SlideShare une entreprise Scribd logo
1  sur  20
Video Intelligence:   to Secure, and Grow  Recent Research Highlights December 2011 $ Derek E. Brink, BS, MBA, CISSP Vice President and Research Fellow,  IT Security and IT GRC [email_address]
Executive Summary ,[object Object],[object Object]
Definitions For the Purposes of Aberdeen’s Research … ,[object Object],[object Object],[object Object],[object Object],[object Object]
Business Context: Value Chain and Market Trends in Video Security Risk Management Physical Security Information Management Video Analytics Video Surveillance Video Cameras Digital Analog
Business Context: Value Chain and Market Trends in Video Security Risk Management Physical Security Information Management Video Analytics Video Surveillance Video Cameras Digital Analog IP-based Inertia against “rip-and-replace” Transitioning over (long) time Widely installed Leverage existing investments Cost Functionality Reliability In camera (IP-based) At camera (plug-and-play encoders) In back-end (transmit relevant data to centralized system) Remote Guarding Enterprise-wide view of risk Digital assets, physical assets, human assets Centralized Common view of logical and physical security posture Alerts    Situations Emerging standards Human    Automated Maximize resolution Minimize impact on network bandwidth, storage Rules-based    Behavior-based Aggregation Normalization Correlation Monitoring Alerting Analysis Reporting Security     Security + Growth
Business Context: Video Surveillance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Business Context: Video Analytics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technology Adoption Trends: Video Analytics Current Use (by Maturity Class), Current / Planned / Evaluating (All Respondents) ,[object Object],Leading performers are nearly 6-times more likely than lagging performers to implement Year-over-year increase in plans, evaluations
Drilldown – Aberdeen’s Research Findings Video Analytics Users Exhibit a Highly Effective Force Multiplier ,[object Object],[object Object],Effectiveness and Scale All Respondents Video Analytics Users Video Analytics Non-Users Video Analytics Delta Average points of observation 1,300 2,180 440 3.4-times more Full-Time Equivalent employees 98 108 89 1.2-times more Average points of observation / FTE employee 13 20 5 4-times more Alerts requiring evaluation and action (typical 30-day period) 260 518 35 15-times more Average alerts per day 8.7 17.3 1.2 15-times more
Drilldown – Aberdeen’s Research Findings Video Analytics Users Support Significantly Higher Scale at Significantly Lower Cost ,[object Object],[object Object],Effectiveness and Scale All Respondents Video Analytics Users Video Analytics Non-Users Video Analytics Delta Annual cost (FTE) ($K) $3,520 $3,890 $3,200 22% more Annual cost (non-FTE) ($K) $430 $590 $290 2-times more  Total annual cost ($K) $3,950 $4,480 $3,490 28% more Annual cost / point of observation (FTE) $2,710 $1,790 $7,290 75% less Annual cost / point of observation (non-FTE) $330 $270 $660 59% less Total annual cost / point of observation $3,040 $2,060 $7,950 74% less
Video Analytics: Summary of Key Benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Customer-Centric Retail Banking Fast Facts from Aberdeen’s Retail Banking Research ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Significant Room for Improvement Aberdeen’s “Retail Banking: Five Technology Imperatives for Customer-Centricity” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Customer-Centric Retailing: Before/During/After the Transaction From Aberdeen’s “The State of Customer-Centric Retailing” ,[object Object],[object Object],[object Object],[object Object]
Before, During and After the Transaction Representative Processes and Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Integration with Video / Video Analytics is Emerging From Aberdeen’s “Top 10 Technologies at NRF 2011” ,[object Object],[object Object],[object Object],[object Object],[object Object]
Demonstration Dwell Time ,[object Object],[object Object],[object Object],[object Object],Queue Line Analysis Identify when a line gets a certain length or there are more than a pre-defined number of people present Actionable Intelligence – improve customer service by automatically monitoring line lengths and adjusting staffing needs to accommodate more customers Line Queuing Teller Line 2
Summary: Video Analytics Yield Demonstrable Business Value To Secure … and Grow ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Next Steps Aberdeen 3VR For more information on 3VR Products: Call:  877.387.6061 Visit: www.3vr.com Follow:  @3vr For more information on Aberdeen: Call:  800-577-7891 Visit:  www.aberdeen.com Follow:  @Mobile Aberdeen
For More Information Commercial / Marketing Services Dennis Beggan [email_address]   +1-617-854-5395 Scott Mitchem [email_address] +1-617-854-5366 Research Derek E. Brink, BS, MBA, CISSP Vice President and Research Fellow, IT Security [email_address]

