Going beyond security incident response, rules can be defined to identify developing situations and to automate timely response according to policies. For example, by monitoring National Weather Service news feeds via the Internet, the system can provide early warnings to specific facilities threatened by a category 4 storm. It can automatically
• schedule a telephone conference for relevant company managers through Microsoft Outlook and notify you by e-mail and phone text message of the responses;
• query the access control system to identify personnel at affected facilities and notify them by e-mail and phone text messaging;
• push out relevant company policy for review by security staff and line managers responsible for the affected facilities, to prepare them to react appropriately.
Integration and Security Analytics
The list of security analytics applications, which you can tailor to the needs of your organization, is practically endless. And that's the main point: intelligent security analytics capabilities like those described here have added a whole new dimension to systems integration.
What type of intelligent analytics will you use at the device level and the system level? Is there a rules-based process that you can update, or does any adjustment require a factory technician? What information inputs for analytics are required locally at facilities and centrally at headquarters security operations? Where should the system analytics outputs go? What about situations that analytics rules don't cover—how will they be identified in real time? Can you leverage your existing security systems using automation systems like the two described above? Should you keep your old devices or purchase intelligent replacements? These and many related questions should be addressed in the course of considering the use of today's advanced security technologies.
Not only do intelligent systems provide tactical response capabilities, they provide a bridge between strategic planning, policy and security operations. As security systems have become enterprise in scale, wide-scale strategic deployment of intelligent systems is possible with enterprise-level benefits, including enterprise-wide security metrics management, cost control, and continuous process improvement. All of these benefits will be examined in detail in the next issue's article, “Security Integration: High-Level Drivers.”
Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides high-security consulting services for public and private facilities. Mr. Bernard has provided technical advice in the security and building automation industries for more than 18 years. He is also founder and publisher of The Security Minute 60-second newsletter (www.TheSecurityMinute.com) . For more information about Ray Bernard and RBCS go to www.go-rbcs.com or call 949-831-6788.