SlideShare a Scribd company logo
Confidential. © 2017 SDI Presence LLC.
SDI PRESENCE
Conference Recap
The SDI Team reports from the ISC West conference,
including industry trends, new technologies and security market observations.
advisory services. technology delivery. managed services.
www.sdipresence.com
2
ISC West 2017 – Takeaways from a Systems
Integrator Perspective
SDI plays an active role in the physical
security industry, from participating in
industry events such as ISC West to our
daily interactions with our security
clients and partner network.
SDI participates at ISC West
with a systems integrator perspective to identify meaningful trends and value-
add products and tools for our clients and projects.
Whether you were in attendance at the ISC West conference or not, please
find our following takeaways to assist you with keeping your organization up
to speed with industry developments.
- The SDI Team
SDI Contributors: Christopher Payne and Don Zoufal
3
Topics Addressed at ISC West
The current hot topics covered at ISC West included:
• Video Technologies
• Access Control Systems
• Multi-Sensor Technology
• Analytics Technology
• Robotics and Autonomous Technologies
• Cybersecurity
• Wearable Technologies
ISC West participants drilled into each of these topic areas, and the application of a
range of technologies to address security and operations concerns.
4
As you read on, consider…
Introducing a new technology deployment into a large enterprise
requires an broad view in the early stages in order to reduce risk and
ensure stakeholder satisfaction, states SDI SVP and security industry
SME Chris Payne. Some initial questions to contemplate, as you
consider some of ISCWest’s technologies for your organization:
Are you ready to take advantage of advanced technology?
• Cost
• Impact on operations
• Risks
What are the first steps?
• Needs Assessment
• ConOps
• Product Selection
What are the critical success factors?
Can your current IT environment support increase in demand and through put?
• Network
• Data Storage
• Support
5
Video
• Most of the premier video management vendors are now offering access
control management.
• There is a lot of interest in facial recognition, but no one vendor has
cornered the market.
• Video Compression Solutions (i.e.: h.265, Smart Compression h.264):
As the trend for higher resolution cameras continues, compression solutions
are a necessity to accommodate storage and bandwidth capacity.
• VMS platforms (and camera manufacturers) are stepping up the quality of
their analytics (facial recognition, search engines etc.): Most VMS
manufacturers are providing state of the art analytics. The need for a third
party analytic solution that integrates with a VMS will be unnecessary –
except for very specialized needs.
6
Access Control
• Most traditional access control vendors are migrating to an open
hardware architecture
• Multi Media Readers (MMR) – or Bluetooth readers:
Multiple vendors were showcasing their ability to utilize Bluetooth
technology with mobile phones. Is the use of a standard access
control card headed towards a thing of the past?
7
Multi-Sensor Technology
With the digitization of a growing number of systems and with advances in computing
power to access and utilize those devices, sensor arrays are multiplying in the security
space. Camera platforms are being joined by a range of other sensor devices:
• One example of advancing sensor technology is audio sensors – technologies that
identify, locate, and monitor sound. These technologies can be used in
conjunction with camera systems to alarm operators, so that attention can be
focused in specific areas. In fact, some cameras are coming equipped with sound
detection technology. These sensors can alert to sounds like gunfire, breaking
glass, and even angry voices.
• Another example of multisensory arrays growing in popularity is smart lighting.
These arrays allow area lighting to be combined with an array of sensors and other
technologies including cameras, motion detection sensors, sound detection
sensors, public address technologies, and even digital signage. These new multi-
sensor arrays afford safety and security professionals with a range of tools that
enhance their ability to understand their operational environments, guide
response activities, and even communicate with individuals in affected areas.
8
Multi-Sensor Technology
The array of sensors is augmented by the growing realization of sensor data already in
the environment.
The Internet of Things—devices in the environment that are already generating data
– further enhance the ability of security professionals to better understand their
environment. Middleware and integration tools allow this sensor data to be used
with traditional security technologies placed in the environment.
The combination can allow for an exponential increase in information for use in
security operations.
