Whitepaper Connect and extend your site and asset security M2M for business security M2M.vodafone.com
M2M for business security What this paper is about Security is an industry in flux. While in many cases the core activities and tools haven t changed CCTV for monitoring and alarms for perimeter protection, for instance technology has evolved rapidly, creating new possibilities for securing businesses and their assets against theft, fire and other risks. Machine to machine (M2M) communications in particular has enabled a step change in functionality in three security applications: alarm systems, CCTV and asset tracking. This paper is specifically aimed at manufacturers and distributors of security equipment, but will also be relevant for enterprises with significant or specific in-house security needs. Contents Security has its hands tied M2M: connected security Improved security, lower cost and more Case studies Making it happen About Vodafone
3 Security has its hands tied Technology is the key Every year, thousands of crimes against business sites and assets go unsolved, despite those enterprises investing in security infrastructure. Why? Because criminals can: Cut cables to CCTV cameras and alarms to disable them. Target remote locations where it s impractical to install phone lines to connect cameras and alarms. Take advantage of alarms and cameras going unmonitored according to Berg Insight, an estimated 75% of Europe s 30 million alarms are totally unmonitored. Target assets when they re on trucks and vans, away from the protection of the site perimeter. Increasing security coverage To stay one step ahead of criminals, organisations and their security providers need to take a new approach. Site security devices like alarms and cameras need to be tamper-resistant and functional even at remote sites. Rather than just being passive observers, devices need to be active, intelligent participants: alerting guards or the emergency services when there s a security breach. And coverage should extend beyond the perimeter: covering assets and goods in transit. Reducing security costs Increasing security often means increasing costs and many enterprises have difficulty balancing what risks they can accept with what they can afford. Whether you re a manufacturer, installer or security customer, it s in your interests to make security cheaper and easier to deploy and to run. Installing traditional fixed-line connections to cameras and alarms is expensive and takes time, particularly in remote sites; manual monitoring of mobile assets, for example in a global logistics network, is often simply impossible.
M2M for business security M2M: connected security Imagine if security devices could keep you constantly informed about their status, without wires and even beyond the site perimeter. With M2M, they can. Connected, intelligent security M2M security is connected security. Each camera, alarm or monitored asset is constantly connected to central systems: whether that s a security provider s monitoring station or an enterprise s own tracking systems. Often, that connection is wireless there s a SIM in the asset, just like in your smartphone but M2M devices can also be configured with wired connections or even satellite links. The connectivity may take different forms: An alarm might send occasional status updates, and notify the emergency services directly when a breach occurs. A camera might transmit footage to a national control centre, and send priority alerts when intelligence in the device identifies movement or other unexpected events. An asset-tracking solution might monitor location and speed, so a central management system can trigger an alarm should a vehicle deviate from its planned route, for example. Advanced connectivity, available today All the technology required for M2M in these three applications is already available. Wireless networks have now achieved near global coverage, with international SIM roaming providing relatively low connectivity costs for M2M devices. At the same time, global wireless standards ensure compatibility for devices, M2M applications and underlying infrastructure. M2M modules are small, can be rugged, and have low power consumption, which means they re practical to install into alarms and cameras and can operate for extended periods even in hostile conditions without the need for maintenance. CCTV camera Automated or managed monitoring Security alarm M2M platform Adhoc monitoring Track & trace Monitoring devices Mobile devices Access devices
5 Improved security, lower cost and more So what can M2M security do for businesses? Improve security and coverage Using wireless technology, M2M-enabled cameras and alarms can be constantly connected to the emergency services or private monitoring station. Because there aren t any wires to snip, this connection is much harder to break and because the device is constantly connected, any interruption can be spotted by central systems immediately. Furthermore, because M2M security devices don t need a physical connection to communicate, they can be deployed in remote locations, increasing the overall reach of your security net. Reduce theft and shrinkage M2M-enabled asset tracking enables a new kind of security, helping to prevent the theft of valuable mobile assets such as vehicles, stock and plant and reducing the risk of shrinkage. Track and trace acts as a deterrent to would-be assailants and helps the recovery of stolen goods. Cut installation and management costs Because M2M-enabled security devices often connect to wireless networks, there s no need for expensive, disruptive and time-consuming drilling or cabling at installation. As well as being rugged and needing minimal routine maintenance, M2Menabled devices can often report back to base about any technical problems before security is compromised: for instance, if a camera s backup battery is running low, or if an alarm has lost signal from a door sensor. Many M2M security solutions offer a centralised management platform, enabling customers to centrally activate, suspend and deactivate devices with the click of a mouse. Increase business insight M2M-enabled devices gather and communicate a vast amount of data that can generate real business value beyond the obvious security applications. For example, by processing video from CCTV systems, a business could maintain safety and optimise the flow of trucks to and from remote sites such as quarries and landfills. Asset tracking systems take this further: with a live picture of where every truck and shipment is and what it s doing, an organisation can streamline route planning, driver shift scheduling and more.
