroy/
The Five Technological
Forces Disrupting Security
This page intentionally left blank
The Five Technological
Forces Disrupting Security
How Cloud, Social, Mobile, Big Data
and IoT are Transforming Physical
Security in the Digital Age
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or any information storage and retrieval system,
without permission in writing from the publisher. Details on how to seek permission, further information
about the Publisher’s permissions policies and our arrangements with organizations such as the
Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website:
www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher
(other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden
our understanding, changes in research methods, professional practices, or medical treatment may
become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and
using any information, methods, compounds, or experiments described herein. In using such
information or methods they should be mindful of their own safety and the safety of others, including
parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any
liability for any injury and/or damage to persons or property as a matter of products liability,
negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas
contained in the material herein.
ISBN: 978-0-12-805095-8
Section 2 Mobile
CHAPTER 4 Going Mobile ....................................................................... 41
The Desk in Our Pockets................................................................ 42
Mobile First..................................................................................... 43
The Interactive Paradigm ............................................................... 44
The Toothbrush Test ...................................................................... 45
Retention Matters........................................................................... 46
Adoption .......................................................................................... 47
CHAPTER 5 Security Ecosystems........................................................... 49
The Desktop Reincarnated ............................................................. 50
Apps Have a Field Day.................................................................... 51
Mobile Credentials.......................................................................... 52
Interactive Security......................................................................... 53
Middleware for the Real World...................................................... 54
One Key to Rule Them All .............................................................. 56
ApplePay for Spaces....................................................................... 58
Don’t We Get Any Standards Out of This? ..................................... 58
CHAPTER 6 Altered Presence ................................................................ 61
Presence ......................................................................................... 61
Passive Surveillance....................................................................... 62
Known Knowns, Known Unknowns, and Unknown
Unknowns ....................................................................................... 63
Anthrometrics: Web Metrics IRL ................................................... 65
A Jewelry Case in Point ................................................................. 66
Breathing the Data Exhaust ........................................................... 67
CHAPTER 7 What Can Mobile Do for Me?.............................................. 69
What’s in It for Me? ........................................................................ 69
Real-Time Situational Awareness ................................................. 70
Small Business............................................................................... 71
Multilocation Businesses ............................................................... 71
Property Management.................................................................... 72
Contents ix
INDEX ...........................................................................................................221
This page intentionally left blank
About the Author
Steve Van Till is the cofounder, president, and CEO of Brivo Systems, a pioneer-
ing cloud services provider of access control, video surveillance, mobile, and
identity solutions delivered as a SaaS offering. He also served since 2011 as
chairman of the Standards Committee of the Security Industry Association.
He is a frequent author and speaker for numerous security publications and
forums and the inventor of numerous patents in the field of physical security.
In 2009, Steve was honored by Security Magazine as one of “the top 25 most
influential people in the security industry.”
Mr. Van Till was previously Director of Internet consulting for Sapient Corpo-
ration, where he led client strategy engagements for the first wave of the dot-
com era. At the health-care informatics company HCIA, Steve was responsible
for Internet strategy for data analytics services. Steve also has over 10 years’
experience in wireless communications as Vice President of software develop-
ment at GeoStar and as Director of Systems Engineering at Communications
Satellite Corporation (Comsat).
Steve lives in Fulton, Maryland, with his wife, Robin.
xiii
This page intentionally left blank
Preface
We are fortunate to be living in one of the most exciting times in the history of
modern technology. Dozens of technological currents have converged and
amplified and remixed with each other to accelerate the pace of innovation
beyond anything mankind has ever seen. We are simultaneously living in a time
when physical security—or, more to the point, lapses in physical security—has
become a regular and unfortunate part of the daily news. But physical security is
no longer just physical. Modern security systems are now thoroughly cyber-phys-
ical systems, which means that they have inherited both the power and the pit-
falls of the digital world.
The past 30 years have witnessed many major technology explosions that have
changed the way we interact with each other and our world. Millions gained
their first computing experience during the PC era. The Internet—with a little
help from some friends—coalesced these individual computing experiences
into the collective experience of social networks that have the potential to con-
nect every person on the planet. The smartphone then assured that we didn’t
have to leave home without it. And now, before our eyes, we are watching
the rise of the Internet of things, along with the big data and analytic systems
necessary to make sense of the unprecedented volumes of data they create.
Physical security is right in the middle of these upheavals. It is being trans-
formed by the five technological forces that have become the signature change
agents of our era: cloud, mobile, IoT, big data, and social networks. How and
where these changes are taking place, as well as the effects they will have on the
practice and business of security, are the subjects of this book.