9
As the sensor arrays grow and more data is available to safety and security professionals,
there is an increasing need for assistance in making sense of all that data. To meet that
need, there is growing suites of products that can apply analytics to sensor data. These
analytics platforms help relate differing sensor platforms to provide operators with alerts
and alarms regarding to specified items or actions in designated area of interest.
• The application of analytics is not just occurring at the center of security networks; it
is also happening at the device-level, on the periphery. For example, there are
growing numbers of cameras that are equipped with analytic technologies. These
smart devices can be used at the edge to send data only when certain criteria are met
(e.g. someone entering a designated area; someone loitering in an area; and/or the
presence of an object or an item that that has been abandoned).
• The application of analytics to sensor technology makes the use of sensors more
efficient and effective. They allow for the collection of more data and reduce sensory
overload by operators. While oftentimes the sensitivity of analytics must be adjusted
to reduce false positive results, analytic technologies are becoming increasingly
effective. They also power a growing shift of security technology that is largely
reactive to technology that can be predictive.
Analytics Technology
10
Wearable Technologies
As a corollary to the expanding sensor universe, there is a growing realization
that those sensors can be applied to the humans themselves. In the public law
enforcement sector, there is strong movement to provide body cameras to
officers to enhance accountability and operational transparency. While these
systems are principally forensic in nature at the current time, there is increasing
interest in the ability of these systems to provide real-time data.
• Taking a cue from public sector law enforcement, there is also growing
interest in the private security industry to utilize wearable camera technology.
These cameras can assist in documenting employee conduct during critical
incidents and can serve to improve employee conduct. As real-time use
becomes possible, these systems will offer an opportunity for enhancing the
ability to control response and officer safety.
• Cameras are just one aspect of the wearables revolution. Ability to sensor
things like heart rate, temperature and other vital factors – as well as
providing positioning data – make wearable sensors extremely valuable.
These tools can be used to monitor a range of employee activity, including
health and wellness.
11
Robotics and Autonomous Technologies
The development of robotics and autonomous technology for security operations
continues to provide an interesting path forward for security operations. Robotics are
becoming an increasing presence both on the ground and in the sky. Surface and aerial
vehicles equipped with sensors can be managed by operators, but here is a growing
development of autonomous capabilities for operation.
• The rapidly growing field of drones was well on display for review by security
professionals at ISC West. Drone aircraft equipped with cameras, thermal imaging
capabilities and range of other sensors are growing in both availability and
sophistication. These unmanned aircraft can be equipped and utilized for a range of
security and public safety operations: general area surveillance, search and rescue,
and support functions like providing communication hotspots or delivering supplies.
• Of course, the presence of drones raises the issue of defense against improper use.
Surveillance by individuals looking to cause harm is a real threat. There is also the
growing threat of weaponized drone usage. These threats have spawned a nascent
but growing industry of anti-drone technology.
12
Robotics and Autonomous Technologies
In addition to the aerial drones, there is a growing field of land based unmanned
vehicles for use in surveillance. These robotic technologies – previously relegated
largely to extremely dangerous tasks like analyzing abandoned items for explosives
– are now being expanded to a range of other uses. Robotic vehicles equipped
with cameras and other sensors are now being used to conduct routine patrols of
perimeter areas.
Robots equipped with autonomous technology have been deployed for routine
patrol in areas including shopping malls, hospital campuses, parking lots and
warehouses. These robots can perform observe and report functions previously
reserved for human assets. As autonomous technology continues to be perfected,
the utility of this type of repost will increase.
13
Cybersecurity
One final burgeoning field at the ISC West show was product and vendor attention to
cyber threats and vulnerability. On display were both products and services to assist
safety and security professionals in maintaining a more safe and secure cyber
environment. Just as security technology devices are powered by and operated in
virtual environments, the security of those environments becomes increasingly critical.
• The attention to all matters cyber at the show demonstrates that both cyber
threats and cyber vulnerabilities are growing. As more systems utilize the efficiency
and effectiveness of the virtual environment, systems become increasingly
vulnerable to hacking and cyber-attack. Securing these systems requires both
internal and external efforts.
