Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Physical Security

10:00 AM
Peter George
Peter George
Connect Directly
E-Mail vvv

Physical Security Has a Lot of Catching Up to Do

The transformation we need: merging the network operations center with the physical security operations center.

I joined the physical security space from the cybersecurity and networking world. Coming from that background, it has been fascinating to see how far behind the physical security world is when compared with those two sectors. It often feels like the land that time forgot.

But I have no regrets. Why? Because I have seen this movie before, and I like how it ends. Let me explain.

In 2005 — what now feels like the early days of cybersecurity — Palo Alto Networks showed up with a fundamentally different approach that shook up the landscape. At the time, customers were buying a new black box for every application and function. The boxes didn't talk to each other to coordinate in any particular way. Managing them all was a nightmare, and it also created vulnerabilities that attackers could exploit.

Related Content:

Why We Need to Pay Attention to Attacks on the Smart-Built Environment

2020 State of Cybersecurity Operations and Incident Response

New on The Edge: Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective

In a time when firewalls were all about ports and protocols, Palo Alto could see applications. It assigned application priorities in the firewall itself. The company's integrated platform pulled multiple functions into a single environment. It was faster, easier to manage, and more secure. Customers loved it.

When I look at the physical security world today, I see a similar situation to the fractured firewalls and networking environment of the mid-2000s of cybersecurity. When we arrive at a concert or sporting event, we endure a security queue of indefinite duration. After that, we dump the contents of our packets — I mean pockets — into a bucket. If we have a bag with us, we surrender it for deep packet inspection. Then we walk through an ancient analog metal detector that can't tell the difference between a gun and a prosthetic knee. If we're unlucky, we are routed off for an invasive pat down. After the security gauntlet, we queue up to have our tickets validated, and fight our way to our seats. We endure this nonsense for each event, even if we own season tickets that have been in the family since the Roosevelt administration. It's madness.

In the physical security world, many systems are analog and don't get smarter over time. In cybersecurity, everything is digital by default and often enhanced by modern machine learning. In physical security, every sensor — be it a weapons detector, video surveillance system, ticket processing station, or people counter — is a discrete black box that doesn't talk to other systems. Even worse, the boxes line up serially in a congested space, so each new system incrementally degrades the guest experience. In cybersecurity, integrated systems parallelize and auto-scale as needed to keep things moving. In physical security, there are almost no analytics, no objective risk-scoring methodologies, and the default solution to nearly every problem is "hire more people" or "train the people to do more and remember more."

The pandemic has brought all of these deficiencies in the physical security world to a boiling point. Actually, more like a boiling point in a pressure cooker. Guests and employees simply will not tolerate crowded lines and physical contact anymore. And now facilities need to screen for weapons as well as elevated temperature, mask compliance, and social distancing compliance. As these facilities navigate their reopenings, they are finding that "add more boxes and people" is a nonstarter.

I firmly believe that the future of physical security is touchless screening by integrated artificial intelligence-powered platforms that can look for multiple threats using multiple sensors in a single pass. It will mirror today's modern cybersecurity platforms: intelligent, connected, precise, and adaptive. It will be invasive for intruders while being barely noticed by valued visitors.

Just imagine how cool it would be if the same system that is scanning for threats could also process tickets, guide visitors to their seats, and give season ticket holders and other trusted visitors the premium experience they deserve. Would that require working across our artificial organizational boundaries? Yes! Would it require us to reimagine business processes and design them with the visitor experience in mind? Again, emphatically, yes! That's what digital transformation is all about.

The physical security world has a lot of catching up to do in this digital transformation. But when physical security is transformed, it will finally be possible to fully merge the network operations center (NOC) with the physical security operations center (SOC). We'll know were getting there when the NOC and the SOC are in the same room and the occupants have total situational awareness of all threats, whether they manifest themselves as bits or atoms, or both. The situational awareness of the people in the combined SNOC might even include key visitor experience metrics. They'll think about both risks and opportunities, both threats and key business results.

I look forward to that day. Let's get on with it.

Peter George has a decades-long track record in leading cybersecurity companies and building disruptive technology startups into market leaders. He joined Evolv Technology in February 2019 as chief commercial officer and was promoted to chief executive officer (CEO) in ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
User Rank: Apprentice
11/17/2020 | 2:50:38 PM
Pending Review
This comment is waiting for review by our moderators.
Visit the Web's Most Authoritative Resource on Physical Security

To get the latest news and analysis on threats, vulnerabilities, and best practices for enterprise physical security, please visit IFSEC Global. IFSEC Global offers expert insight on critical issues and challenges in physical security, and hosts one of the world's most widely-attended conferences for physical security professionals.

COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-24
499ES EtherNet/IP (ENIP) Adaptor Source Code is vulnerable to a stack-based buffer overflow, which may allow an attacker to send a specially crafted packet that may result in a denial-of-service condition or code execution.
PUBLISHED: 2020-11-24
An ACL bypass flaw was found in pacemaker before 1.1.24-rc1 and 2.0.5-rc2. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went throu...
PUBLISHED: 2020-11-24
Barco wePresent WiPG-1600W firmware includes a hardcoded API account and password that is discoverable by inspecting the firmware image. A malicious actor could use this password to access authenticated, administrative functions in the API. Affected Version(s):,,,
PUBLISHED: 2020-11-24
HRSALE 2.0.0 allows XSS via the admin/project/projects_calendar set_date parameter.
PUBLISHED: 2020-11-24
A flaw was discovered in WildFly before 21.0.0.Final where, Resource adapter logs plain text JMS password at warning level on connection error, inserting sensitive information in the log file.