Undying: A Hellequin Universe Novella Steve Mchugh
https://ebookmass.com/product/undying-a-hellequin-universe-novellasteve-mchugh/
ebookmass.com
Coral Reef Rescue Coral Ripley
https://ebookmass.com/product/coral-reef-rescue-coral-ripley/
ebookmass.com
Basic Principles and Calculations in Chemical Engineering, 9th Ed. 9th Edition David Himmelblau & James Riggs
https://ebookmass.com/product/basic-principles-and-calculations-inchemical-engineering-9th-ed-9th-edition-david-himmelblau-james-riggs/
ebookmass.com
Biology in focus. Year 12 2nd edition. Edition Sarah Jones
https://ebookmass.com/product/biology-in-focus-year-12-2nd-editionedition-sarah-jones/
ebookmass.com
Calling on Quinn Blue Saffire
https://ebookmass.com/product/calling-on-quinn-blue-saffire/
ebookmass.com
TheFiveTechnological ForcesDisruptingSecurity
CHAPTER17 SocialSavesLives..............................................................191
VirtualSocialMediaWorkingGroup............................................192 TheUnitedNations.......................................................................192 SocialMediaforEmergencyManagement(#SMEM)..................193 PowerShift...................................................................................193
NotYourKid’sSocialMedia.........................................................195
CHAPTER18 OntheInternet,NoOneKnowsYou’reaDog..................197 IdentityasaService.....................................................................198 WhatIsanIdentityStandard?......................................................199 AuthenticationvsAuthorization...................................................199 AuthenticationStandards.............................................................200
CHAPTER19 SocialSpaces.....................................................................203 WhatDoesitMeantobeaSocialSpace?...................................204 It’sAllAboutIdentity....................................................................206 CommunicationandCrowdsourcing............................................206 SecurityasaCustomerExperience.............................................207 Disruption.....................................................................................208 Strategy.........................................................................................209
Section6TheFuture
CHAPTER20 TheSecretsoftheUniverse..............................................213 AdoptionScorecard......................................................................214 MyGeneration...............................................................................218 ANewMissionforSecurity..........................................................219 WhatGoesAroundComesAround..............................................219
AbouttheAuthor
SteveVanTillisthecofounder,president,andCEOofBrivoSystems,apioneeringcloudservicesproviderofaccesscontrol,videosurveillance,mobile,and identitysolutionsdeliveredasaSaaSoffering.Healsoservedsince2011as chairmanoftheStandardsCommitteeoftheSecurityIndustryAssociation. Heisafrequentauthorandspeakerfornumeroussecuritypublicationsand forumsandtheinventorofnumerouspatentsinthefieldofphysicalsecurity. In2009,StevewashonoredbySecurityMagazineasoneof“thetop25most influentialpeopleinthesecurityindustry.”
Mr.VanTillwaspreviouslyDirectorofInternetconsultingforSapientCorporation,whereheledclientstrategyengagementsforthefirstwaveofthedotcomera.Atthehealth-careinformaticscompanyHCIA,Stevewasresponsible forInternetstrategyfordataanalyticsservices.Stevealsohasover10years’ experienceinwirelesscommunicationsasVicePresidentofsoftwaredevelopmentatGeoStarandasDirectorofSystemsEngineeringatCommunications SatelliteCorporation(Comsat).
StevelivesinFulton,Maryland,withhiswife,Robin.
data,command,andcontrol.Aseverymajorsecurityeventremindsus,the ubiquityandconnectivityofmobilenetworksareanindispensabletoolin emergencyresponse.Onalessdramaticnote,mobileischangingthecustomer experienceofemployee,tenant,andguestinteractionsfromaninconvenience toapositive“customerinteraction”opportunityforsecurityorganizations.
InSection3,weseethattheInternetofthings(IoT)phenomenonfindsoneof itsmostfertilefieldsofuseinthephysicalsecuritydomain.That’snosurprise, becauseconceptually,theelectronicsecurityindustryhasbeenusingIoTsince wellbeforeitcrestedthecurrenthypecycle.ThelargestcontributionthatIoT willmaketosecurityisintheproliferationofsensorsthataddtothedataavailablefordecision-making.Evendevicesthatarenotformallyapartofthesecuritysystemwillgenerate“dataexhaust”withsecurityvaluewecanallmine.But alongwiththisriseofavailabledata,therewillbeahugeincreaseintheavailableattacksurfacetobeexploitedbyhackers.Thechallengeforpractitioners willbetoleveragethesetechnologieswhileharnessingthedataandprotecting bothphysicalandnetworkinfrastructures.