• As physical security products are being developed, data encryption to protect data
is becoming increasingly important. There is also increasing focus on the
transmission and receipt of encrypted data. Services and products for network
monitoring to identify vulnerabilities and detect and defeat threats were also
readily on display. Additionally, services for cyber threat assessment and cyber
security training were also in abundance.
14
Cybersecurity
The proliferation of cyber security solutions at ISC West and in the physical security
market is a testament to the growing importance of considering cybersecurity as part
of an overall security program.
Working with integrators to assess an organization’s cyber hygiene and develop plans
to harden networks against cyber threats is becoming an matter of increasing
importance. Ample tools and solutions exist to assist in that endeavor.
15
Conclusions
The use of technology to address a range of safety and security problems
remains strong among security professionals.
The growing complexity of these systems – and the value derived from achieving
their harmonious use – makes integration services increasingly important.
Integrated sensor and operational platforms are a continuing challenge for
security professionals.
16
Additional Reading
The SDI Team presented several sessions at ISCWest 2017. Please find the
presentations below for further review:
E-Pluribus-Unum-Harnessing-Traditional-and-SoMoLo-Social-Mobile-Location-
Technology-for-Better-Situational-Awareness
The-Real-Force-Awakens-Mutli-sensor-Data-Analysis-for-Predictive-Safety-and-
Security
Sailing-the-Sea-of-Video-Surveillance-Data-Approaches-to-Navigating-Policy-
Development
Please contact SDI directly to discuss how we may assist your organization with
any of the topics in this presentation:
Christopher Payne, SDI Senior Vice President
Direct: 312.590.6868
cpayne@sdipresence.com
Mission-critical systems integrator SDI delivers intelligent technology solutions to
ensure operational performance, security and revenue generation. Addressing the
higher technical requirements of today’s advanced security systems, SDI offers a
hybrid security and IT skill set that significantly reduces risks and optimizes
performance when integrating security technology into enterprise environments. The
firm’s IT engineers are adept in addressing typical CIO concerns about network
utilization, cybersecurity, and overall risk mitigation related to the deployment of
logical and physical security systems such as PSIM, access control, and enterprise
digital video surveillance. SDI’s client portfolio includes some of the nation’s largest
airports, commercial real estate portfolios and national banks and financial services
organizations.
Call SDI for integrated security technology systems and services:
IT Program Management
Security Concept of Operations
Enterprise Systems Architecture /Integration
Hybrid/Hyper-Converged infrastructure
Cybersecurity
Command Center Technology Design/Build Outs
Security IT Managed Services Programs
Digital Video Surveillance/ Analytics
Access Control, Biometrics
Identity Management
Dispatch/Incident Management
PSIM/Event Management
Alarm/Perimeter Intrusion Detection
888-YOUR SDI (888-968-7734) sdipresence.com SDI Presence @sdipresence
18
SDI PRESENCE LLC
33 West Monroe, Suite 400
Chicago, IL 60603
312.580.7500 phone
888.968.7734 toll free
The views and opinions expressed in this article are those of the authors and do not necessarily reflect the
official policy or position of SDI Presence LLC. Any content provided by our authors are of their opinion, and
are not intended to malign any organization, company, individual or anyone or anything.
The information contained in this document is for general information purposes only. We make no
representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability,
suitability or availability with respect to the information, products, services, or related graphics contained herein
for any purpose. Any reliance you place on such information is therefore strictly at your own risk.
Although the information herein is intended to be current and accurate, the information presented may not
reflect the most current developments in the field of security. These materials may be changed, improved, or
updated without notice.
Copyright © SDI PRESENCE LLC. All Rights Reserved.

More Related Content

PPTX
Smart surveillance
PDF
Internet of things_by_economides_keynote_speech_at_ccit2014_final
PDF
Tigerspike - Cybersecurity and Mobility in the Energy Industry
PDF
Industrial Internet of Things in a Box
PDF
Security and Privacy Issues in IoT Environment
PDF
Unmanned aerial vehicle smart device ground control station cyber security th...
