The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age
()
About this ebook
The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age explores the major technological forces currently driving digital disruption in the security industry, and what they foretell for the future. The book provides a high-level perspective on how the industry is changing as a whole, as well as practical guidance on how to incorporate these new technologies to create better security solutions. It also examines key questions on how these new technologies have lowered barriers for new entrants in the field and how they are likely to change market dynamics and affect customer choices. Set in the context of one of the early dot.com companies to enter physical security, the narrative is written for professionals from Chief Security Officers and systems integrators to product managers and investors.
- Explores the five major technological forces driving digital change in commercial security
- Shows practitioners how to align security strategies with these inevitable changes
- Examines how the consumerization of security will change the vendor playing field
- Illustrates how security professionals can leverage these changes in their own careers
- Provides an adoption scorecard that ranks trends and timeline for impact
Steve Van Till
Steven Van Till is Co-Founder, President & CEO of Brivo, Inc. a pioneering cloud services provider of access control, video surveillance, mobile, and identity solutions delivered as a SaaS offering. He also serves as Chairman of the SIA Standards Committee, and is a frequent author and speaker for numerous security publications and forums, and the inventor of several patents in the field of physical security. In 2009, Steve was honored by Security Magazine as one of “The Top 25 Most Influential People in the Security Industry. Mr. Van Till was previously Director of Internet Consulting for Sapient Corporation, where he lead client strategy engagements for the first wave of the dot.com era. At the healthcare informatics company HCIA, Steve was responsible for Internet strategy for data analytics services. Steve also has more than 10 years of experience in wireless communications as Vice President of Software Development at Geostar, and as Director of Systems Engineering at Communications Satellite Corporation.
Related to The Five Technological Forces Disrupting Security
Related ebooks
Security Technology Convergence Insights Rating: 0 out of 5 stars0 ratingsCSA Guide to Cloud Computing: Implementing Cloud Privacy and Security Rating: 0 out of 5 stars0 ratingsFight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsManaging Online Risk: Apps, Mobile, and Social Media Security Rating: 0 out of 5 stars0 ratingsCyber Security and Policy: A substantive dialogue Rating: 0 out of 5 stars0 ratingsSecurity Leader Insights for Information Protection: Lessons and Strategies from Leading Security Professionals Rating: 0 out of 5 stars0 ratingsSecurity: The Human Factor Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 0 out of 5 stars0 ratingsCybersecurity: Issues of Today, a Path for Tomorrow Rating: 0 out of 5 stars0 ratingsZero Trust Networks with VMware NSX: Build Highly Secure Network Architectures for Your Data Centers Rating: 0 out of 5 stars0 ratingsIdentity Governance And Administration A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsZero Trust Security A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsA concise introduction to the NIS Directive: A pocket guide for digital service providers Rating: 0 out of 5 stars0 ratingsZero Trust A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCybersecurity Regulations A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsSecurity Convergence: Managing Enterprise Security Risk Rating: 0 out of 5 stars0 ratingsPrivacy 3.0: Unlocking Our Data-Driven Future Rating: 0 out of 5 stars0 ratingsIncident Response Analyst Second Edition Rating: 0 out of 5 stars0 ratingsInformation Security Officer A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsThe Four Questions Every Monitoring Engineer is Asked Rating: 0 out of 5 stars0 ratingsSecurity Operations Center A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsHardware Security: A Hands-on Learning Approach Rating: 0 out of 5 stars0 ratingsInnovation Never Stops: Innovation Generation – the Culture, Process, and Strategy Rating: 0 out of 5 stars0 ratingsConversations With Global Citizen Leaders Interviews with Men and Women in Global Leadership Positions Rating: 0 out of 5 stars0 ratingsStay Cyber Safe: What Every CEO Should Know About Cybersecurity Rating: 0 out of 5 stars0 ratingsNetwork Security A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsInsider Threat A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsTELECOM ORGANIZATIONS ADAPT IN A POST-COVID-19 REALITY Rating: 0 out of 5 stars0 ratingsCybersecurity Risk A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratings
Crime & Violence For You