InSection4,smartdata,theuseoflargescaledataanalysisisexaminedasan up-and-comingtoolinthefutureofsecurity.Butwearenotthereyet.Whilebig datahasmadehugeinroadsinfieldsfrommedicinetophysicstoretailbehaviorandstockmarketanalysis,ithasbeencuriouslyabsentfromthephysical securitydomain.Thedelayedadoptionofcloudcomputinghasbeenamajor impedimentinthisregard,becauseitistheplatformonwhichbigdatasystems naturallyflourish.Instead,whatwefindacrosstheelectronicsecuritylandscape isanarchipelagoofmillionsofsmallsystemsthateachkeeptheirdataseparate fromtheothers,therebythwartinglargescaleanalysis.
InSection5,socialnetworkingtechnologiesareviewedasanexampleofhow identityandaccessmanagement(IAM)ismovingontonewplatforms.Using theorganizingprincipleof“socialspaces,”weidentifyhowsocialtechnologies willimpactthephysicalsecuritydomain.Theuseofsociallog-ins,previously confinedtoaccessingvirtualspacessuchaswebsites,isbecomingavailableasa meanstoauthenticateourselvestorealphysicalspaces.Thisworksbecause socialidentitiesareauniqueidentifierthatcanreplacethemanytokenswe carryaroundforeachindividualspaceweinteractwithtoday.Currentlyused bybillionsofpeople,socialnetworksmayalsoprovetobeavaluablecommunicationchanneltoenhancethepracticeofsecurity.Withthenetworksin place,crowdsourcingmaybecomeawaytoharnessthepowerofthecrowd forparticipatorysecurity.
Inclosing,welookatadoptionratesforeachtechnologyandwhatthese changesmightmeantothefutureofthephysicalsecurity.Theconsumerization ofcommercialsecurityisathreadthatrunsthroughmanyoftheanticipated
FromPackagestoPeople
ThestoryofhowIcametolearnaboutthefivebigforcestransformingsecurity startsoffinanunlikelyplace.Thesummerof1999inNewYorkCitywasoneof thehottestonrecordinacentury.MyfellowentrepreneursandIhadback-tobackinvestormeetingsalldaytosecurefundingforournewdot-com.
AswesloggedalongtheradiatingManhattansidewalksinourbusinesssuits, Ifantasizedaboutjumpinginfrontofthegiantsprinklerstheyhookuptofire hydrantsondayslikethat.Theair-conditionedlobbiesofferedarespiteof10or 15minuteswherewetriedtobecomehumanagainbeforeannouncingourselvestoournexthost.Ourlastmeetingofthedaycouldn’tcomesoonenough. Wepitchedourthen-novelbusinessmodelofane-commerceserviceforautomaticallyreplenishingconsumableproductslikediapersandcleaningproducts,commoditiespeopleneededeveryweekoreverymonth.Unlikethe upsanddownsofordinaryconsumerdemand,thisbusinesswouldprovide apredictablerevenuestreammonthinandmonthout,deliveringtheinvestor catnipknownasrecurringmonthlyrevenue(RMR).
Earliermeetingstaughtusthateveryinvestorwantedtoknowhowwewould physicallysecurethisstreamofperpetualproductsagainstthetwintidesof crimeandvandalism.Asoneinvestorputit,“it’sfinetodeliverthingstopeople’sdoorsteps,butonlyiftheystaythere.Nobodywantsrecurringdeliveriesto becomerecurringthefts.”
Toanswerthisrecurringquestion,wehadalreadysketchedoutacrude,backof-the-envelopedrawingofadishwasher-sizedconnectedappliancewherewe dubbedthe“SmartBox.”Thedesignwasahybridofasafeandanoversized mailbox,withelectronicaccesscontroltyingitbacktoacentraldatabase. Dynamically,assignedkeypadcodes—credentialsinsecurity-speak—would provideaccesscontrolforitsfrontdoor.Thecentralwebsystemwouldassign credentialstopeoplewhowereauthorizedtoputthingsinortakethingsout: deliverycompanies,homeowners,familymembers,orperhapsevenaneighbor pickingupaborroweditem.Theentirecostoftheproduct—hardwareand
ongoingaccessmanagement—wouldbebundledintoamonthlysubscription plan,justlikecellphones.
Afterourlongwaitintheornateconferenceroom,asingleharriedbankerbarged inlookinglikehe’dalreadyheardenoughpitchesforoneday—orperhapsan entirelifetime.Theprofessionalskepticismwaspalpable.Wewereinthemiddle ofthedot-comboom,andideasforonlinebusinesseswereadimeadozen.
Wetookhimthroughourpitchdeckalittlefasterthanusual.Likemostinvestors,hewasconcernedaboutsecurity,packagetheft,whowouldhaveaccess, andhowitwouldbemanaged.Asifforthefirsttime,weunfurledoursketch oftheSmartBoxontotheconferenceroomtable.Itoldhimitwouldprovide physicalsecuritywithasteelframeandinformationsecuritywithdigitalsignaturesandencryption.BecauseitwasconnectedtotheInternet,italsoservedasa remotelogisticsensorthatprovidedstatusupdatesaboutpackagedeliveries andaccesseventsviae-mailortext.
