The rise of web technologies in the field of security.
by Harm Radstaak

New technologies dominate the market.

The market for electronic security is extremely dynamic. A wide range of factors impact the market. Developments on both the side of providers and customers demand that security solution developers and providers make strategic choices, and when necessary, changes. The market is furthermore faced with a broad spectrum of technological developments and trends.

One of the chief factors that will dominate the market in the years ahead is the IT factor in general and the rise of web-based technologies within security solutions in particular.  This article examines the IT factor which is currently dominating the electronic security market.

The integral need for security.

A range of security systems is available in the market. From a technological standpoint it can be ascertained that the current security solutions:

  • Often address separate security issues (technical, functional and organisational)
  • Often cannot be configured on an interdependent basis
  • Are extremely hardware-based
  • Employ outdated technology
  • Are platform dependant
  • Expensive to manage and maintain

It can be concluded from this that the current solutions do not sufficiently fullfil the needs of either the end user or the security installer.

The main needs of the end user regarding security systems are:

  • Integral, interdependent security
  • Seamless connection to the infrastructure
  • Centralized manageability (multi-site)
  • Low maintenance and management costs

Interdependent security means the actual integration (rather than linking) of the various specialized fields of security. Thanks to this interdependence, specialized fields such as intrusion detection and access security are utilized in such a way as to prevent unnecessary alarms by denying entry if the intrusion system is switched on.
Related (and interdependent) applications such as asset management, people protection and logical security will increasingly be included in total security solutions.

Installers and providers of security services demand:

  • Fast and trouble-free installation
  • Low service and maintenance costs
  • Centralized manageability and location independence
  • Locally available information

The market is increasingly faced with tighter project margins. This makes cost control particularly important in the installation market. Therefore systems that the installer can maintain and service at limited costs are preferred.

Web technologies and solutions within security.

The application of web technologies within security systems will play a major role in meeting the requirements of end users, installers and providers of security services.

The introduction of web technologies within security systems adds a new dimension for end users. In addition, the introduction of web technologies will enable the security market to deliver new applications and services. Viewed from the supply side, this gives rise to diminishing distinctions between low-end, middle-end and high-end solutions.

Applied technologies.

A wide range of new terms and technologies will be added to the security market due to the introduction of web technologies. Due to the influence of IT, security providers (and end users) will encounter such terms as web-enabled interfacing, style sheets, Java, XML, SSL, etc., etc..

However, a more important development is that the introduction of web technologies will bring about a shift from applications on the client side (PC users) to the server side. A major disadvantage of the universally applied client-side applications is that they must be installed locally on the user’s PC. This is a time-consuming and relatively expensive solution. IT specialists devote a great deal of time to the installation and maintenance of these kind of applications. An additional disadvantage is that these client-side solutions are platform dependent. This means that PCs must have heavier specifications and that (in keeping with the frequency of (Microsoft) releases) applications must be updated frequently in order to be able to run the latest versions of Microsoft.

The emphasis with systems that employ web technologies is on server-side solutions.  In concrete terms this means that the application operates on the server and that on the user's side a PC that “only” shows pages is sufficient. The major advantage of this solution is that it creates a manageable environment for the organization. What’s more the user is unable to access the application source code.

Applications/Use

The use of web technologies creates new application possibilities for the user. First and foremost is the use of so-called “web-based security management” systems. In concrete terms this means that security management systems can be managed from web interfaces.

Centralized management, decentralized use this centralized management enables the organization to centralize the system’s various specialized fields of security. The application of web technologies makes it possible to optimally implement multi-site management. As a result an organization can secure and manage all of its buildings from one central location/database/management system. The centralized location provides the subsidiary locations with access to the available web interfaces for the purposes of management and/or maintenance. This does not require physical installation on their PCs. All that the PC requires is a browser (such as Internet Explorer or Netscape) which is either delivered as a standard system on PC’s or can be downloaded (free of charge) from the Internet.

