Milestone VP Discusses the Relationship of Security and IoT

With Gartner predicting 25 billion connected devices to be in use by 2020, the Internet of Things (IoT) has certainly become a much-talked-about subject, even among security players who find more and more of their devices connected to the Internet. In a recent interview, Lars Nordenlund Friis, VP of Incubation and Ventures at Milestone Systems, offers his views on how IoT will evolve and affect the security industry.

Q: We’ve heard a lot about security and the Internet of Things. Exactly how is security tied to IoT? Why should security players embrace IoT?

Lars Nordenlund Friis, Milestone Systems, VPA: The security industry should pay attention because it will be an integrated part of the more than 25 billion connected things and will be in use by 2020 according to Gartner market analysts. The Internet of Things has become a powerful force for business transformation and video surveillance cameras are poised to become a dominant sensor in the IoT scenario.

The Internet of Things heralds the next generation of control networks for buildings and cities. The hundreds of millions of devices, such as surveillance cameras, access fobs and perimeter scanners that are already operating on networks will be stitched together, easily and cost effectively.

According to Gartner’s hype curve there is a strong correlation between the development of IoT and a huge rise in Investment deal values over the last five years. The Rate of Innovation in IoT business is by far outpacing other technology areas. Worldwide patenting across all areas of technology has increased by 12 percent recently – this is in stark comparison to an 82 percent increase in the patents related to the Internet of Things.

Security players should embrace IoT because it goes beyond security, and the expectations for it will be driven by end users. However, bearing the lessons of the dawn of video analytics in mind, the industry needs to be very careful of over-promising and under-delivering. We must be pragmatic, and at all stages aim to puncture the technology hype balloon.

Q: How do you catch up with the IoT trend, both now and the future?

A: Internet of Things is getting a lot of traction in the IT world these days, and on top of Gartner’s stated hype curve about the high expectations to impact the technology world over the next 5-10 years, huge venture capital investments are pouring into this market. But there is still a distinct gap between IoT’s hyped perceptions and reality. In a recent survey, more than 70 percent of IT professionals believed IoT would impact both consumers and the workplace – yet only one third were actively doing something about it in their business focus or actual budget investments.

Through the Milestone global community we’ve always got our ear to the ground; it’s one of the primary reasons we established our Incubation Business Unit in the Silicon Valley, to work in partnership with the individuals and companies making the latest breakthroughs in technology. It’s less about ‘catching up with the trend’ than it is making judgements about what is relevant, useful and implementable. There are a lot of good initiatives out there that may never see the light of day: our job is to focus on the ones that will!

Q: How can we intelligently and effectively extract data generated by video and access control devices and use it to our advantage?

A: The key to this is in the way that the Internet of Safety Things is managed. There’s a requirement for a logical organizing entity to decide what to do with the messages received from the connected ‘things’. Unsurprisingly, we see that organizing entity as being similar to the core role of video management software (VMS). We foresee Milestone’s software as working like an IoST Operating System (OS): a significant advance on today’s VMS, but one that still embraces open platform partnership within a dedicated IoST semantic network. That management system would allow complex data to be extracted and presented in a clear and efficient manner, tailored to the needs of users, and optimized through the sensors provided by Milestone technology partners.

To manage that effectively, we have to move data management to the cloud and ride this IT wave of transferring data from on-premise to central computation power as a service. A complete new technology paradigm and business model for the security industry will evolve over time and make IoT scalable. -Lars Nordenlund Friis, VP of Incubation and Ventures, Milestone Systems

Q: In your view, how will IoT evolve, and how will security fit into this?

A: We see the Internet of Things evolving in the way that many technology trends do: at present, we’re at the peak of hype, topping the ‘inflated expectations’ curve. We’re still a few years away from the IoT as a pragmatic, productive reality. In the meantime, we see three phases to the technology evolution which will lead to the Internet of Things with VMS in a key role.

The first is the true embrace of edge recording, which is the phase we’re entering now: edge recording with distributed architecture provides an intelligent, bandwidth-friendly system. This requires high-performance intelligent cameras, and as always, cost will be a factor for the edge system’s widespread take-up.

The second phase centers on video cloud computing and the management of big data, which leads into the third phase where the IoT expands market opportunities for systems integrators and manufacturers. Those who understand IP will be in demand for installing and integrating IoT with video at the core to visualize, manage and verify it all.

We can’t imagine a world where this story could work without an open platform, without a strong partner ecosystem including system integrators. The single common thread with all these technologies is connected components working together as an efficient, integrated whole.

For a more complete version, please visit asmag.com.

Related posts

Real Word or Buzzword? OPEN

Real Word or Buzzword? OPEN

Manufacturers and their product development teams need to take a very close look at how the term “open” should be applied – not only in the design and development of products and systems, but also in the explanations they provide to...

Posted