PDF
IRJET- A Survey of Security Issues in Internet of Things
PDF
IOT product assignment 2021
Smart surveillance
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Industrial Internet of Things in a Box
Security and Privacy Issues in IoT Environment
Unmanned aerial vehicle smart device ground control station cyber security th...
IRJET- A Survey of Security Issues in Internet of Things
IOT product assignment 2021

What's hot (20)

PDF
Eurosmart etsi-e-io t-scs-presentation
PDF
Cyber physical systems and robotics
PDF
Implementation of-a-motion-detection-system
PPTX
IoT security presented in Ada's List Conference
PDF
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
PDF
Wireless Security on Context (disponible en español)
PDF
IoT Security Elements
PDF
CyCron 2016
PDF
John kingsley OT ICS SCADA Cyber security consultant
PDF
IoT Security Challenges and Solutions
PDF
Encapsulating Complexity in IoT Solutions
PDF
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
PDF
Cps sec sg sg2017 conf_iran
PDF
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
PDF
IoT: Security & Privacy at IGNITE 2015
PDF
Internet of Things with Wearable Devices at Enterprise Radar
PPTX
The intersection of cool mobility and corporate protection
PDF
White Paper - Tracking Assets and Workers in Construction
PDF
Cybersecurity for Field IIoT Networks
PDF
Medical & Healthcare IoT M2M Solutions
Eurosmart etsi-e-io t-scs-presentation
Cyber physical systems and robotics
Implementation of-a-motion-detection-system
IoT security presented in Ada's List Conference
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
Wireless Security on Context (disponible en español)
IoT Security Elements
CyCron 2016
John kingsley OT ICS SCADA Cyber security consultant
IoT Security Challenges and Solutions
Encapsulating Complexity in IoT Solutions
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Cps sec sg sg2017 conf_iran
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
IoT: Security & Privacy at IGNITE 2015
Internet of Things with Wearable Devices at Enterprise Radar
The intersection of cool mobility and corporate protection
White Paper - Tracking Assets and Workers in Construction
Cybersecurity for Field IIoT Networks
Medical & Healthcare IoT M2M Solutions
Ad

Similar to SDI @ISCWest 2017: A Systems Integrator Perspective (20)

PDF
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdf
PDF
White paper surveillancepointmarket
PDF
Video Surveillance Software Market size.pdf
PDF
ebroch_ici_secure_improve_protect_a4h_en_2210_hi.pdf
PDF
Video Surveillance Equipment and Services Market Growth Factors and Future Tr...
PDF
Broucher Soft copy
PDF
The Invisible Eye
PDF
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
PPTX
Nozomi-Networks-Corporate-Overview-Deck-2025.pptx
PDF
SCMR.Wearables
PDF
IAM for mobile and BYOD
PDF
How Security Apps Are Improving the Monitoring of Everyday Environmens.pdf
PDF
How Security Apps Are Improving the Monitoring of Everyday Environmens.pdf
PDF
Bolstering the security of iiot applications – how to go about it
PPTX
Eye, Wrist, Body … Where Is the Wearables Market Headed?
PPTX
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
PDF
4 video surveillance technology trends 2021
DOCX
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
PPTX
UNIT 1 Nan mudhalvan how tofaefjlnajlncjlanjlcnajknfjkanjkfnajnfj
PDF
Supply Chain Security and Compliance for Embedded Devices & IoT
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdf
White paper surveillancepointmarket
Video Surveillance Software Market size.pdf
ebroch_ici_secure_improve_protect_a4h_en_2210_hi.pdf
Video Surveillance Equipment and Services Market Growth Factors and Future Tr...
Broucher Soft copy
The Invisible Eye
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Nozomi-Networks-Corporate-Overview-Deck-2025.pptx
SCMR.Wearables
IAM for mobile and BYOD
How Security Apps Are Improving the Monitoring of Everyday Environmens.pdf
How Security Apps Are Improving the Monitoring of Everyday Environmens.pdf
Bolstering the security of iiot applications – how to go about it
Eye, Wrist, Body … Where Is the Wearables Market Headed?