Due to the fact that in terms of management the security solution is in principle “location independent”, there is the possibility to introduce new forms of use for security. Examples include the application for building complexes (allocating parking space, access rights, etc.), offering access to the application for home workers and announcements and reports of events to the appropriate employees. This could include such things as sending reports to employees equipped with PDAs with web interface, failure reports to repair technicians with laptops, etc.

From the supply side’s perspective this creates an opportunity for security providers to offer new services. Centralized management in turn allows securers to offer users security solutions as a service. From the securer’s centralized management organization the user can be offered “in-service” security. The user outsources the daily management of security (setting rights, issuing employee cards, ….) to the securer.

The security company can particularly provide support / take over a great deal of the work relating to the operational management of the security system for organizations that operate 24 hours a day. An example would be processing providers who often deliver stock at night.

Advantages/disadvantages

The application of web technologies has both advantages and disadvantages. One of the disadvantages (for now) is perhaps the security market’s unfamiliarity with these systems. This unawareness leads to reluctance to use these systems and to the securer’s concerns regarding the security of the data transfer. Another disadvantage is that the shift to centralized management requires the use of a more powerful server. However, this disadvantage is relative considering the intense price competition in the PC/server market.

In relation to the first mentioned drawback regarding secured data transfer, attention must be drawn to the available technologies such as SSL (secured socket layer). Most internet users are already familiar with these technologies if they use internet banking services that provide information via secured pages (https). Comparable technologies can be used for electronic security systems that utilize web technologies. SSL ensures that data traffic is sent over the internet using intelligent encryption methods. This makes the data illegible and unusable for possible hackers.

The advantages of using web technologies can be divided into a number of facets, namely IT, user, organization and installer.

Advantages for IT

The IT department benefits from the advantages of centralized management, installation and management of the application. The second advantage is that the IT department does not have to carry out field installation on all the PCs that will use the application.  In addition, the application of web technologies creates a platform independent application for the user. After all, “only” web pages are opened/shown.

Advantages for the user

The system information for the user is placed in so-called style sheets. This creates an extremely flexible way to present data to the user. In concrete terms this means that the system can provide tailor-made information to the user. This ensures fast acceptance of the system. 
Another advantage for the system user is that the use of web technologies establishes a location-independent system. All that is needed to start and operate the application (anywhere in the world) is a PC/laptop/PDA with a browser.

Advantages for the organization

The major advantages for organizations that use a security system with web technologies are improved efficiency (only centralized management and location-independent use) and the substantially improved “cost of ownership” that can be achieved by using web technologies. Organizations are no longer required to make expensive investments in PCs, new software versions, etc. whenever the security system is updated. All management and maintenance activities are carried out centrally. All that the user' s PC requires is a browser that browses to the central system to obtain the available information. The cost of ownership component generates savings on direct costs such as hardware, software, operational personnel costs and management costs. In addition, it leads to indirect cost savings relating to expenses for downtime and the time that non-IT personnel devote to IT matters.

Advantages for the installer

The installation market has been traditionally reluctant to adopt new technologies. However, the introduction of web technologies is still a key cost-saving factor for the installation and maintenance branch. When installing systems security installers no longer have to take into account the available PC configurations and possible Microsoft versions. This ensures quick software installation. However, one of the most important cost-saving factors lies in the fact that the installer is no longer dependent upon the various software releases of the security application and the variety of operating systems. This enables the installer to realize substantial cost-savings in relation to the field service’s current (laptop) PC infrastructure (not to mention the cost-savings that can be achieved through efficient service and maintenance calls).

Future developments

The introduction of web technologies is relatively young and there are rapid developments taking place in this field. The security providers are expected to adopt the new technologies within their security solutions. In addition, a new form of supplementary service will arise in the market: remote security management. Security providers will increasingly face competition from IT providers who will offer electronic security in addition to their standard range of products and services. The big question however remains the extent to which regulations will influence newly available technologies. Current regulations are generally based on old (outdated) hardware technologies.