The Madness of Crowds: Gender, Race and Identity Rating: 4 out of 5 stars4/5Chasing the Scream: The Inspiration for the Feature Film "The United States vs. Billie Holiday" Rating: 4 out of 5 stars4/5Dreamland: The True Tale of America's Opiate Epidemic Rating: 4 out of 5 stars4/5Gavin de Becker’s The Gift of Fear Survival Signals That Protect Us From Violence | Summary Rating: 4 out of 5 stars4/5Homicide: A Year on the Killing Streets Rating: 4 out of 5 stars4/5Ordinary Men: Reserve Police Battalion 101 and the Final Solution in Poland Rating: 4 out of 5 stars4/5No Visible Bruises: What We Don’t Know About Domestic Violence Can Kill Us Rating: 5 out of 5 stars5/5Evidence of Love: A True Story of Passion and Death in the Suburbs Rating: 4 out of 5 stars4/5The Devil You Know: Encounters in Forensic Psychiatry Rating: 4 out of 5 stars4/5Summary of The 33 Strategies of War: by Robert Greene - A Comprehensive Summary Rating: 0 out of 5 stars0 ratingsOn Killing: The Psychological Cost of Learning to Kill in War and Society Rating: 4 out of 5 stars4/5And The Mountains Echoed Rating: 2 out of 5 stars2/5Bloodbath Nation Rating: 3 out of 5 stars3/5Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5Whoever Fights Monsters: My Twenty Years Tracking Serial Killers for the FBI Rating: 4 out of 5 stars4/5Regarding the Pain of Others Rating: 4 out of 5 stars4/5Murder at McDonald's: The Killers Next Door Rating: 4 out of 5 stars4/5The Violent Abuse of Women: In 17th and 18th Century Britain Rating: 4 out of 5 stars4/5Tell Your Children: The Truth About Marijuana, Mental Illness, and Violence Rating: 3 out of 5 stars3/5Death Row, Texas: Inside the Execution Chamber Rating: 4 out of 5 stars4/5The Man from the Train: The Solving of a Century-Old Serial Killer Mystery Rating: 4 out of 5 stars4/5No Stone Unturned: The True Story of the World's Premier Forensic Investigators Rating: 4 out of 5 stars4/5Batman and Psychology: A Dark and Stormy Knight (2nd Edition) Rating: 0 out of 5 stars0 ratingsWorse Than Slavery Rating: 4 out of 5 stars4/5They Thought They Were Free: The Germans, 1933–45 Rating: 4 out of 5 stars4/5The Trial of Lizzie Borden Rating: 4 out of 5 stars4/5H. H. Holmes: The True History of the White City Devil Rating: 4 out of 5 stars4/5The Least of Us: True Tales of America and Hope in the Time of Fentanyl and Meth Rating: 4 out of 5 stars4/5Sleep, My Child, Forever: The Riveting True Story of a Mother Who Murdered Her Own Children Rating: 4 out of 5 stars4/5
Reviews for The Five Technological Forces Disrupting Security
0 ratings0 reviews
Book preview
The Five Technological Forces Disrupting Security - Steve Van Till
industry.
Chapter 1
From Packages to People
Abstract
The origins of many commercial security technologies may be found in consumer products that transitioned in whole or in part into the security domain. Once there, they may prove disruptive to existing technologies, business models, and entrenched industry players. There are five categories in which such disruption or transformation is occurring in physical security: cloud, mobile, social, Internet of things, and big data. While the main thrust of the argument is drawn from commercial security, comparisons are also made to advances in residential security systems. Technology adoption in physical security is analyzed using the framework of the familiar technology adoption life cycle, which characterizes new technology adoption across five standard stages.
Keywords
Consumerization; Disruption; Innovation; Cloud; Mobile; Social; Big data; Internet of things
The story of how I came to learn about the five big forces transforming security starts off in an unlikely place. The summer of 1999 in New York City was one of the hottest on record in a century. My fellow entrepreneurs and I had back-to-back investor meetings all day to secure funding for our new dot-com.
As we slogged along the radiating Manhattan sidewalks in our business suits, I fantasized about jumping in front of the giant sprinklers they hook up to fire hydrants on days like that. The air-conditioned lobbies offered a respite of 10 or 15 minutes where we tried to become human again before announcing ourselves to our next host. Our last meeting of the day couldn't come soon enough.
We pitched our then-novel business model of an e-commerce service for automatically replenishing consumable products like diapers and cleaning products, commodities people needed every week or every month. Unlike the ups and downs of ordinary consumer demand, this business would provide a predictable revenue stream month in and month out, delivering the investor catnip known as recurring monthly revenue (RMR).
Earlier meetings taught us that every investor wanted to know how we would physically secure this stream of perpetual products against the twin tides of crime and vandalism. As one investor put it, it's fine to deliver things to people's doorsteps, but only if they stay there. Nobody wants recurring deliveries to become recurring thefts.
To answer this recurring question, we had already sketched out a crude, back-of-the-envelope drawing of a dishwasher-sized connected appliance where we dubbed the SmartBox.
