Why Social Media Is Key To Creating A Converged Security Platform

In today’s world, the power of social media is far reaching and significant, turning individuals into walking sources of data collection and information, with single messages or posts becoming accessible by anyone from anywhere within a matter of seconds. According to the annual Bank of America Trends in Consumer Mobility Report, 91 percent of U.S. consumers say their mobile phone is very important, just as important as their car (91 percent) and deodorant (91 percent), and significantly more important than television (76 percent) and coffee (60 percent).

When approaching safety and security, especially on a large scale, such as with enterprises, hospitals, special events or government campuses, many organizations look at the most obvious needs – physical security and cybersecurity – without considering a more converged approach that combines physical security monitoring along with IT. Even more surprising is that many organizations underestimate the power of using social media to track real-time security updates and events.

At Vidsys, we believe in implementing a converged platform that analyzes and correlates open source data with physical security data in order to provide a safe and secure environment. Below are a few of the advantages to this approach when handling emergency response situations

Faster

In the case of an incident, it is imperative to recognize the situation quickly so that the appropriate corrective actions can be implemented before it spins out of control. CSIM software makes this possible through an open architecture platform that integrates big data analytics tools, social media and other intelligence inputs to address both internal vulnerabilities and external threats. Quick access to the right data at the right time is key to addressing and resolving any situation.

Smarter

With CSIM, organizations can combine physical security with information technology to provide a more holistic evaluation of a security situation.  Sensor data, video data, identity and access data, GPS and geospatial data, and social media data are among the key sources of information from which to derive actionable intelligence. Formally integrating these previously disparate security aspects of the physical and IT components into a converged security environment is a natural evolution in our increasingly networked world.  This improved capability allows organizations to correlate data in a more efficient way.

Mobile

Mobile devices can also be thought of as sensors that can be leveraged in a security environment, enabling employees or social media users to both access and share data while also providing real-time, critical information. Employees can also send real-time updates to a larger group of people so that the closest responder to each group can act appropriately.

Actionable

A CSIM platform can convert both physical and open source data into meaningful and actionable information via business rules that correlate the data based on time, location, duration, frequency, and type. Financial losses due to a security incident can vary widely and it can be challenging to calculate in advance the financial impacts associated with loss of productivity, loss of customer business, legal fees and reputational damage.

Vidsys CSIM enabled a Fortune 50 company to maintain its security force head count even though it has doubled the size of its physical campus in the last five years. This company realized a 66% reduction in response time and a 50% reduction in false alarms from access control systems.  A major municipal transit agency using Vidsys CSIM saved millions of dollars by procuring security systems through a competitive bid process with multiple awards to multiple vendors. Vidsys CSIM’s open architecture enables end users to integrate multiple disparate systems from any brand, platform or device (such as social media) thereby increasing buying power and leverage on new projects.

As social media continues to grow and evolve, we are embracing these new capabilities and integrating them into our enterprise platform to create the best possible solutions to help our customers become safer, smarter, and more efficient.
Click here to request a demo to learn more about how social media can integrate with your physical security environment through Vidsys’ CSIM platform.

Vidsys Enterprise 2017 Announcement

Posted by Ted Kim

We are excited to announce the newest release of our Converged Security and Information Management (CSIM) software platform, Vidsys Enterprise 2017.  These updates include enhanced capabilities for supporting enterprise customers, such as an improved data visualization module to correlate open source and social media data, a business intelligence dashboard to provide both real-time and historic reporting data, and enhanced capabilities for supporting customers with multiple and distributed facility locations.    

As the market leader in Physical Security Information Management (PSIM), this new platform update extends our position as the leader in the burgeoning CSIM marketplace.  

The Vidsys Enterprise 2017 Platform includes three major enhancements to the software’s functionality:

  • Virtual Situation Management (VSM): The Virtual Situation Management solution gives customers the ability to better manage locations that are distributed locally, regionally, nationally and globally. VSM provides a consolidated, dashboard view of situations across multiple, independent Vidsys Enterprise servers, significantly improving reporting capabilities across all subsystem data.
  • Enterprise Data Visualization (EDV): The Enterprise Data Visualization dashboard allows for the receipt and correlation of risk data generated outside the customer’s environment to notify them of potential impact to their personnel, resources, facilities, and brand. The platform pulls and correlates data from open source technology and social media inputs.
  • Enterprise Business Intelligence (EBI): The Enterprise Business Intelligence tool allows customers to pull data through a single dashboard and create reports on the data that is created. This functionality is useful for end users to better understand the status of data points that are occurring within their environment. The enhanced reporting module is flexible and scalable to the end user, and provides customers the ability to utilize data for budgeting and resource allocation.

