Enabling Smart Security
What happens when you take security devices that are currently only used in stand-alone systems and connect them up via open standards-based protocols to be integrated into a much larger, all-encompassing technology grid? In short, they become smarter. Moving away from closed systems with proprietary standards, opening up and connecting devices to form smart technology grids, the Internet of Things (IoT) is reshaping security. This allows you to manage multiple and previously separate systems more effectively via a single pane of glass management console: be that surveillance cameras, door access controllers or loudspeakers.
Let’s take a look on how this can work out in real life.
Scenario #1: Unauthorized Card Trigger at an Office Building
It’s after hours, almost everyone has left for the day, and someone uses an unauthorized or blocked access card at a door of your office building. This “unauthorized card” event triggers a preset of a PTZ camera, which at once swings automatically to the corresponding door, zooming in. A pop-up window alarms the night watchman, who can respond without leaving his chair, by simply connecting to a phone at the door to talk to the person outside. Depending on the outcome, the watchman can decide to grant access or not.
Scenario #2: Protecting Remote Premises
At a chemical factory site, someone tries to enter the premises through the fence. The IP thermal camera detects it and signals a perimeter violation. This alarm-image can then be transferred either to the remote control center or to a remote security company. Without being physically at the site, the responsible operator can see and check what is happening. He can connect via SIP to the nearest IP horn loudspeaker and address the trespasser. In more than 80% of all cases, directly addressing and thus interrupting the intruder makes him take flight.
Scenario #3: Remote, 24/7 Warehouse Access Control
After the close of the business day at the warehouse, a supplier’s truck arrives at the gate. In order to gain access the driver connects with the warehouse manager via an IP station. After business hours, all calls from the station are automatically forwarded to the mobile phone of the on-call warehouse manager via the company’s telephone system. Via an app the system can also establish visual contact with the driver so that the warehouse manager can visually check if the driver is known. In this case, the warehouse manager can transmit a code via DTMF (Dual-tone multi-frequency), authorizing the IP station to open the gate. Remotely, the warehouse manager can now initiate all necessary further steps to grant access to the driver. Furthermore he can monitor what is going on afterwards via the IP cameras installed on the premises and in the warehouse.
These are just a few, relatively simple scenarios which are very much achievable today. As the lines between physical and digital security continue to blur, the opportunity to not only use the IoT to create operational efficiencies, but to increase the effectiveness of security, will grow even further.