A better way
to secure your
business
White paper: M2M for business security
m2m.vodafone.com
Vodafone
Power to you
What this paper is about
Security is an industry in flux. While in many cases the core activities
and tools haven’t changed — CCTV for monitoring and alarms
for perimeter protection, for instance — technology has evolved
rapidly. This is creating new possibilities for securing businesses and
their assets against theft, fire and other risks. Machine to machine
(M2M) communications in particular has enabled a step change in
functionality in three security applications: alarm systems, CCTV
and asset tracking. This paper is specifically aimed at manufacturers
and distributors of security equipment, but will also be relevant for
enterprises with significant or specific in-house security needs.
Contents
Better security, lower cost ................................................... 3
M2M: connected security ..................................................... 4
End-to-end intelligence ....................................................... 5
Case studies ............................................................................. 6
Making it happen..................................................................... 7
About Vodafone ....................................................................... 7
M2M for business security
Better security, lower cost
Technology is the key
Every year, businesses are the victim of crimes, such as theft, that
erode profitability. For instance, theft costs the worldwide retail
industry $128 billion in 2013 according the Global Retail Theft
Barometer.
Thefts occur despite the investment many companies have
made in security infrastructure, because many of today’s security
systems still have weak spots, such as:
• CCTV cameras and alarms can be disabled by cutting their
cables.
• Remote locations, where it’s impractical to install phone lines
to connect cameras and alarms, are prime targets.
• Alarms and cameras often go unmonitored — according to
Berg Insight, an estimated 75% of Europe’s 30 million alarms
are totally unmonitored.
• Connected alarm and camera solutions have been prohibitively
expensive.
Increasing security coverage
To stay one step ahead of criminals, organisations and their
security providers need to take a new approach. Site security
devices like alarms and cameras need to be tamper-resistant and
functional even at remote sites. Rather than just being passive
observers, devices need to be active, intelligent participants:
alerting guards or the emergency services when there’s a security
breach. And coverage should extend beyond the perimeter,
covering assets and goods in transit.
Reducing security costs
Increasing security often means increasing costs — and many
enterprises have difficulty balancing what risks they can accept
with what they can afford. Whether you’re a manufacturer, installer
or security customer, it’s in your interests to make security
cheaper and easier to deploy and to run. Installing traditional
fixed-line connections to cameras and alarms is expensive and
takes time, particularly in remote sites; manual monitoring of
mobile assets, for example in a global logistics network, is often
simply impossible.
Nearly 19 million M2M security solutions are
predicted to ship in 2018, up from 4.8 million in
2013, according to Berg Insight.
3
M2M: connected security
Imagine if security devices could keep you constantly informed about
an asset’s status, wherever it is. With M2M, they can.
Connected, intelligent security
M2M security is connected security.
Each camera, alarm or monitored asset is
constantly connected to central systems:
whether that’s a security provider’s
monitoring station or an enterprise’s own
tracking systems. Often, that connection
is wireless — there’s a SIM in the asset,
just like in your smartphone — but M2M
devices can also be configured with wired
connections or even satellite links. The
connectivity may take different forms:
• A camera might transmit footage to
a national control centre, and send
priority alerts when intelligence in the
device identifies movement or other
unexpected events.
• An asset-tracking solution might
monitor location and speed, so a central
management system can trigger an
alarm should a vehicle deviate from its
planned route, for example.
• An alarm might send occasional status
updates, and notify the emergency
services directly when a breach occurs.
Advanced connectivity, available today
All the technology required for M2M
in these three applications is already
available. Wireless networks have
now achieved global coverage, with
international SIM roaming providing cost-
effective connectivity for M2M devices.
The advent of 4G networks means high
bandwidth services — such as high
definition video — can be delivered
wirelessly. At the same time, global
wireless standards ensure compatibility for
devices, M2M applications and underlying
infrastructure.
M2M modules are small, can be rugged,
and have low power consumption, which
means they’re practical to install into
alarms and cameras and can operate for
extended periods even in hostile conditions
without the need for maintenance.
M2M
platform
CCTV camera
Track and trace
Monitoring devices Access devices
Automated or
managed
monitoring
Mobile platforms
Ad hoc
monitoring
Security alarm
M2M for business security
End-to-end intelligence
So what can M2M security do for businesses?