While security will continue to be a core functionality of our software platform, CSIM enables Vidsys to extend its capabilities beyond physical security by capturing and correlating data from multiple non-security systems as well. Customers can leverage the platform to support operations for a wide variety of applications, such as cybersecurity, manufacturing and supply-chain systems, and building management systems.

“The Vidsys Enterprise 2017 release represents a major milestone for the company as we continue to innovate and evolve our software beyond security to a virtualized services platform,” said James I. Chong, CEO of Vidsys. “Expanding IoT application requires enterprise organizations to manage data from a wide range of inputs. We are excited to continue our close partnership with our integrators and end-customers around the world who are extending our platform to deliver services of every kind, including Smart Security, Smart Transportation, Smart Buildings, and even Smart & Safe Cities.”

The new updates provide customers with enhanced global situational awareness capabilities and the ability to better manage situations across their enterprise from any location in the world. For many organizations, this is an essential element for effective global operations, as managing campuses across the globe requires the ability to process and correlate large amounts of data quickly in order to enable smarter and faster decisions in emergency situations.  A main component of these improvements is the Virtual Situation Management (VSM) dashboard feature, which provides a consolidated view of situations across multiple customer locations.  

In addition to the software version upgrades, we are also rolling out an updated pricing model tailored to businesses seeking a Software as a Service (SaaS) approach.  The SaaS pricing model alternative will allow Vidsys to better align its licensing and services with its customers’ procurement requirements.  

Through the Virtual Situation Management, Enterprise Data Visualization, and Enterprise Business Intelligence enhancements, as well as the new SaaS pricing model, Vidsys looks forward to helping its customers improve their functionality and efficiency, creating smarter cities and safer communities across the globe.

Vidsys Team Profile: Biking to Raise Awareness for Multiple Sclerosis

The BP MS 150 is a two-day fundraising bike ride organized by the National MS Society. The ride is the largest event of its kind in North America with 13,000 cyclists, 3,500 volunteers and countless spectators along the route and at the finish line in Austin. Last year’s BP MS 150 raised $20.3 million dollars, and in 2016, they are hoping to break that.

tony bike

Individuals, as well as many public and private companies form teams to raise funds and cycle. For example, a couple of Vidsys’ clients and partners, ExxonMobil and HPE, had teams who participated this year (see the full list here.) This year, I signed up as an individual racing on behalf of Vidsys to show our support.

People who ride in Bike MS may do so to support family members, friends, or coworkers who have been diagnosed with multiple sclerosis. But, there are also legions of participants who live—and ride—with the disease, despite challenges such as fatigue or weakness. The “I Ride with MS” program hosts Bike MS events like this one across the country, with the goal of raising financial support through donations as well as awareness about the disease.

This year, the second day was cancelled due to the severe weather that hit the Houston area, but we still managed to make the most out of the first day, finishing 90 miles of the 150 planned. Overall it was an awesome experience to enjoy the great outdoors and support those battling MS.bike map

Thank you to everyone from the Vidsys team and beyond who supported our ride over the weekend. If you are interested in getting involved or donating, visit the BP MS 150 website here to learn more.

About Tony

Tony Vazquez brings over 15 years of technical and customer engagement experience to his Vidsys role of VP Product Development & Integration. He manages key technology partner relationships and oversees all development and integration activities for Vidsys.  

 

Vidsys Nominated for Northern Virginia Tech Council Hot Ticket Awards

Vidsys is excited to announce that we have been nominated for the Northern Virginia Tech Council’s (NVTC) Hot Ticket Awards for 2016. NVTC is the largest technology council in the nation, serving 1,000 companies and organizations; including businesses from all sectors of the technology industry, service providers, universities, foreign embassies, non-profit organizations and government agencies.  The Hot Ticket Awards showcase the most innovative companies in the Greater Washington region’s tech community who have exhibited great vision as well as the ability to innovate, grow, and excel in their respective markets.

