Technology Command

Technology Command is the capability to have your electronic physical security technology do what you want it to do, in a manageable, scalable and cyber-secure way that helps to maximally enable your organizations operations and bring more business value to the table.

Day Two of GSO 2025 lets you examine advanced technology capabilities using hands-on exploration and immersive technology experience as well as individual in-depth discussions with technology experts. The descriptions below will give you some idea of what you’ll be delving into.

Bring Your Own Risks

Bring your own risks and get your own people-process-technology use case solutions. A multi-layer approach to risk mitigation (no single points of failure) usually involves policy and procedure as well as technology application elements.

Day Two’s afternoon is dedicated to those kinds of discussions among practitioners as well as with speakers and solution providers. This is the time to explore typical deployment timelines and project challenges and learn what’s involved for security and IT role decisions, planning and preparations.

 

We Can Now Fix the Key Shortcomings of Most Security Technology Deployments

  • Correcting Common Security Deployment Weaknesses. We are at a historic watershed moment in the advancement of electronic physical security technology. The next 10 years of physical security will be a radical transformation from the previous 50 years – thanks to the latest advancements in AI, automation and intelligent devices, and the continuing exponential advancement of technology.

  • Security Industry’s #1 Failure. The number one failure in the physical security industry has been: we keep claiming that products achieve “situational awareness” but that’s only if the situation is evolving at a snail’s pace. Otherwise, we fall minutes and hours behind what’s going on in real time.

    Security operations centers are almost always playing catch-up from the moment we detect an incident, which is usually minutes to hours after the fact. Rarely are the security responders called to action when they are first needed, and even then, they can’t keep up.

  • On Day Two you will learn about the advances in situational awareness capabilities for many important aspects of security.

    • Security Industry’s #2 Failure The number two failure of the security industry is the proliferation of products and systems that aren’t easily manageable at any but the smallest scales of deployment.

      How long it would take you, in response to the report of a credible threat from the FBI, to change the passwords and upgrade the firmware of all your cameras? If you don’t have automated tools to accomplish it, you can’t do it in just a matter of hours or days that the situation may require. This is why we waste the time of security command center staff in checking to see if cameras are online and recording. This is why security investigators commonly report that 10% to 15% of the time when they are looking for evidence, they can’t find video that should be there. Systems that function only 85% to 90% of the time are not acceptable in other industries. Now they don’t have to be in physical security.

      The same goes for physical access management. Can you guarantee that 100% of your access privilege assignments follow the principle of least privilege, are correct for all job roles and all critical asset areas, including training and contractor insurance needs, employment status and other requirements? If you think that they likely are, can you prove it? Fortunately, a lightweight combination of AI and automation – that works with whatever people roles and processes you have in place now – eliminates these problems for all existing access control system deployments and any number of sites. You can see how this works and try it out on Day Two of GSO 2025.

    Hands-On Technology Experience

    We continue to refine the design of our Day Two technology experience, and will update the list below as the event date approaches. Our Technology Experiences and Demonstrations include:

    • Zone-based wireless device threat detection
    • Radar-sensor-based occupancy detection
    • 3D tailgating control for any type of pedestrian door and any access control system
    • Fast and touchless biometric access control
    • Fully GDPR-compliant face authentication access readers compatible with all existing access control systems – with no new databases or changes to existing databases
    • Virtual SOC and EOC capabilities
    • 3D facility-digital-twin based command center capabilities with see-through wall capability, embedded camera real-time scenes, and individual perspectives for each operator, securely shareable with first responders
    • . . . and more