The technology adoption life cycle is a widely used framework for understand-
ing the acceptance of new technologies, and it fits the change we are witnessing
across the physical security market. The life cycle consists of five stages of adop-
tion. The so-called “innovators” and “early adopters” and “early majority” are
at the front end, while the “late majority” and “laggards” take up the rear.
xv
xvi Preface
When I venture to observe to industry insiders that the physical security indus-
try has generally fallen in the middle of the adoption pack—somewhere
between the early and late majority—most of them remark that I might be a
little too generous. The industry is slower than that, they say. The languid adop-
tion rate of Internet Protocol (IP) technology is a case in point, where security
products were late to the game by a good 10 years compared with our brethren
in IT. More recently, for a market shift as major as cloud computing, the indus-
try has been just barely in front of the laggards. Need proof? Contrast the cur-
rent sub-five-percent cloud adoption rate in commercial security with the
eighty-plus-percent adoption across the rest of the IT spectrum.
This circumspection isn’t all bad: customers know what to buy, producers know
what to make, and investors know where to place their bets.
But the playing field is changing. The five forces of technological transforma-
tion—cloud, mobile, IoT, big data, and social networks—have become too
strong to ignore, even in a context of cautious adoption. In combination, they
are producing security products that are vastly better than their forebears. In
combination, they are lowering the cost of entry for innovators. In combina-
tion, the historical barriers will not stand.
While the interplay and interdependence between the five forces are impossible
to ignore, this book is organized to examine each of these forces in turn. Nat-
urally, there is some crossover within each topic, but for the most part, you can
follow your interests along the lines of the five major sections.
In Section 1, we look at the current state of cloud computing in the physical
security industry and how it is disrupting the on-premise computing paradigm.
While the industry has always recognized the power of centralized computing
for alarm monitoring, it has been paradoxically slow to widen that stance for
cloud computing in general. By the same token, the subscription model of
software-as-a-service (SaaS) should have been a cinch for an industry that
has been largely structured around recurring revenue business models. Instead,
the inertia of perennial concerns about cloud security and reliability has damp-
ened the acceleration common across other markets. We’ll look at what’s hap-
pening next as fears subside, distribution models adapt, and new entrants
disrupt the status quo.
In Section 2, we look at how mobile technologies are changing security admin-
istration, the interaction between buildings and their occupants, and identity
and access management. As in almost every other software domain, the notion
of “mobile first” is changing the product priorities of security system developers
and changing the job description of practitioners from guards to CSOs. Previ-
ously constrained to the desktop, professionals who interact with modern elec-
tronic security systems are freed from their desks yet retain the same richness of
Preface xvii
data, command, and control. As every major security event reminds us, the
ubiquity and connectivity of mobile networks are an indispensable tool in
emergency response. On a less dramatic note, mobile is changing the customer
experience of employee, tenant, and guest interactions from an inconvenience
to a positive “customer interaction” opportunity for security organizations.
In Section 3, we see that the Internet of things (IoT) phenomenon finds one of
its most fertile fields of use in the physical security domain. That’s no surprise,
because conceptually, the electronic security industry has been using IoT since
well before it crested the current hype cycle. The largest contribution that IoT
will make to security is in the proliferation of sensors that add to the data avail-
able for decision-making. Even devices that are not formally a part of the secu-
rity system will generate “data exhaust” with security value we can all mine. But
along with this rise of available data, there will be a huge increase in the avail-
able attack surface to be exploited by hackers. The challenge for practitioners
will be to leverage these technologies while harnessing the data and protecting
both physical and network infrastructures.
In Section 4, smart data, the use of large scale data analysis is examined as an
up-and-coming tool in the future of security. But we are not there yet. While big
data has made huge inroads in fields from medicine to physics to retail behav-
ior and stock market analysis, it has been curiously absent from the physical
security domain. The delayed adoption of cloud computing has been a major
impediment in this regard, because it is the platform on which big data systems
naturally flourish. Instead, what we find across the electronic security landscape
is an archipelago of millions of small systems that each keep their data separate
from the others, thereby thwarting large scale analysis.
In Section 5, social networking technologies are viewed as an example of how
identity and access management (IAM) is moving onto new platforms. Using
the organizing principle of “social spaces,” we identify how social technologies
will impact the physical security domain. The use of social log-ins, previously
confined to accessing virtual spaces such as web sites, is becoming available as a
means to authenticate ourselves to real physical spaces. This works because
social identities are a unique identifier that can replace the many tokens we
carry around for each individual space we interact with today. Currently used
by billions of people, social networks may also prove to be a valuable commu-
nication channel to enhance the practice of security. With the networks in
place, crowdsourcing may become a way to harness the power of the crowd
for participatory security.
In closing, we look at adoption rates for each technology and what these
changes might mean to the future of the physical security. The consumerization
of commercial security is a thread that runs through many of the anticipated
xviii Preface
A book never has just one author, because experience is the author of every-
thing, and it’s a large stage with many players.