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
4 video surveillance technology trends 2021
R E G U L A R P A P E RUser-centric privacy awareness in v.docx
UNIT 1 Nan mudhalvan how tofaefjlnajlncjlanjlcnajknfjkanjkfnajnfj
Supply Chain Security and Compliance for Embedded Devices & IoT
Ad

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
cuic standard and advanced reporting.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
Teaching material agriculture food technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Big Data Technologies - Introduction.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Approach and Philosophy of On baking technology
The AUB Centre for AI in Media Proposal.docx
Review of recent advances in non-invasive hemoglobin estimation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Empathic Computing: Creating Shared Understanding
NewMind AI Monthly Chronicles - July 2025
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
cuic standard and advanced reporting.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Teaching material agriculture food technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Encapsulation theory and applications.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Big Data Technologies - Introduction.pptx
A Presentation on Artificial Intelligence
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25 Week I
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Approach and Philosophy of On baking technology

SDI @ISCWest 2017: A Systems Integrator Perspective

  • 1. Confidential. © 2017 SDI Presence LLC. SDI PRESENCE Conference Recap The SDI Team reports from the ISC West conference, including industry trends, new technologies and security market observations. advisory services. technology delivery. managed services. www.sdipresence.com
  • 2. 2 ISC West 2017 – Takeaways from a Systems Integrator Perspective SDI plays an active role in the physical security industry, from participating in industry events such as ISC West to our daily interactions with our security clients and partner network. SDI participates at ISC West with a systems integrator perspective to identify meaningful trends and value- add products and tools for our clients and projects. Whether you were in attendance at the ISC West conference or not, please find our following takeaways to assist you with keeping your organization up to speed with industry developments. - The SDI Team SDI Contributors: Christopher Payne and Don Zoufal
  • 3. 3 Topics Addressed at ISC West The current hot topics covered at ISC West included: • Video Technologies • Access Control Systems • Multi-Sensor Technology • Analytics Technology • Robotics and Autonomous Technologies • Cybersecurity • Wearable Technologies ISC West participants drilled into each of these topic areas, and the application of a range of technologies to address security and operations concerns.
  • 4. 4 As you read on, consider… Introducing a new technology deployment into a large enterprise requires an broad view in the early stages in order to reduce risk and ensure stakeholder satisfaction, states SDI SVP and security industry SME Chris Payne. Some initial questions to contemplate, as you consider some of ISCWest’s technologies for your organization: Are you ready to take advantage of advanced technology? • Cost • Impact on operations • Risks What are the first steps? • Needs Assessment • ConOps • Product Selection What are the critical success factors? Can your current IT environment support increase in demand and through put? • Network • Data Storage • Support
  • 5. 5 Video • Most of the premier video management vendors are now offering access control management. • There is a lot of interest in facial recognition, but no one vendor has cornered the market. • Video Compression Solutions (i.e.: h.265, Smart Compression h.264): As the trend for higher resolution cameras continues, compression solutions are a necessity to accommodate storage and bandwidth capacity. • VMS platforms (and camera manufacturers) are stepping up the quality of their analytics (facial recognition, search engines etc.): Most VMS manufacturers are providing state of the art analytics. The need for a third party analytic solution that integrates with a VMS will be unnecessary – except for very specialized needs.
  • 6. 6 Access Control • Most traditional access control vendors are migrating to an open hardware architecture • Multi Media Readers (MMR) – or Bluetooth readers: Multiple vendors were showcasing their ability to utilize Bluetooth technology with mobile phones. Is the use of a standard access control card headed towards a thing of the past?
  • 7. 7 Multi-Sensor Technology With the digitization of a growing number of systems and with advances in computing power to access and utilize those devices, sensor arrays are multiplying in the security space. Camera platforms are being joined by a range of other sensor devices: • One example of advancing sensor technology is audio sensors – technologies that identify, locate, and monitor sound. These technologies can be used in conjunction with camera systems to alarm operators, so that attention can be focused in specific areas. In fact, some cameras are coming equipped with sound detection technology. These sensors can alert to sounds like gunfire, breaking glass, and even angry voices. • Another example of multisensory arrays growing in popularity is smart lighting. These arrays allow area lighting to be combined with an array of sensors and other technologies including cameras, motion detection sensors, sound detection sensors, public address technologies, and even digital signage. These new multi- sensor arrays afford safety and security professionals with a range of tools that enhance their ability to understand their operational environments, guide response activities, and even communicate with individuals in affected areas.