“Soit’salsoaninformationservice,”Iexplained.“Wethinkthatwillhelpmake itstickybecausepeopleliketoknowwhat’sgoingon.”
Withthat,hewasdone.Runningahandthroughaheadfulofsilverhair,alittle exasperatedperhaps,heleanedforwardandtookanotherlookatourrough sketch.Hisnextwordschangedthecourseofourprofessionallivesandultimatelythecourseofphysicalsecurity.
“Youre-commerceideaisstupid.Noone’sgoingtowantthat”—Icanhear Amazonlaughingfromhere—“Butyour box now that’s somethingIwould beinterestedin.”
Thatmomentmarksthebirthofthefirstconnecteddevicedesignedtoprovidesecureaccesscontrolfromamultitenantsoftware-as-a-service(SaaS) platform.Thedeviceitselfwasnobiggerthanalargedishwasherorsmall washingmachine,butithadadoorandacontrolpanelandanInternetconnection.Doesthatsoundfamiliar?Itsh ould.Commercialofficebuildingsare equippedthesameway.Thedot-combusttookitstollonouroriginalideafor consumerlogistics,butwithsomegoodadvicefrominvestors,wewereableto pivotthetechnologyandbusinessmodeltocommercialaccesscontrol.After all,abuildingisreallyjustabigbox,andeveryoneofthemcannowbea smartbox.
Butthisisn’tabookaboutthecompanythatinventedtheSmartBox,norisit aboutthatconnectedappliance,exceptasavividexampleofthefiveprimary forcestransformingphysicalsecurity.Ittookmedownmyownpathwayinto cloud,mobility,Internetofthings(IoT),bigdata,andultimatelysocialnetworksappliedtoasecurityproblem.Moreimportantly,itisanillustration ofhowinnovationintheconsumerproductsegmentcandrivecommercial
productdesign.Itexplainswhysecuritytechnologynowlooksalotmorelike consumertechnologythaneverbefore.Itshowshowwecanexpectourindustrytoevolve.
Wesetouttoprotectpackages;wewoundupprotectingpeople.
THECONSUMERIZATIONOFSECURITY
TheevolutionoftheSmartBoxintoanaccesscontrolsystemprovidesbotha hopefulandcautionarytaletotheentiresecurityindustry.Hopefulbecause innovationisalwayswelcome;cautionarybecauseyouneverknowwhereor whenorhowdisruptionwillappear.Commercialsecurityisarelativelysmall industry,servinghighlyspecializedverticalmarkets.Untilrecently,thethought ofconsumerproductsinfiltratingthesemarketswasnotespeciallyworrisome. Newsecurityproductsdon’tusuallycomeoutofleftfieldanddisruptthismarketthewaythatsmartphonesdidtocamerasortheclouddidtoenterprisecomputing.ButIexpectwewillbeseeingmoreofit.Isaythatassomeonewhowas partofdoingjustthat,ifonlybypureserendipity.
EmergingIoTproductsinresidentialautomationandsecurityhaveshownthat theycandoabetterjobatalowercostthanmanylegacysystemsdesignedyears ago.Nosurprisethere,justthesteadymarchofnewtechnologyreplacingold. Evenso,virtuallyeveryindustryhasatribalcomplacencythatsays“itcan’thappentous.”Andyet,foreveryoneofthem,wecanfindabundantexamplesto showthatanythingandeverythingcanbedisrupted:healthcare,automobiles, energy,insurance,investing,andlodging.Evensuchindeliblyphysicalenterprisesastaxisandtransportationarenotimmune,asamplydemonstrated byUber,Lyft,andothers.
TheconsumerizationofITdescribestheeffectofnewtechnologyemerginginthe consumermarketandthenmovingintotheworkplace.Foremployeeswho wouldratherusetheirmorehighlyevolvedpersonalelectronicsthanaging, company-issuedrelicsarethecarriersofthistrend.Alloftheseproductssuch assmartphones,tablets,andmobileappsthensetthebarforthetoolsusedin aprofessionalsetting,andthecyclebeginsanotherround.Intheshortspanof timesincewebandmobilebecameawayoflife,wehaveseenthistimeandagain. Consumertechnologyexperiencesriseexpectationsforworkplacetechnology, andtheinnovatorswhoareabletoclearthenewbarcomeoutwinners.Userinterfacesonbusinessproducts,forexample,havetrackedthedesigninsightsandconventionsthatfirstappearedinconsumerapplications.Tabletsforworkandplay areoneandthesame.Consumerpopularitydrivesprofessionaladoption.
Thedebttoconsumertechnologygoesfarbeyondwhat’svisibletooureyesor clickablebyourthumbs:itgoesrighttothecoreofwhat’spossible.Wewould