The design was a hybrid of a safe and an oversized mailbox, with electronic access control tying it back to a central database. Dynamically, assigned keypad codes—credentials in security-speak—would provide access control for its front door. The central web system would assign credentials to people who were authorized to put things in or take things out: delivery companies, homeowners, family members, or perhaps even a neighbor picking up a borrowed item. The entire cost of the product—hardware and ongoing access management—would be bundled into a monthly subscription plan, just like cell phones.
After our long wait in the ornate conference room, a single harried banker barged in looking like he'd already heard enough pitches for one day—or perhaps an entire lifetime. The professional skepticism was palpable. We were in the middle of the dot-com boom, and ideas for online businesses were a dime a dozen.
We took him through our pitch deck a little faster than usual. Like most investors, he was concerned about security, package theft, who would have access, and how it would be managed. As if for the first time, we unfurled our sketch of the SmartBox onto the conference room table. I told him it would provide physical security with a steel frame and information security with digital signatures and encryption. Because it was connected to the Internet, it also served as a remote logistic sensor that provided status updates about package deliveries and access events via e-mail or text.
So it's also an information service,
I explained. We think that will help make it sticky because people like to know what's going on.
With that, he was done. Running a hand through a headful of silver hair, a little exasperated perhaps, he leaned forward and took another look at our rough sketch. His next words changed the course of our professional lives and ultimately the course of physical security.
Your e-commerce idea is stupid. No one's going to want that
—I can hear Amazon laughing from here—"But your box…now that's something I would be interested in."
That moment marks the birth of the first connected device designed to provide secure access control from a multitenant software-as-a-service (SaaS) platform. The device itself was no bigger than a large dishwasher or small washing machine, but it had a door and a control panel and an Internet connection. Does that sound familiar? It should. Commercial office buildings are equipped the same way. The dot-com bust took its toll on our original idea for consumer logistics, but with some good advice from investors, we were able to pivot the technology and business model to commercial access control. After all, a building is really just a big box, and every one of them can now be a smart box.
But this isn't a book about the company that invented the SmartBox, nor is it about that connected appliance, except as a vivid example of the five primary forces transforming physical security. It took me down my own pathway into cloud, mobility, Internet of things (IoT), big data, and ultimately social networks applied to a security problem. More importantly, it is an illustration of how innovation in the consumer product segment can drive commercial product design. It explains why security technology now looks a lot more like consumer technology than ever before. It shows how we can expect our industry to evolve.
We set out to protect packages; we wound up protecting people.
The Consumerization of Security
The evolution of the SmartBox into an access control system provides both a hopeful and cautionary tale to the entire security industry. Hopeful because innovation is always welcome; cautionary because you never know where or when or how disruption will appear. Commercial security is a relatively small industry, serving highly specialized vertical markets. Until recently, the thought of consumer products infiltrating these markets was not especially worrisome. New security products don't usually come out of left field and disrupt this market the way that smartphones did to cameras or the cloud did to enterprise computing. But I expect we will be seeing more of it. I say that as someone who was part of doing just that, if only by pure serendipity.
Emerging IoT products in residential automation and security have shown that they can do a better job at a lower cost than many legacy systems designed years ago. No surprise there, just the steady march of new technology replacing old. Even so, virtually every industry has a tribal complacency that says it can't happen to us.
And yet, for every one of them, we can find abundant examples to show that anything and everything can be disrupted: health care, automobiles, energy, insurance, investing, and lodging. Even such indelibly physical enterprises as taxis and transportation are not immune, as amply demonstrated by Uber, Lyft, and others.
The consumerization of IT describes the effect of new technology emerging in the consumer market and then moving into the workplace. For employees who would rather use their more highly evolved personal electronics than aging, company-issued relics are the carriers of this trend. All of these products such as smartphones, tablets, and mobile apps then set the bar for the tools used in a professional setting, and the cycle begins another round. In the short span of time since web and mobile became a way of life, we have seen this time and again. Consumer technology experiences rise expectations for workplace technology, and the innovators who are able to clear the new bar come out winners. User interfaces on business products, for example, have tracked the design insights and conventions that first appeared in consumer applications. Tablets for work and play are one and the same. Consumer popularity drives professional adoption.
The debt to consumer technology goes far beyond what's visible to our eyes or clickable by our thumbs: it goes right to the core of what's possible. We would not have mobile credentials in security unless we first had mobile payments in the grocery store. We would not have mobile video unless we first had mobile gaming. We would not even have the broadband pipes for it, since the bandwidth needed for remote surveillance was first driven by consumer services like YouTube, Netflix, and