  • 8. 8 Multi-Sensor Technology The array of sensors is augmented by the growing realization of sensor data already in the environment. The Internet of Things—devices in the environment that are already generating data – further enhance the ability of security professionals to better understand their environment. Middleware and integration tools allow this sensor data to be used with traditional security technologies placed in the environment. The combination can allow for an exponential increase in information for use in security operations.
  • 9. 9 As the sensor arrays grow and more data is available to safety and security professionals, there is an increasing need for assistance in making sense of all that data. To meet that need, there is growing suites of products that can apply analytics to sensor data. These analytics platforms help relate differing sensor platforms to provide operators with alerts and alarms regarding to specified items or actions in designated area of interest. • The application of analytics is not just occurring at the center of security networks; it is also happening at the device-level, on the periphery. For example, there are growing numbers of cameras that are equipped with analytic technologies. These smart devices can be used at the edge to send data only when certain criteria are met (e.g. someone entering a designated area; someone loitering in an area; and/or the presence of an object or an item that that has been abandoned). • The application of analytics to sensor technology makes the use of sensors more efficient and effective. They allow for the collection of more data and reduce sensory overload by operators. While oftentimes the sensitivity of analytics must be adjusted to reduce false positive results, analytic technologies are becoming increasingly effective. They also power a growing shift of security technology that is largely reactive to technology that can be predictive. Analytics Technology
  • 10. 10 Wearable Technologies As a corollary to the expanding sensor universe, there is a growing realization that those sensors can be applied to the humans themselves. In the public law enforcement sector, there is strong movement to provide body cameras to officers to enhance accountability and operational transparency. While these systems are principally forensic in nature at the current time, there is increasing interest in the ability of these systems to provide real-time data. • Taking a cue from public sector law enforcement, there is also growing interest in the private security industry to utilize wearable camera technology. These cameras can assist in documenting employee conduct during critical incidents and can serve to improve employee conduct. As real-time use becomes possible, these systems will offer an opportunity for enhancing the ability to control response and officer safety. • Cameras are just one aspect of the wearables revolution. Ability to sensor things like heart rate, temperature and other vital factors – as well as providing positioning data – make wearable sensors extremely valuable. These tools can be used to monitor a range of employee activity, including health and wellness.
  • 11. 11 Robotics and Autonomous Technologies The development of robotics and autonomous technology for security operations continues to provide an interesting path forward for security operations. Robotics are becoming an increasing presence both on the ground and in the sky. Surface and aerial vehicles equipped with sensors can be managed by operators, but here is a growing development of autonomous capabilities for operation. • The rapidly growing field of drones was well on display for review by security professionals at ISC West. Drone aircraft equipped with cameras, thermal imaging capabilities and range of other sensors are growing in both availability and sophistication. These unmanned aircraft can be equipped and utilized for a range of security and public safety operations: general area surveillance, search and rescue, and support functions like providing communication hotspots or delivering supplies. • Of course, the presence of drones raises the issue of defense against improper use. Surveillance by individuals looking to cause harm is a real threat. There is also the growing threat of weaponized drone usage. These threats have spawned a nascent but growing industry of anti-drone technology.
  • 12. 12 Robotics and Autonomous Technologies In addition to the aerial drones, there is a growing field of land based unmanned vehicles for use in surveillance. These robotic technologies – previously relegated largely to extremely dangerous tasks like analyzing abandoned items for explosives – are now being expanded to a range of other uses. Robotic vehicles equipped with cameras and other sensors are now being used to conduct routine patrols of perimeter areas. Robots equipped with autonomous technology have been deployed for routine patrol in areas including shopping malls, hospital campuses, parking lots and warehouses. These robots can perform observe and report functions previously reserved for human assets. As autonomous technology continues to be perfected, the utility of this type of repost will increase.