Taking place in June, the 2016 NVTC Hot Ticket Awards will combine the hottest companies and unbeatable networking with an exciting new element. For the first time, the awards will incorporate an online competition, with categories including Big Data and Analytics, Consumer and Enterprise, Cybersecurity and Safety, and Health IT and Wearables.

Vidsys was nominated in the Cybersecurity and Safety category for our innovative approach to physical security that has evolved to include the ability to address the needs of Information Technology and other market areas.  

While our PSIM solution has been used in a security context by Fortune 500 companies, municipalities, US and international governments, military agencies, and special events, it is increasingly being used to support business process needs such as in manufacturing, healthcare administration, property management, retail and many others.  Our platform’s ability to provide data correlation along with a visualization layer, makes our solution particularly well-suited to the explosive growth of IoT.  Our Converged Security and Information Management (CSIM) platform integrates data and events from cyber security, building management, utilities, supply chain management, social media and other IoT-based sensors. These capabilities position us in a new and more competitive technology area.

Voting opens June 6th and will stay open until June 9th. Click here to vote on The Washington Post!

We look forward to participating in this event and promoting the groundbreaking tech innovation happening in Northern Virginia and across the Washington region. 

 

Why Data Correlation Is Essential To Big Data

Big data is all the rage today, and with good reason.  The information gathered from big data engines can be applied to offer insights that can help drive business growth, solve a healthcare crisis, or empower student success.  However, big data alone is not a silver bullet – the real value is derived from data correlation, or the ability to understand the data gathered as it applies to other data in the appropriate context.  Just as correlation is defined as the technique for investigating the relationship between two variables, then data correlation is the ability to pull data from various sources and derive benefit from the understanding of the relationship between them to determine a more informed way forward.

Consider the example of how big data correlation is being used to help insurance companies identify drivers who are most deserving of reduced insurance rates:  with the increase in available sensor data from connected cars, insurers are able to craft an informed driver profile to determine if insurance discounts are in order. At their fingertips are data streams providing information on how often a driver uses the car; typical distance covered; times of day of regular travel, the traffic congestion encountered; and average speed sustained.  From these data streams, insurers are able to more succinctly determine what level of insurance risk each driver presents, and can therefore provide more tempting incentives to either become or remain a customer.  In this case, data correlation takes away the “guessing game” for the insurance company and replaces it with a simple solution that benefits everyone – from the insurance company, to the driver, to the industry itself. That is a great example of how data correlation turns into actionable intelligence.  And that is the power of big data done right.

Data is the security space is no different.  For PSIM systems, physical security video cameras or sensors provide information that let security teams know if there is a problem. The PSIM intelligence layer can convert massive amounts of data (essentially meaningless without context) into meaningful and actionable information by filtering and correlating the data based on time, location, duration, frequency and type. These criteria are defined by an organization’s risk policy standards and compliance requirements.

CSIM takes this approach even further, by combining physical security with information technology to provide a more holistic evaluation of a security situation.  Formally integrating these previously disparate security functions of the physical and IT components into converged security is a natural evolution for our increasingly networked world.  This capability allows companies to correlate data in a more efficient way by drawing trends from both the physical environment and the digital perspective to mitigate risk at a higher and more efficient level.

CSIM takes into account data from multiple sources:

  • Video: The primary source of security knowledge, video cameras monitor key entry points and are triggered to other areas based on information from sensors and the data command center.
  • Access: Monitors access points – whether physical or digital – through the use of ID management, access control and alarm systems.
  • Sensors: Multiple sensors from different locations provide a more complete picture of an active situation.
  • 3D Mapping: Through the use of sensors, CSIM is able to access 3D maps of situations in order to make smarter, faster decisions.
  • Social Media: Proactively and reactively monitors social media, weather, news and other open source data feeds to provide real-time information.

These capabilities, combined with other features, can be leveraged by global organizations and enterprises to gain valuable, real-time insights.  Through integrating big data analytics tools, social media and other intelligence inputs, companies can correlate internal vulnerabilities with external threats.  Situational awareness data from external sources are included in our dynamic reporting feature, providing organizations with a more comprehensive understanding of where these threats are happening and how they could potentially impact business operations.

