The five technological forces disrupting security: how cloud, social, mobile, big data and iot are t

Page 1


Undying: A Hellequin Universe Novella Steve Mchugh

https://ebookmass.com/product/undying-a-hellequin-universe-novellasteve-mchugh/

ebookmass.com

Coral Reef Rescue Coral Ripley

https://ebookmass.com/product/coral-reef-rescue-coral-ripley/

ebookmass.com

Basic Principles and Calculations in Chemical Engineering, 9th Ed. 9th Edition David Himmelblau & James Riggs

https://ebookmass.com/product/basic-principles-and-calculations-inchemical-engineering-9th-ed-9th-edition-david-himmelblau-james-riggs/

ebookmass.com

Biology in focus. Year 12 2nd edition. Edition Sarah Jones

https://ebookmass.com/product/biology-in-focus-year-12-2nd-editionedition-sarah-jones/

ebookmass.com

Calling on Quinn Blue Saffire

https://ebookmass.com/product/calling-on-quinn-blue-saffire/

ebookmass.com

TheFiveTechnological ForcesDisruptingSecurity

CHAPTER17 SocialSavesLives..............................................................191

VirtualSocialMediaWorkingGroup............................................192 TheUnitedNations.......................................................................192 SocialMediaforEmergencyManagement(#SMEM)..................193 PowerShift...................................................................................193

NotYourKid’sSocialMedia.........................................................195

CHAPTER18 OntheInternet,NoOneKnowsYou’reaDog..................197 IdentityasaService.....................................................................198 WhatIsanIdentityStandard?......................................................199 AuthenticationvsAuthorization...................................................199 AuthenticationStandards.............................................................200

CHAPTER19 SocialSpaces.....................................................................203 WhatDoesitMeantobeaSocialSpace?...................................204 It’sAllAboutIdentity....................................................................206 CommunicationandCrowdsourcing............................................206 SecurityasaCustomerExperience.............................................207 Disruption.....................................................................................208 Strategy.........................................................................................209

Section6TheFuture

CHAPTER20 TheSecretsoftheUniverse..............................................213 AdoptionScorecard......................................................................214 MyGeneration...............................................................................218 ANewMissionforSecurity..........................................................219 WhatGoesAroundComesAround..............................................219

AbouttheAuthor

SteveVanTillisthecofounder,president,andCEOofBrivoSystems,apioneeringcloudservicesproviderofaccesscontrol,videosurveillance,mobile,and identitysolutionsdeliveredasaSaaSoffering.Healsoservedsince2011as chairmanoftheStandardsCommitteeoftheSecurityIndustryAssociation. Heisafrequentauthorandspeakerfornumeroussecuritypublicationsand forumsandtheinventorofnumerouspatentsinthefieldofphysicalsecurity. In2009,StevewashonoredbySecurityMagazineasoneof“thetop25most influentialpeopleinthesecurityindustry.”

Mr.VanTillwaspreviouslyDirectorofInternetconsultingforSapientCorporation,whereheledclientstrategyengagementsforthefirstwaveofthedotcomera.Atthehealth-careinformaticscompanyHCIA,Stevewasresponsible forInternetstrategyfordataanalyticsservices.Stevealsohasover10years’ experienceinwirelesscommunicationsasVicePresidentofsoftwaredevelopmentatGeoStarandasDirectorofSystemsEngineeringatCommunications SatelliteCorporation(Comsat).

StevelivesinFulton,Maryland,withhiswife,Robin.

data,command,andcontrol.Aseverymajorsecurityeventremindsus,the ubiquityandconnectivityofmobilenetworksareanindispensabletoolin emergencyresponse.Onalessdramaticnote,mobileischangingthecustomer experienceofemployee,tenant,andguestinteractionsfromaninconvenience toapositive“customerinteraction”opportunityforsecurityorganizations.

InSection3,weseethattheInternetofthings(IoT)phenomenonfindsoneof itsmostfertilefieldsofuseinthephysicalsecuritydomain.That’snosurprise, becauseconceptually,theelectronicsecurityindustryhasbeenusingIoTsince wellbeforeitcrestedthecurrenthypecycle.ThelargestcontributionthatIoT willmaketosecurityisintheproliferationofsensorsthataddtothedataavailablefordecision-making.Evendevicesthatarenotformallyapartofthesecuritysystemwillgenerate“dataexhaust”withsecurityvaluewecanallmine.But alongwiththisriseofavailabledata,therewillbeahugeincreaseintheavailableattacksurfacetobeexploitedbyhackers.Thechallengeforpractitioners willbetoleveragethesetechnologieswhileharnessingthedataandprotecting bothphysicalandnetworkinfrastructures.