  • 13. 13 Cybersecurity One final burgeoning field at the ISC West show was product and vendor attention to cyber threats and vulnerability. On display were both products and services to assist safety and security professionals in maintaining a more safe and secure cyber environment. Just as security technology devices are powered by and operated in virtual environments, the security of those environments becomes increasingly critical. • The attention to all matters cyber at the show demonstrates that both cyber threats and cyber vulnerabilities are growing. As more systems utilize the efficiency and effectiveness of the virtual environment, systems become increasingly vulnerable to hacking and cyber-attack. Securing these systems requires both internal and external efforts. • As physical security products are being developed, data encryption to protect data is becoming increasingly important. There is also increasing focus on the transmission and receipt of encrypted data. Services and products for network monitoring to identify vulnerabilities and detect and defeat threats were also readily on display. Additionally, services for cyber threat assessment and cyber security training were also in abundance.
  • 14. 14 Cybersecurity The proliferation of cyber security solutions at ISC West and in the physical security market is a testament to the growing importance of considering cybersecurity as part of an overall security program. Working with integrators to assess an organization’s cyber hygiene and develop plans to harden networks against cyber threats is becoming an matter of increasing importance. Ample tools and solutions exist to assist in that endeavor.
  • 15. 15 Conclusions The use of technology to address a range of safety and security problems remains strong among security professionals. The growing complexity of these systems – and the value derived from achieving their harmonious use – makes integration services increasingly important. Integrated sensor and operational platforms are a continuing challenge for security professionals.
  • 16. 16 Additional Reading The SDI Team presented several sessions at ISCWest 2017. Please find the presentations below for further review: E-Pluribus-Unum-Harnessing-Traditional-and-SoMoLo-Social-Mobile-Location- Technology-for-Better-Situational-Awareness The-Real-Force-Awakens-Mutli-sensor-Data-Analysis-for-Predictive-Safety-and- Security Sailing-the-Sea-of-Video-Surveillance-Data-Approaches-to-Navigating-Policy- Development Please contact SDI directly to discuss how we may assist your organization with any of the topics in this presentation: Christopher Payne, SDI Senior Vice President Direct: 312.590.6868 cpayne@sdipresence.com
  • 17. Mission-critical systems integrator SDI delivers intelligent technology solutions to ensure operational performance, security and revenue generation. Addressing the higher technical requirements of today’s advanced security systems, SDI offers a hybrid security and IT skill set that significantly reduces risks and optimizes performance when integrating security technology into enterprise environments. The firm’s IT engineers are adept in addressing typical CIO concerns about network utilization, cybersecurity, and overall risk mitigation related to the deployment of logical and physical security systems such as PSIM, access control, and enterprise digital video surveillance. SDI’s client portfolio includes some of the nation’s largest airports, commercial real estate portfolios and national banks and financial services organizations. Call SDI for integrated security technology systems and services: IT Program Management Security Concept of Operations Enterprise Systems Architecture /Integration Hybrid/Hyper-Converged infrastructure Cybersecurity Command Center Technology Design/Build Outs Security IT Managed Services Programs Digital Video Surveillance/ Analytics Access Control, Biometrics Identity Management Dispatch/Incident Management PSIM/Event Management Alarm/Perimeter Intrusion Detection 888-YOUR SDI (888-968-7734) sdipresence.com SDI Presence @sdipresence
  • 18. 18 SDI PRESENCE LLC 33 West Monroe, Suite 400 Chicago, IL 60603 312.580.7500 phone 888.968.7734 toll free The views and opinions expressed in this article are those of the authors and do not necessarily reflect the official policy or position of SDI Presence LLC. Any content provided by our authors are of their opinion, and are not intended to malign any organization, company, individual or anyone or anything. The information contained in this document is for general information purposes only. We make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the information, products, services, or related graphics contained herein for any purpose. Any reliance you place on such information is therefore strictly at your own risk. Although the information herein is intended to be current and accurate, the information presented may not reflect the most current developments in the field of security. These materials may be changed, improved, or updated without notice. Copyright © SDI PRESENCE LLC. All Rights Reserved.