Stay Connected: Leveraging the Cloud and Mobile Applications for Enhanced Security Jumbi Edulbehram, Next Level Security Systems Kevin Dailey, Unified Physical Security What are cloud services? Delivery of applications and storage as a service rather than a product, whereby shared resources, software, and information are provided to as a service over the Internet Adapted from Wikipedia Now Available: Security Applications 1
Drivers of cloud services Technology drivers Greater availability of bandwidth Increased network reliability Greater security of connectivity and transmission Availability of tools for application development Proliferation of mobile devices and software Business drivers Moving capital expenses to operational expenses for end users Increased RMR for service providers Greater business intelligence through application integration Reduced resources required for maintenance/support Increased effectiveness due to timely information availability and response Why cloud services for security? Remote monitoring Multi-site monitoring Mobile applications Integration with other cloud-based applications, tools and Web content 2
How to use (not abuse) the Cloud Storing and reviewing large amounts of video (esp. HD) is NOT cost-effective Cloud storage is best for events, images (faces, license plates), configuration backups, reports, low quality archival video The Cloud is most useful for interconnecting devices and giving access to video and data anywhere, anytime Need to design the infrastructure based on the use case and applications required, taking into account legacy infrastructure Why don t you have it? SO MANY PROBLEMS WHAT A HEADACHE! Too much configuration required Security concerns Significant limitations on usage Storing video in the cloud is expensive Poor video quality, especially for video stored in the cloud Limited number of interesting applications 3
What do you need? Automatic and secure remote connectivity Best video quality possible given the bandwidth available and size of the viewing device No limitations on the amount of video watched or number of clients Interesting applications! New technology makes it easy to deploy and secure User logs into Cloud Service Cloud Service authenticates client Cloud Server Remote User The user streams video/data directly using unique peerto-peer technology Automatically transverse firewalls and make a secure, encrypted connection to the Cloud Server Security devices 4
New technology alleviates the bandwidth bottleneck Video streams should be configured in real-time depending on the available bandwidth and size of viewing device Local Site Original 1920 x 1080 4Mbs 30fps Remote Viewing Devices 1280 x 720 1Mbs 30fps 854 x 480 768Kbs 15fps 1920x 1080 512Kbs 5fps New technology eliminates restrictions on usage Traditional method Costs scale in proportion to: The amount of video and data transferred Number of client connections Substantial cost savings Unlimited live viewing Unlimited number of concurrent clients Faster and smoother video streaming Peer-to-Peer Direct connections between clients and on-site security equipment No cost incurred for routing through host 5
Cloud applications reach the Next Level Browser Based Software Mobile Surveillance Applications Mobile Device as surveillance camera Cloud Video Surveillance Access Control Intrusion Mobile Device for personal safety Mobile device as a live camera Turn device into an IP camera with the touch of a button Enable video and audio on mobile device Stream video and audio to Central Station where it can be monitored live or recorded Allows security personnel to capture video and audio in locations where there may be no surveillance equipment 6
Mobile device for personal safety Help needed in a dangerous situation: User hits Panic Button which sends alert to security with GPS location of phone Phone sends audio and video so security can monitor the situation and call law enforcement if needed Remote Escort User hits Escort button on mobile app Request received by Security GPS on mobile device tracks user location User arrives at location, and presses Escort No Longer Needed to turn tracking off Mobile device for access control Cloud 7
Cloud-based RMR opportunities Video Verification Video Guard Tours Access Control Management Reporting: analytics, access control Proactive System Health Monitoring Complete System Maintenance And more Thank you! Contact: Jumbi Edulbehram Jumbi@nlss.com Kevin Dailey kevin@unifiedps.com 8