Improve security and coverage
Using wireless technology, M2M-enabled
cameras and alarms can be reliably
connected to the emergency services or
private monitoring station. Because there
aren’t any wires to snip, this connection
is much harder to break — and because
the device is constantly connected, any
interruption can be spotted by central
systems immediately.
Furthermore, because M2M security
devices can be fitted with batteries, or in
some cases a solar panel, they don’t need
a physical connection to operate, enabling
them to be deployed in remote locations,
increasing the overall reach of your
security net.
Reduce theft and shrinkage
M2M-enabled asset tracking enables a new
kind of security, helping to prevent the
theft of valuable mobile assets — such as
vehicles, stock and plant — and reduce the
risk of shrinkage. ‘Track and trace’ acts as a
deterrent to would-be assailants and helps
the recovery of stolen goods.
Cut installation and management costs
Because M2M-enabled security devices
often connect to wireless networks,
there’s no need for expensive, disruptive
and time-consuming drilling or cabling at
installation.
As well as being rugged and needing
minimal routine maintenance, M2M-
enabled devices can often report any
technical problems before security is
compromised: for instance, if a camera’s
backup battery is running low, or if an
alarm has lost signal from a door sensor.
Many M2M security solutions offer a
centralised management platform,
enabling customers to centrally activate,
suspend and deactivate devices with the
click of a button.
Increase business insight
M2M-enabled devices gather and
communicate a vast amount of data that
can generate real business value beyond
the obvious security applications. For
example, by processing video from CCTV
systems, a business could, as well as
maintaining safety, optimise the flow of
trucks to and from remote sites such as
quarries and landfills.
Asset tracking systems take this further:
with a live picture of where every truck
and shipment is and what it’s doing, an
organisation can streamline route planning
and driver shift scheduling.
Trackers can be fitted that monitor
conditions other than just location — such
as ambient light or temperature. That gives
firms the reassurance that their goods
will arrive at their destination in perfect
condition.
5
Case studies
iDefigo takes remote surveillance
global with Vodafone
New Zealand’s iDefigo specialises in
remote security solutions. Its Mi5 Security
solution is a low-power, mobile camera that
can be installed in sites that don’t have
power.
Its cameras protect and monitor sites
around the world with always-on
surveillance at warehouses, factories,
project sites, remote business locations
— even rivers. Footage is sent to business
owners and directly to the emergency
services.
While iDefigo started in its home country,
its cameras are now in use across the
globe. Its customers range from farmers
in rural New Zealand to environmental
authorities in Europe.
Vodafone is providing iDefigo with 25,000
global SIMs to support its global expansion.
That means the camera can be installed
easily in any region iDefigo’s customers
need. And with the advent of 4G, iDefigo
can provide high-definition video footage,
where needed.
“We looked at all the international carrier
groups. It was clear Vodafone was our
best option,” says Helen Wattie, Group
CEO, iDefigo. “Their understanding of
the possibilities of M2M are better than
anyone’s.”
NanoTag Technology makes security
tracking smaller and smarter
Sydney-based NanoTag Technology is
helping clients in the automotive, fashion
and pharmaceuticals sector, to fight
counterfeiting.
It’s latest Black Knight trackers are small
enough to be fitted discreetly onto goods,
and can be located accurately within a five
meter radius in over 200 countries across
the globe.
NanoTag Technology needed a global
partner that could provide worldwide
connectivity, using a single SIM.
Black Night uses Vodafone’s Global M2M
SIM, which makes it easier for clients to
deploy the trackers, and cheaper for them
to operate.
“The Vodafone Global M2M SIM
means it connects to satellites and
telecommunication companies in over 200
countries without ever having to change to
a local SIM card to connect,” says Ian Allen,
executive chairman, NanoTag Technology.
CSL DualCom expands into Europe
CSL DualCom provides SIM-equipped M2M
alarms and access control solutions for
thousands of commercial and domestic
properties across the UK, giving it 25%
market share. Because incidents can
happen at any time, 24-hour service
availability is of absolute importance, and
CSL Dualcom has worked with Vodafone
for years to provide reliable connectivity
for its customers. It decided to expand
its business into Europe, and Vodafone
was the obvious choice to provide an
international M2M solution.