InSection4,smartdata,theuseoflargescaledataanalysisisexaminedasan up-and-comingtoolinthefutureofsecurity.Butwearenotthereyet.Whilebig datahasmadehugeinroadsinfieldsfrommedicinetophysicstoretailbehaviorandstockmarketanalysis,ithasbeencuriouslyabsentfromthephysical securitydomain.Thedelayedadoptionofcloudcomputinghasbeenamajor impedimentinthisregard,becauseitistheplatformonwhichbigdatasystems naturallyflourish.Instead,whatwefindacrosstheelectronicsecuritylandscape isanarchipelagoofmillionsofsmallsystemsthateachkeeptheirdataseparate fromtheothers,therebythwartinglargescaleanalysis.

InSection5,socialnetworkingtechnologiesareviewedasanexampleofhow identityandaccessmanagement(IAM)ismovingontonewplatforms.Using theorganizingprincipleof“socialspaces,”weidentifyhowsocialtechnologies willimpactthephysicalsecuritydomain.Theuseofsociallog-ins,previously confinedtoaccessingvirtualspacessuchaswebsites,isbecomingavailableasa meanstoauthenticateourselvestorealphysicalspaces.Thisworksbecause socialidentitiesareauniqueidentifierthatcanreplacethemanytokenswe carryaroundforeachindividualspaceweinteractwithtoday.Currentlyused bybillionsofpeople,socialnetworksmayalsoprovetobeavaluablecommunicationchanneltoenhancethepracticeofsecurity.Withthenetworksin place,crowdsourcingmaybecomeawaytoharnessthepowerofthecrowd forparticipatorysecurity.

Inclosing,welookatadoptionratesforeachtechnologyandwhatthese changesmightmeantothefutureofthephysicalsecurity.Theconsumerization ofcommercialsecurityisathreadthatrunsthroughmanyoftheanticipated

FromPackagestoPeople

ThestoryofhowIcametolearnaboutthefivebigforcestransformingsecurity startsoffinanunlikelyplace.Thesummerof1999inNewYorkCitywasoneof thehottestonrecordinacentury.MyfellowentrepreneursandIhadback-tobackinvestormeetingsalldaytosecurefundingforournewdot-com.

AswesloggedalongtheradiatingManhattansidewalksinourbusinesssuits, Ifantasizedaboutjumpinginfrontofthegiantsprinklerstheyhookuptofire hydrantsondayslikethat.Theair-conditionedlobbiesofferedarespiteof10or 15minuteswherewetriedtobecomehumanagainbeforeannouncingourselvestoournexthost.Ourlastmeetingofthedaycouldn’tcomesoonenough. Wepitchedourthen-novelbusinessmodelofane-commerceserviceforautomaticallyreplenishingconsumableproductslikediapersandcleaningproducts,commoditiespeopleneededeveryweekoreverymonth.Unlikethe upsanddownsofordinaryconsumerdemand,thisbusinesswouldprovide apredictablerevenuestreammonthinandmonthout,deliveringtheinvestor catnipknownasrecurringmonthlyrevenue(RMR).

Earliermeetingstaughtusthateveryinvestorwantedtoknowhowwewould physicallysecurethisstreamofperpetualproductsagainstthetwintidesof crimeandvandalism.Asoneinvestorputit,“it’sfinetodeliverthingstopeople’sdoorsteps,butonlyiftheystaythere.Nobodywantsrecurringdeliveriesto becomerecurringthefts.”

Toanswerthisrecurringquestion,wehadalreadysketchedoutacrude,backof-the-envelopedrawingofadishwasher-sizedconnectedappliancewherewe dubbedthe“SmartBox.”Thedesignwasahybridofasafeandanoversized mailbox,withelectronicaccesscontroltyingitbacktoacentraldatabase. Dynamically,assignedkeypadcodes—credentialsinsecurity-speak—would provideaccesscontrolforitsfrontdoor.Thecentralwebsystemwouldassign credentialstopeoplewhowereauthorizedtoputthingsinortakethingsout: deliverycompanies,homeowners,familymembers,orperhapsevenaneighbor pickingupaborroweditem.Theentirecostoftheproduct—hardwareand

ongoingaccessmanagement—wouldbebundledintoamonthlysubscription plan,justlikecellphones.

Afterourlongwaitintheornateconferenceroom,asingleharriedbankerbarged inlookinglikehe’dalreadyheardenoughpitchesforoneday—orperhapsan entirelifetime.Theprofessionalskepticismwaspalpable.Wewereinthemiddle ofthedot-comboom,andideasforonlinebusinesseswereadimeadozen.

Wetookhimthroughourpitchdeckalittlefasterthanusual.Likemostinvestors,hewasconcernedaboutsecurity,packagetheft,whowouldhaveaccess, andhowitwouldbemanaged.Asifforthefirsttime,weunfurledoursketch oftheSmartBoxontotheconferenceroomtable.Itoldhimitwouldprovide physicalsecuritywithasteelframeandinformationsecuritywithdigitalsignaturesandencryption.BecauseitwasconnectedtotheInternet,italsoservedasa remotelogisticsensorthatprovidedstatusupdatesaboutpackagedeliveries andaccesseventsviae-mailortext.

