Perimeter SecurityTechnologyVideo Surveillance

Sensors and the cloud enhance perimeter security Sensors and the cloud enhance perimeter security

Genetic sees the cloud as the ideal opportunity for security information management as information sources such as radars and virtual fencing increase.

The physical security and control of information generated mainly by video media have successfully migrated to the cloud, despite some of the inconveniences resulting from the volume and the risk to the integrity that files may suffer.

Companies such as Genetic have developed solutions and methodologies for managing these files to convert them into valuable information that can be correlated to business decisions and overcome the requirements of control and auditing mechanisms.

These requirements include:

Higher levels of redundancy: Genetic states that it can store information in triplicate in public, private or hybrid clouds, reducing the risks of information loss caused by server failures, attacks and natural disasters.

Encryption of information in the cloud: With cloud solutions, all information sent through devices to the cloud is fully encrypted. Therefore, even if cyber-criminals access your data, they will not read or view it without an encryption key.

Reduced hardware infrastructure: With a cloud solution, you only need cameras. There are no servers to maintain or install. That means there are fewer entry points for potential attackers to target. With less vulnerability, the network and businesses are more resistant to attacks.

Newel Javier Vargas, Regional Sales Director for Central America and Andean Region, Genetic, explained how corporate security management is now managed from the cloud and enriches information using other information sources.

“End users must take into account the necessity of a platform that allows them, through unification, to have control of all their sensors from a single interface to achieve better monitoring of their environments and make better decisions,” said Vargas.

The changing role of electronic security

Adding new sources, including infrared and ultraviolet readers, sounds and radar signals, improve protection opportunities and the responsiveness of the security area.

“As an open architecture platform, we manage to integrate different sensors, and it means that, by using the standard communication protocols existing in the market, we will be able to bring different solutions to our platforms, such as radars and perimeter fences that allow us to have a broader context of the environment and also generate early alerts to react on time. The combination of sensors is crucial if it is possible to manage them in a unified way,” said Vargas.

In the State of Physical Security Report, Genetic analyzed the perspectives of more than 2,000 global e-security leaders about how it evolved in 2021 as organizations adapted to different conditions.

Related posts

A focus on video surveillance cybersecurity

admin

Utility company counts on Senstar to address regulations and meet security goals

admin

Industrial Access Control Market Globally by 2028, Size, Share, Drivers, Key Growth, Challenges, Competitive Scenario and Opportunity Analysis

admin

Leave a Comment

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More