The future applications of these intelligence streams stretch well beyond security.  Consider these same inputs and how they can offer insights into how your organization operates, pointing to opportunities for increased efficiencies.  With a platform like our CSIM offering, the avenues for integration are potentially endless, providing a pathway for big data to impact not only your organization’s security, but overall operations as well.

Technology’s Role in Handling an Active Shooter Incident

Active shooters are a critical threat facing businesses and communities across the country. According to a study by the FBI, commercial facilities accounted for nearly half of the 160 active shooter incidents studied. Educational facilities were targeted 25 percent of the time, and government facilities were targeted 10 percent of the time. It’s critical that all organizations understand how to better prepare and respond to active shooter incidents.

Resolving an emergency situation often depends on effective communication and coordination among multiple sources, including:

  • Collecting sensor data from multiple vantage points,
  • Correlating that information, and then
  • Disseminating those insights to responding parties.

In the case of a shooter incident, quickly analyzing and responding to the data available is critical to protecting as many people as possible. Establishing a platform for interoperability that enables security personnel and responders to correlate data efficiently and communicate effectively can be the difference between life and death.

Data is Key to Handling an Active Shooter Event
While big data is often talked about as it pertains to cyber security, it rarely comes up when discussing physical security. We believe that data is the source of all effective security and have built our entire platform around collecting and interpreting data to detect meaningful streams of information out of the noise.

Unusual or unexpected activity is typically the first warning sign of a dangerous event. Software tools are able to identify patterns that are unusual on any monitoring or sensor device by collecting data from disparate sensors, devices, systems and subsystems and flagging these as potential risks. This data can then be filtered through a dynamic, real-time data visualization and presentation layer in order to better mitigate active shooter events.

GIS Information
Using data, Geographic Information Systems (GIS) allow responders to view an information map where an event is occurring while simultaneously monitoring patterns that allow better proactive and real-time security responses. In the case of an active shooter, a GIS platform provides a map and floorplan of the building, identifying key entry points for responders and can also aid in identifying the movement of the shooter within the building – allowing security teams and law enforcement to make informed decisions before taking action.

Importance of Video
Live video feeds are critical when dealing with an active shooter, as they provide a visual tracking tool to determine important details about the incident. From the moment an alarm is triggered, live and recorded video feeds from cameras located closest to the alarm site can be automatically displayed. The video feeds provide information about how many active participants are involved, safe entry points into the building, and the location of potentially wounded individuals within the building.

Social Media Chatter
Social media has become one of the first places law enforcement turns following a violent incident. Oftentimes social media profiles can reveal red flags, such as aggressive or suicidal comments, angry tirades, and threatening direction of interest. In an active shooter situation, social media can also help law enforcement assess whether other parties are involved in the attack and if more locations are being targeted. In addition, social media chatter helps identify shooters and locations through victims or witnesses sending information out in hopes of being rescued.

Access Control / Identity Management System
The more secure a building is, the more hurdles a shooter has to overcome to enter. Property Management companies and their building managers need to join the conversation regarding their role in deterring potential shooters. For example, Property Management companies can work against active shooter attacks through the provision of a robust access control system. From the most basic level of entry authentication to higher-security systems that can track where employees and visitors are within a building and restrict certain areas to only specific levels of personnel, any level of access control is a positive step in deterring shooters. These systems can also allow for the lockdown of entrances and exits within a building during an active shooter situation. An equally important tool is an identity management system for photo comparison. These systems can be combined with other software tools to analyze camera footage to help public safety officials identify the shooter(s).

Emergency Notification Systems and Mobile Communications
Mobile phones are the quickest and most effective way to reach large groups of people, in three primary ways:

  1. Organizations can use an emergency notification system to notify specific groups that an incident is occurring, which way is the safest route to exit the building, and to also receive response notifications from affected personnel.
  2. First responders are able to provide real-time communication about the present situation.
  3. Law enforcement can determine the safest location for medics and first responders to enter the building to treat victims.

Panic Alarm Monitoring
Many organizations benefit from strategically placed panic buttons or silent alarms, which provide an immediate indication of where an incident is occurring within the building. More advanced panic alarms are automatically triggered when integrated sensors identify gunshots. Software tools can then automatically present the closest cameras to that location, activate the video surveillance system to begin filming the area where the alarm has sounded, and immediately notify both the closest security officer in the vicinity and local law enforcement of the location.

