Perimeter SecurityTechnologyVideo Surveillance

Sensors and the cloud enhance perimeter security Sensors and the cloud enhance perimeter security

Genetic sees the cloud as the ideal opportunity for security information management as information sources such as radars and virtual fencing increase.

The physical security and control of information generated mainly by video media have successfully migrated to the cloud, despite some of the inconveniences resulting from the volume and the risk to the integrity that files may suffer.

Companies such as Genetic have developed solutions and methodologies for managing these files to convert them into valuable information that can be correlated to business decisions and overcome the requirements of control and auditing mechanisms.

These requirements include:

Higher levels of redundancy: Genetic states that it can store information in triplicate in public, private or hybrid clouds, reducing the risks of information loss caused by server failures, attacks and natural disasters.

Encryption of information in the cloud: With cloud solutions, all information sent through devices to the cloud is fully encrypted. Therefore, even if cyber-criminals access your data, they will not read or view it without an encryption key.

Reduced hardware infrastructure: With a cloud solution, you only need cameras. There are no servers to maintain or install. That means there are fewer entry points for potential attackers to target. With less vulnerability, the network and businesses are more resistant to attacks.

Newel Javier Vargas, Regional Sales Director for Central America and Andean Region, Genetic, explained how corporate security management is now managed from the cloud and enriches information using other information sources.

“End users must take into account the necessity of a platform that allows them, through unification, to have control of all their sensors from a single interface to achieve better monitoring of their environments and make better decisions,” said Vargas.

The changing role of electronic security

Adding new sources, including infrared and ultraviolet readers, sounds and radar signals, improve protection opportunities and the responsiveness of the security area.

“As an open architecture platform, we manage to integrate different sensors, and it means that, by using the standard communication protocols existing in the market, we will be able to bring different solutions to our platforms, such as radars and perimeter fences that allow us to have a broader context of the environment and also generate early alerts to react on time. The combination of sensors is crucial if it is possible to manage them in a unified way,” said Vargas.

In the State of Physical Security Report, Genetic analyzed the perspectives of more than 2,000 global e-security leaders about how it evolved in 2021 as organizations adapted to different conditions.

Related posts

iDter extends AI technology to perimeter security applications

admin

TRASSIR surveillance technologies offer immediate threat response to educational institutions in Africa

Editor_Security

Seagate Expansion hard drives offer quick, easy and portable storage when you need it most

admin

Leave a Comment

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More