The role of IT in securing publicly accessible locations
Converging IT and physical security
As successful vaccination programs signal increasing freedoms across Europe, sports and music events, clubs, coffee shops, bars and other publicly accessible locations are once again opening up and welcoming patrons back. Yet, while Covid remains an ongoing challenge, it is the potential for terrorist activity that makes it increasingly necessary for event organizers to take a firmer stand in relation to the physical security of their sites. In May 2017, a terrorist detonated a bomb as people were leaving the Manchester Arena in the UK following a concert, killing 23 and injuring hundreds, while in February 2020, eleven people were killed and five others wounded in a terrorist shooting which targeted two bars in Hanau, Germany. Now, as increasing public gatherings present a prime opportunity for terrorist attacks, such sites need to be thoroughly protected.
Rodrigue Zbinden is CEO at Morphean SA.
Where CCTV would traditionally have played a role in protecting premises, assets and people, this dated analogue technology is no longer fit for purpose in the modern fight against criminal and terrorist activity. Far removed from standalone legacy cameras and manually-operated access control barriers, today’s cloud-enabled solutions, including network video cameras and access control devices, utilize IoT connectivity to provide comprehensive cover of any site. Such technology, capable of advanced levels of analysis and detection can play a key role in saving time and lives.
The future of events security is in the cloud
Video surveillance as-a-service (VSaaS) and access control as-a-service (ACaaS) enable cameras and sensors to be added to a network as IoT devices, bringing them to life as a vital component in an event security strategy. The data from these devices is passed through an analytics engine, where key insights are produced. Behavioral analytics can support teams in the detection of anomalous activity, including the leaving of bags or objects on site. Instant alerts can be delivered to security personnel via mobile device, resulting in immediate response and enabling preventative measures to be taken sooner. The security system can also trigger site evacuation procedures in response to a threat, whereby building management systems can lock down certain areas while using directional lighting and announcements via network audio speakers to guide event attendees to the safest exit.
A range of sensors can be employed for advanced explosion, breaking glass or gunshot detection, while access control devices ensure that only authorized attendees, operations staff and security personnel are admitted on-site. The addition of number plate recognition analytics can identify suspicious vehicle patterns, revealing those that have had their number plates changed, or have been detected near the site on numerous occasions in the run-up to an event. The system facilitates the swift packaging of video evidence from across the site, which can be sent to an alarm receiving center (ARC), security personnel and the police within minutes. Thinking and acting quickly, and utilizing technology to analyze data, provide vital insights and automate response sequences will dramatically accelerate security teams’ ability to get an incident under control and save many lives.
Converging security for better protection
A key challenge to enable VCaaS and ACaaS to become an effective part of event security will be to close the gap between the worlds of cybersecurity and physical security. IT teams are well versed in the security of software and systems, but need to have an extensive knowledge around the use of physical security technology to make more informed decisions on selection and installation. Similarly, the traditional security installer, well versed in all aspects of physical security will need to better understand the language of IT.
The divide between IT and physical security can create barriers that threaten to slow or stop the adoption of these technologies, depriving businesses of their many benefits. Cloud infrastructure, the IoT and network connectivity are all key components of hosted physical security. It is therefore essential that the physical security installer and IT professional increasingly combine knowledge and resources, to present an overarching security system that is capable of covering high levels of physical security while also keeping in mind the cyber security of systems and networks too.
It is imperative that everyone involved with a site knows their responsibilities in guarding against a potential attack, with thorough training being essential to help staff know how to spot the warning signs. Security and operations teams, backed by VSaaS and ACaaS can feel confident that they have a highly responsive data-driven system in place that will allow them to save crucial seconds in dealing with any incident or threat. Through coming together as part of a joined-up effort, IT and physical security professionals can play a major role in securing events big or small and ensuring a safer and more enjoyable experience for all.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Rodrigue Zbinden is CEO at Morphean SA.