Integrated Security as a Solution
Despite the fear that surrounds active shooter events, organizations have many options when it comes to keeping their workers, students, shoppers, and visitors safe. Having multiple security sensors in place is a positive first step, but a fully integrated security solution will not only allow first responders to have the most important information as quickly as possible, but it will also provide the ability to resolve an active shooter situation quickly, and hopefully safely, for all involved.

Next week at ISC West many discussions will focus on handling an active shooter in today’s growing threat environment. Active shooter attacks are an ever-present concern for citizens and organizations, and as a security company we are aware of our role in helping to mitigate these attacks. Vidsys software improves situational awareness and situation management and enhances public safety in a crisis. Want to learn more? Check out a demo of how our software works, here.

5 Challenges of Large Public Events and How to Manage Them

From the Super Bowl to a visit by the Pope to the Olympics, large one-time events pose daunting challenges not just for security but also for traffic management, communications, food services, sanitary facilities, logistics, citizen safety and beyond.

Large and special events require the mobilization of multiple departments and organizations within a city or region as well as a system that can manage and oversee all aspects of the operations. While large events are a logistical challenge requiring the participation of hundreds and thousands of individuals from dozens of government and private entities, the lessons learned and the technology employed can provide long-term benefits for the community beyond the event. This is especially true when a solution is deployed to monitor and direct all of the moving parts. Once various silos of devices, sensors, subsystems are integrated to create real-time situational awareness, the city or region can continue to leverage and use the platform to create a Smart or Future City application that goes beyond that one-time occasion.

But getting your arms around events like these can be an overwhelming undertaking. How to plan and what to think about can be confusing and daunting. With that in mind, here are five typical challenges posed by large events, and ways to address them and provide the best—and safest—experience possible for everyone who attends:

Challenge #1: Deployed and On the Ground Security Assets Need Support.
You may know the old adage that “you can’t see the forest for the trees.” This especially applies to first responders in law enforcement and security. Police and security professionals are tasked with protecting the citizens and those who attend special events by understanding the entire situation and reacting appropriately to potential threats or risks. Yet they typically don’t have a bird’s eye view of what is taking place ahead of the event or in real-time beyond their line of sight.

By implementing a Converged Security & Information Management (CSIM) platform, local authorities can integrate all of the information and data that is needed to get that larger and more holistic view. The right CSIM will not only help law enforcement keep the event safe and secure, it will help every department and agency manage their operations and mitigate any risks.

Challenge #2: Video Surveillance Can’t Stand Alone.
Video surveillance cannot be the only sensor utilized for a large event. It is essential to have a centralized platform that can bring in all types of information from data networks, building security and fire detection feeds, communications platform, and social media inputs. Multiple sensors, security systems and other systems already in place need to be coordinated in real-time so that the data can be collected, and the right correlations made to best determine when and how to react.

Challenge #3: Cities Want To Be Proactive vs Reactive.
Security solutions need to be capable of taking a proactive approach to event security, beginning far before the event takes place. For example, the most recent CSIM platforms can scan social media and identify correlations that might signal an issue, such as protesters discussing how to disrupt a gathering, that may need to be considered in the preparations. With the right CSIM solution, officials can take action ahead of time with the goal of preventing an incident before it begins.

Challenge #4: Managing the Data Deluge.
Great security platforms should work like the human brain – holding onto information that is important and letting go of what is not relevant. Data correlation is the most intuitive and most forward-thinking way to approach security. Any platform under consideration should be capable of collecting data from disparate sensors, devices, systems and subsystems including social media and big data analytics. This data can then be filtered through a dynamic, real-time data visualization and presentation layer that can easily be controlled through a web browser or even a mobile device.

Challenge #5: Finding A Technology Platform That Can Rapidly Scale:
After a key event, cities often choose to keep their platform in place for day-to-day use. Some systems provide a mobile app where individuals can report anything suspicious that they might observe, including strange behavior at a supermarket, flooding in a neighborhood area, or perhaps a threatening conversation on social media. When numbers increase in this way, the system should be able to easily adjust to manage thousands of additional sensors and users without an issue.

While large scale events present numerous challenges, the right combination of people, process, and innovation provides the necessary tools and flexibility to address and manage a myriad of potential problems as they arise, both planned and unplanned, resulting in a safe and enjoyable event for everyone.