M2M for business security Case studies Asset tracking: Technocon protects high-value automotive products Technocon is one of Europe s most innovative security and theftprevention companies and an M2M pioneer. The company has deployed 30,000 Vodafone-powered M2M devices across Northern Europe to help its clients secure vehicles, homes and businesses. Technocon partnered with Vodafone to create Moving Intelligence, an M2M track-and-trace solution for the automotive industry. Using wirelessly connected M2M devices, manufacturers can pinpoint the exact location of each and every vehicle in a shipment, significantly reducing the risk of theft and tampering. Once vehicles are sold and delivered to end customers, Moving Intelligence collects a raft of useful management information. Driver behaviour data helps insurance companies set their premiums and investigate the causes of accidents, while automotive manufacturers use vehicle performance stats to schedule servicing and report on fuel efficiency and emissions. Cameras: Mi5 Security enhances site surveillance Mi5 Security is a multi-award-winning company that protects and monitors assets around the world with always-on surveillance at warehouses, factories, project sites, and remote infrastructure and business locations. Using M2M, Mi5 Security s wire-free surveillance cameras send footage to business owners and emergency services. Because the cameras are connected wirelessly to the Vodafone network, they are constantly available and hard to tamper with. Some models even have solar panels and an internal battery, which means not only do they not need a fixed-line for communications, they don t even need a mains power connection, making them extremely easy to deploy. The footage is transmitted over the Vodafone wireless network to the idefigo cloud-based surveillance management service. This uses load-balancing technology and pre-integrated services to send camera images to clients inboxes and mobile devices in real time however many cameras they have in their estate.
7 When we say 24-hour availability, we mean it. We have to be more on at 4am than at 4pm that s when burglaries happen. Vodafone gives us that reliability and it s a solution we can trust. Simon Banks, co-founder, CSL DualCom Alarms: CSL DualCom expands into Europe CSL DualCom provides SIM-equipped M2M alarms and access control solutions for thousands of commercial and domestic properties across the UK, giving it 25% market share. Because incidents can happen at any time, 24-hour service availability is of absolute importance, and CSL Dualcom has worked with Vodafone for years to provide reliable connectivity for its customers. It decided to expand its business into Europe, and Vodafone was the obvious choice to provide an international M2M solution. Now, CSL DualCom offers alarms across Europe, with Vodafone providing a fixed monthly per-sim fee regardless of country helping the company to minimise the complexity of managing international deployments. Vodafone helps support additional features on the CSL DualCom portal. We ll have a graphical user interface front-end showing everything from performance to signal strength, says Simon Banks, CSL DualCom co-founder. We have some customers with over 700 connected devices and they want to see what s going on across their estate. Having that visibility is a huge boost to customer satisfaction.
M2M for business security Making it happen About Vodafone Processes have to change as well as devices In applications such as surveillance cameras, alarms and asset tracking, M2M offers a clear return on investment for both providers and enterprises. But achieving better security and lower deployment and running costs does require an investment. New cameras and alarms have to be developed and installed that are configured to transmit information to central systems. In many cases those central systems too need creating or modifying. And then there are integration decisions: where do camera images get sent and stored? How do they get monitored? And what business processes are in place to react to alerts received? Changing how security works For security companies, offering M2M-enabled security may be an opportunity for a shift of business model, from providing infrastructure on a product-sale basis to offering a fully managed service. Obviously this will involve changes to everything from your marketing to your billing systems. It s a big change, but an enormous opportunity. And it can be a real advantage for enterprise customers too that are looking to reduce the capital investment and management overhead of running security. Where do you start? As you approach M2M, look for a provider that will work with you to demonstrate the potential of M2M at a well-equipped M2M testing centre. It should help you scope out your requirements, specify and build an appropriate data connectivity concept, and design a comprehensive solution including: A global M2M platform, essential for managing connectivity. Global SIMs, so you can deploy equipment wherever sites and assets need monitoring. Preconfigured M2M devices for easy integration. Global footprint, for network connectivity, service and 24x7 support. Vodafone is one of the world s leaders in M2M service delivery. We ve been working in M2M for over 20 years, and today we provide full support for M2M security solutions, including alarms, CCTV and asset tracking. Our capabilities include: global M2M platform; global M2M-specific SIM cards; a broad portfolio of M2M terminals, application and service enablement development, testing and deployment; network connectivity; and system integration all from a single supplier, with a single contract. To find out more about how we support M2M security solutions globally, or how our portfolio of wireless communications solutions can support your business, visit M2M.vodafone.com or email m2m@vodafone.com. Help with application development to speed time to market. Be wary of those that claim that one piece of the puzzle alone is enough to produce results for your business. Vodafone Group 2012. This document is issued by Vodafone in confidence and is not to be reproduced in whole or in part without the prior written permission of Vodafone. Vodafone and the Vodafone logos are trademarks of the Vodafone Group. Other product and company names mentioned herein may be the trademarks of their respective owners. The information contained in this publication is correct at time of going to print. Such information may be subject to change, and services may be modified supplemented or withdrawn by Vodafone without prior notice. All services are subject to terms and conditions, copies ofwhich may be obtained on request.