First, I thank my wife Robin, who quietly supported me through the many
weekends of foregone social plans, the 4:00 a.m. daily writing regimen, and
my almost constant obsession with “the book” over these past 2 years.
I offer special thanks to Bob Fealy—an investor, a mentor, and, most impor-
tantly, a friend. While Bob was the president of Duchossois Technology Part-
ners, he was among the first to understand the vision of Internet-enabled
devices improving life for millions of people. His ongoing support and advice
were critical to the growth of the company that took me on this journey, as I am
sure they are to the many others he has advised.
I would also like to thank the cofounders of Brivo—Carter, Mark, and Tim—for
convincing me to leave my day job to create a successful dot-com company and
live to tell about it.
And I thank all employees of Brivo—present and past—for the part of your-
selves that you contributed to the success of this story and for your help in
changing an industry.
xix
Another random document with
no related content on Scribd:
Zeph. ii. 4;
Zech. ix.
5, 7
ELAH, Valley 1 Sam. xvii. Wâdy es Sŭnt 14 The scene of the
of 2, 19; xxi. conflict and
(R.V. ELAH, 9 death of Goliath.
Vale of, ‘or Now called
Terebinth’) Wâdy es Sŭnt,
which passes
Shocoh and
Gath
immediately on
the north. (Mem.
III.; Sh. XVII.)
ETAM, The Judg. xv. 8 Beit ʾAtâb (?)* 14 The rocky top on
Rock which Beit ʾAtâb
stands, west of
Bethlehem.
(Mem. III. 83;
Sh. XVII.)—
Conder.
ETHAM Exod. xiii. Not identified — One of the
20; Num. stations of the
xxxiii. 6 Israelites ‘on the
edge of the
wilderness.’
ETHER Josh. xv. Kh. el ʾAtr (?)* 10 Probably the ruin
42; xix. 7; el ʾAtr, near Beit
1 Chr. iv. Jibrin, allotted to
32 Simeon. (Mem.
III. 261; Sh. XX.)
—Conder.
ETHIOPIA Gen. ii. 13; — Named ‘Cush’ by
2 Kings the Hebrews,
xix. 9; and ‘Aithiopia’ by
Esth. i. 1; the Greeks.
viii. 9; Job Æthiopia
xxviii. 19; embraced
Ps. lxviii. Nubia, Sennaar,
31; lxxxvii. Kordofan, and
4; Isa. Northern
xviii. 1; xx. Abyssinia. The
3, 5; name Cush,
xxxvii. 9; however, in
xliii. 3; xlv. some cases, if
14; Ezek. not in all, applies
xxix. 10; to part of
xxx. 4, 5; Western Asia
xxxviii. 5; south of the
Nah. iii. 9; Caspian—the
Zeph. iii. country of the
10; 1 Esd. Kassi or
iii. 2; Cosseans.
Judith i.
10; Esth.
xiii. 1; xvi.
1; Acts viii.
27
EUPHRATES, Gen. ii. 14; —
River xv. 18;
Deut. i. 7;
xi. 24;
Josh. i. 4;
2 Sam.
viii. 3; 2
Kings xxiii.
29; xxiv. 7;
1 Chr. v. 9;
xviii. 3; 2
Chr. xxxv.
20; Jer.
xiii. 4–7;
xlvi. 2, 6,
10; li. 63;
1 Esd. i.
25, 27; 2
Esd. xiii.
43; Judith
i. 6; ii. 24;
Eccles.
xxiv. 26; 1
Macc. iii.
32, 37
EZEL, Stone 1 Sam. xx. Not identified — A ‘stone’ or
of, 19 ‘mound,’ the
or (R.V., margin, scene of David
Mound of) and Jonathan’s
parting.
EZEM 1 Chr. iv. 29 — See Azem.
EZION-GABER Num. xxxiii. Not identified — The last camping
or GEBER 35, 36; station of the
Deut. ii. 8; Israelites before
1 Kings ix. entering the
26; xxii. wilderness of
48; 2 Chr. Zin, which is
viii. 17; xx. Kadesh. ‘King
36 Solomon made a
navy of ships in
Ezion-geber,
which is beside
Eloth, on the
shore of the Red
Sea, in the land
of Edom’ (1
Kings ix. 25). In
the
neighbourhood
of ʾAkabah.
GAASH, Mount Josh. xxiv. Not identified — In ‘Mount
of 30; Judg. Ephraim,’ near
(R.V. Mountain ii. 9; 2 ‘Timnath-serah.’
of) Sam. xxiii. In Samuel and
30; 1 Chr. Chronicles
xi. 32 rendered
‘Brooks of
Gaash.’