Now, CSL DualCom offers alarms across
Europe, with Vodafone providing a fixed
monthly per-SIM fee regardless of country
— helping the company to minimise the
complexity of managing international
deployments.
Vodafone helps support additional features
on the CSL DualCom portal. “We’ll have a
graphical user interface front-end showing
everything from performance to signal
strength,” says Simon Banks, CSL DualCom
co-founder. “We have some customers with
over 700 connected devices and they want
to see what’s going on across their estate.
Having that visibility is a huge boost to
customer satisfaction.”
Security alarmsCCTV cameras Track and trace Security alarmsCCTV came s Track and trace Security alarmsCCTV came s Track and trace
“When we say 24-hour availability, we mean it. We have to be more ‘on’ at
4am than at 4pm – that’s when burglaries happen. Vodafone gives us that
reliability and it’s a solution we can trust.”
Simon Banks, co-founder, CSLDualCom
M2M for business security
Making it happen
Processes have to change as well as devices
In applications such as surveillance cameras, alarms and asset
tracking, M2M offers a clear return on investment for both
providers and enterprises. But achieving better security and lower
deployment and running costs does require an investment. New
cameras and alarms have to be developed and installed that are
configured to transmit information to central systems. In many
cases those central systems too need creating or modifying. And
then there are integration decisions: where do camera images get
sent and stored? How do they get monitored? And what business
processes are in place to react to alerts received?
Changing how security works
For security companies, offering M2M-enabled security may
be an opportunity for a shift of business model, from providing
infrastructure on a product-sale basis to offering a fully managed
service. Obviously this will involve changes to everything from
your marketing to your billing systems. It’s a big change, but
an enormous opportunity. And it can be a real advantage for
enterprise customers too that are looking to reduce the capital
investment and management overhead of running security.
Where do you start?
As you approach M2M, look for a provider that will work with you to
demonstrate the potential of M2M at a well-equipped M2M testing
centre. It should help you scope out your requirements, specify
and build an appropriate data connectivity concept, and design a
comprehensive solution including:
• A global M2M platform, essential for managing connectivity.
• Global SIMs, so you can deploy equipment wherever sites and
assets need monitoring.
• Preconfigured M2M devices for easy integration.
• Global footprint, for network connectivity, service and 24x7
support.
• Help with application development to speed time to market.
To be secure, you need a comprehensive understanding of
potential threats. Your M2M solution needs to be equally holistic.
Vodafone M2M solutions can help you improve your security at
every level.
About Vodafone
Vodafone is one of the world’s leaders in M2M service delivery. We’ve been working in M2M for over 20 years, and today
we provide full support for M2M security solutions, including alarms, CCTV and asset tracking.
Our capabilities include: global M2M platform; global M2M-specific SIM cards; a broad portfolio of M2M terminals,
application and service enablement development, testing and deployment; network connectivity — all from a single
supplier, with a single contract.
To find out more about how we support M2M security solutions globally, or how our portfolio of wireless
communications solutions can support your business, please contact your Vodafone account manager,
email [email protected], or visit m2m.vodafone.com
7
m2m.vodafone.com
Vodafone Group 2015. This document is issued by Vodafone in confidence and is not to be reproduced in whole or
in part without the prior written permission of Vodafone. Vodafone and the Vodafone logos are trademarks of the
Vodafone Group. Other product and company names mentioned herein may be the trademarks of their respective
owners. The information contained in this publication is correct at time of going to print. Such information may be
subject to change, and services may be modified supplemented or withdrawn by Vodafone without prior notice. All
services are subject to terms and conditions, copies of which may be obtained on request.
A Better Way to Secure Your Business
Security is an industry in flux. While in many cases the core activities and tools haven’t changed — CCTV for monitoring and alarms for perimeter protection, for instance — technology has evolved rapidly. This is creating new possibilities for securing businesses and their assets against theft, fire and other risks. Machine to machine (M2M) communications in particular has enabled a step change in functionality in three security applications: alarm systems, CCTV and asset tracking. This paper is specifically aimed at manufacturers and distributors of security equipment, but will also be relevant for enterprises with significant or specific in-house security needs.
Latest in Home