Contenu connexe

Tendances

Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security fail
EnclaveSecurity
 
SCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitSCADA and Control Systems Security Summit
SCADA and Control Systems Security Summit
Nicole Waddell
 
What affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burnsWhat affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burns
Bill Burns
 

Tendances (20)

Vidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solutionVidsys Physical Security Information Management (PSIM) solution
Vidsys Physical Security Information Management (PSIM) solution
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security fail
 
SCADA and Control Systems Security Summit
SCADA and Control Systems Security SummitSCADA and Control Systems Security Summit
SCADA and Control Systems Security Summit
 
International Facility Management Association Non-Profit Summit 2010
International Facility Management Association Non-Profit Summit 2010International Facility Management Association Non-Profit Summit 2010
International Facility Management Association Non-Profit Summit 2010
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
SC Magazine eSymposium: SIEM
SC Magazine eSymposium: SIEMSC Magazine eSymposium: SIEM
SC Magazine eSymposium: SIEM
 
What affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burnsWhat affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burns
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructure
 
What We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPWhat We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATP
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Integrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayIntegrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator Display
 
Cutting the Cord
Cutting the CordCutting the Cord
Cutting the Cord
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
IT security
IT securityIT security
IT security
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
 

En vedette (7)

3VR and Arecont Vision: The ROI of Megapixel Cameras with a Video Intelligenc...
3VR and Arecont Vision: The ROI of Megapixel Cameras with a Video Intelligenc...3VR and Arecont Vision: The ROI of Megapixel Cameras with a Video Intelligenc...
3VR and Arecont Vision: The ROI of Megapixel Cameras with a Video Intelligenc...
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
Research Presentation Format
Research Presentation FormatResearch Presentation Format
Research Presentation Format
 
Research project ppt
Research project pptResearch project ppt
Research project ppt
 
Research proposal 1
Research proposal 1Research proposal 1
Research proposal 1
 
Research Proposal Presentation
Research Proposal PresentationResearch Proposal Presentation
Research Proposal Presentation
 
My research proposal.ppt
My research proposal.pptMy research proposal.ppt
My research proposal.ppt
 

Similaire à Aberdeen Group Presents: Video Intelligence to Secure and Grow

Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
Laura Perry
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
Brenda Majewski
 
Predicting the Customer Experience: A Convergence of Business Process, Decisi...
Predicting the Customer Experience: A Convergence of Business Process, Decisi...Predicting the Customer Experience: A Convergence of Business Process, Decisi...
Predicting the Customer Experience: A Convergence of Business Process, Decisi...
Prolifics
 
Timothy_Dunham_Resume_080116
Timothy_Dunham_Resume_080116Timothy_Dunham_Resume_080116
Timothy_Dunham_Resume_080116
Timothy Dunham
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
Manish Dixit Ceh
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
mbmobile
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
NCTechSymposium
 
Using Modelling and Simulation for Policy Decision Support in Identity Manage...
Using Modelling and Simulation for Policy Decision Support in Identity Manage...Using Modelling and Simulation for Policy Decision Support in Identity Manage...
Using Modelling and Simulation for Policy Decision Support in Identity Manage...
gueste4e93e3
 

Similaire à Aberdeen Group Presents: Video Intelligence to Secure and Grow (20)

Business Intelligence Industry Perspective Session I
Business Intelligence   Industry Perspective Session IBusiness Intelligence   Industry Perspective Session I
Business Intelligence Industry Perspective Session I
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
Bi in telecom through kpi’s
Bi in telecom through kpi’sBi in telecom through kpi’s
Bi in telecom through kpi’s
 
How to Improve Overall Performance & Security For Any eCommerce Website In 2023
How to Improve Overall Performance & Security For Any eCommerce Website In 2023How to Improve Overall Performance & Security For Any eCommerce Website In 2023
How to Improve Overall Performance & Security For Any eCommerce Website In 2023
 
Data Analytics & Hospital Asset Managemenr
Data Analytics & Hospital Asset ManagemenrData Analytics & Hospital Asset Managemenr
Data Analytics & Hospital Asset Managemenr
 