“Soit’salsoaninformationservice,”Iexplained.“Wethinkthatwillhelpmake itstickybecausepeopleliketoknowwhat’sgoingon.”

Withthat,hewasdone.Runningahandthroughaheadfulofsilverhair,alittle exasperatedperhaps,heleanedforwardandtookanotherlookatourrough sketch.Hisnextwordschangedthecourseofourprofessionallivesandultimatelythecourseofphysicalsecurity.

“Youre-commerceideaisstupid.Noone’sgoingtowantthat”—Icanhear Amazonlaughingfromhere—“Butyour box now that’s somethingIwould beinterestedin.”

Thatmomentmarksthebirthofthefirstconnecteddevicedesignedtoprovidesecureaccesscontrolfromamultitenantsoftware-as-a-service(SaaS) platform.Thedeviceitselfwasnobiggerthanalargedishwasherorsmall washingmachine,butithadadoorandacontrolpanelandanInternetconnection.Doesthatsoundfamiliar?Itsh ould.Commercialofficebuildingsare equippedthesameway.Thedot-combusttookitstollonouroriginalideafor consumerlogistics,butwithsomegoodadvicefrominvestors,wewereableto pivotthetechnologyandbusinessmodeltocommercialaccesscontrol.After all,abuildingisreallyjustabigbox,andeveryoneofthemcannowbea smartbox.

Butthisisn’tabookaboutthecompanythatinventedtheSmartBox,norisit aboutthatconnectedappliance,exceptasavividexampleofthefiveprimary forcestransformingphysicalsecurity.Ittookmedownmyownpathwayinto cloud,mobility,Internetofthings(IoT),bigdata,andultimatelysocialnetworksappliedtoasecurityproblem.Moreimportantly,itisanillustration ofhowinnovationintheconsumerproductsegmentcandrivecommercial

productdesign.Itexplainswhysecuritytechnologynowlooksalotmorelike consumertechnologythaneverbefore.Itshowshowwecanexpectourindustrytoevolve.

Wesetouttoprotectpackages;wewoundupprotectingpeople.

THECONSUMERIZATIONOFSECURITY

TheevolutionoftheSmartBoxintoanaccesscontrolsystemprovidesbotha hopefulandcautionarytaletotheentiresecurityindustry.Hopefulbecause innovationisalwayswelcome;cautionarybecauseyouneverknowwhereor whenorhowdisruptionwillappear.Commercialsecurityisarelativelysmall industry,servinghighlyspecializedverticalmarkets.Untilrecently,thethought ofconsumerproductsinfiltratingthesemarketswasnotespeciallyworrisome. Newsecurityproductsdon’tusuallycomeoutofleftfieldanddisruptthismarketthewaythatsmartphonesdidtocamerasortheclouddidtoenterprisecomputing.ButIexpectwewillbeseeingmoreofit.Isaythatassomeonewhowas partofdoingjustthat,ifonlybypureserendipity.

EmergingIoTproductsinresidentialautomationandsecurityhaveshownthat theycandoabetterjobatalowercostthanmanylegacysystemsdesignedyears ago.Nosurprisethere,justthesteadymarchofnewtechnologyreplacingold. Evenso,virtuallyeveryindustryhasatribalcomplacencythatsays“itcan’thappentous.”Andyet,foreveryoneofthem,wecanfindabundantexamplesto showthatanythingandeverythingcanbedisrupted:healthcare,automobiles, energy,insurance,investing,andlodging.Evensuchindeliblyphysicalenterprisesastaxisandtransportationarenotimmune,asamplydemonstrated byUber,Lyft,andothers.

TheconsumerizationofITdescribestheeffectofnewtechnologyemerginginthe consumermarketandthenmovingintotheworkplace.Foremployeeswho wouldratherusetheirmorehighlyevolvedpersonalelectronicsthanaging, company-issuedrelicsarethecarriersofthistrend.Alloftheseproductssuch assmartphones,tablets,andmobileappsthensetthebarforthetoolsusedin aprofessionalsetting,andthecyclebeginsanotherround.Intheshortspanof timesincewebandmobilebecameawayoflife,wehaveseenthistimeandagain. Consumertechnologyexperiencesriseexpectationsforworkplacetechnology, andtheinnovatorswhoareabletoclearthenewbarcomeoutwinners.Userinterfacesonbusinessproducts,forexample,havetrackedthedesigninsightsandconventionsthatfirstappearedinconsumerapplications.Tabletsforworkandplay areoneandthesame.Consumerpopularitydrivesprofessionaladoption.

Thedebttoconsumertechnologygoesfarbeyondwhat’svisibletooureyesor clickablebyourthumbs:itgoesrighttothecoreofwhat’spossible.Wewould

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.