Business Intelligence: Realizing the Benefits of a Data-Driven Journey
Business Intelligence: Realizing the Benefits of a Data-Driven JourneyBusiness Intelligence: Realizing the Benefits of a Data-Driven Journey
Business Intelligence: Realizing the Benefits of a Data-Driven Journey
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
 
The Science of Predictive Maintenance: IBM's Predictive Analytics Solution
The Science of Predictive Maintenance: IBM's Predictive Analytics SolutionThe Science of Predictive Maintenance: IBM's Predictive Analytics Solution
The Science of Predictive Maintenance: IBM's Predictive Analytics Solution
 
Predicting the Customer Experience: A Convergence of Business Process, Decisi...
Predicting the Customer Experience: A Convergence of Business Process, Decisi...Predicting the Customer Experience: A Convergence of Business Process, Decisi...
Predicting the Customer Experience: A Convergence of Business Process, Decisi...
 
Timothy_Dunham_Resume_080116
Timothy_Dunham_Resume_080116Timothy_Dunham_Resume_080116
Timothy_Dunham_Resume_080116
 
How Judson ISD Implemented and Tracks IT Metrics & Key Performance Indicators
How Judson ISD Implemented and Tracks IT Metrics & Key Performance IndicatorsHow Judson ISD Implemented and Tracks IT Metrics & Key Performance Indicators
How Judson ISD Implemented and Tracks IT Metrics & Key Performance Indicators
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Visual Risk Iq + Audimation Deck For Charlotte Iia For Pdf Only
Visual Risk Iq + Audimation Deck For Charlotte Iia For Pdf OnlyVisual Risk Iq + Audimation Deck For Charlotte Iia For Pdf Only
Visual Risk Iq + Audimation Deck For Charlotte Iia For Pdf Only
 
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
Continuous Transaction Monitoring Detect and analyze anomalous transactions t...
 
FDSeminar Reporting & controlling
FDSeminar Reporting & controllingFDSeminar Reporting & controlling
FDSeminar Reporting & controlling
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
Nimbus IP10 CJ Workshop
Nimbus IP10 CJ WorkshopNimbus IP10 CJ Workshop
Nimbus IP10 CJ Workshop
 
Using Modelling and Simulation for Policy Decision Support in Identity Manage...
Using Modelling and Simulation for Policy Decision Support in Identity Manage...Using Modelling and Simulation for Policy Decision Support in Identity Manage...
Using Modelling and Simulation for Policy Decision Support in Identity Manage...
 

Dernier

Dernier (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Aberdeen Group Presents: Video Intelligence to Secure and Grow

  • 1. Video Intelligence: to Secure, and Grow Recent Research Highlights December 2011 $ Derek E. Brink, BS, MBA, CISSP Vice President and Research Fellow, IT Security and IT GRC [email_address]
  • 2.
  • 3.
  • 4. Business Context: Value Chain and Market Trends in Video Security Risk Management Physical Security Information Management Video Analytics Video Surveillance Video Cameras Digital Analog
  • 5. Business Context: Value Chain and Market Trends in Video Security Risk Management Physical Security Information Management Video Analytics Video Surveillance Video Cameras Digital Analog IP-based Inertia against “rip-and-replace” Transitioning over (long) time Widely installed Leverage existing investments Cost Functionality Reliability In camera (IP-based) At camera (plug-and-play encoders) In back-end (transmit relevant data to centralized system) Remote Guarding Enterprise-wide view of risk Digital assets, physical assets, human assets Centralized Common view of logical and physical security posture Alerts  Situations Emerging standards Human  Automated Maximize resolution Minimize impact on network bandwidth, storage Rules-based  Behavior-based Aggregation Normalization Correlation Monitoring Alerting Analysis Reporting Security  Security + Growth
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Next Steps Aberdeen 3VR For more information on 3VR Products: Call: 877.387.6061 Visit: www.3vr.com Follow: @3vr For more information on Aberdeen: Call: 800-577-7891 Visit: www.aberdeen.com Follow: @Mobile Aberdeen
  • 20. For More Information Commercial / Marketing Services Dennis Beggan [email_address] +1-617-854-5395 Scott Mitchem [email_address] +1-617-854-5366 Research Derek E. Brink, BS, MBA, CISSP Vice President and Research Fellow, IT Security [email_address]

Notes de l'éditeur

  1. Analog (NTSC/PAL)
  2. Analog (NTSC/PAL)
  3. “ actionable data” = IT language “ situational knowledge” = public safety language “ total domain awareness” = language of the DoD, Dept of Homeland Security