SSI logo

SSI’s 2014 Industry Forecast: Quantum Secure’s Ajay Jain

Ajay Jain, president and CEO of Quantum Secure, shares his thoughts on where security technology is headed in 2014.



By ·

The January edition of SECURITY SALES & INTEGRATION includes our annual industry forecast as a cornerstone of our special 2014 Industry Forecast Issue. For the piece, I interviewed 25 of the industry’s most knowledgeable market analysts, business experts, security dealers, systems integrators, supplier representatives and trade association directors. Some of their perspectives can be found in the magazine article, with the balance of their assessments appearing in separate Under Surveillance blog posts.

Featured in this installment: Ajay Jain, President and CEO, Quantum Secure

What security technology changes do you expect to see for 2014?

Ajay Jain: As Physical Identity and Access Management [PIAM] and Physical Security Information Management [PSIM] technologies offer more ways to accrue data and increase interactions for security’s “customers” – the management team, employees, contractors and visitors – mobile devices and apps are facilitating the revolution, changing the way CSOs and other security professionals manage and provide security to organizations. Already a fixture in the lives of people around the globe, mobile devices and apps are now helping to amass data, track systems and automate formerly complex and cumbersome procedures with self-service for end users, audit certification by access area owners, management dashboards and improved situational awareness. This new, more customer-centric security has simplified and improved overall risk mitigation while also expanding ROI benefits into compliance, customer service, automation efficiency and cost awareness. 

As we continue to accumulate data and track more and more systems, this high-level security intelligence is changing the way organizations operate. Physical security is now able to provide intelligence and analytics that allow the organization to make decisions that affect the bottom line. For example, analytics can help determine how employees and commuters are utilizing office space when it comes time to expand or reconfigure. Customer-centric security is going to be an ongoing theme as easy-to-use mobile applications offer fast, automated means to facilitate procedures.

How will security technology address political, legislative and standards issues and needs in 2014?

Jain: PIAM is a valuable solution for assuring compliance with the many laws and standards relating to comprehensive monitoring and management of employee and visitor identities, along with control of access to critical areas. For example, PIAM enables compliancewith the three enforceable NERC-CIP cyber-security standards to help organizations perform a wide range of required activities related to identity and access management – and avoid significant fines. For HIPAA, PIAM helps to protect health-care data to maintain the privacy and security of individually identifiable health information, permitting each individual identity access only to what is dictated by defined policy. If a role or policy changes, that alteration triggers an automatic, complementary revision in other sets. Once policies and workflows have been created, PIAM software’s integrated monitoring and reporting features provide auto-remediation of compliance anomalies and reporting to enforce and maintain compliance. Complex tasks like this are essential elements of a PIAM system.

What are some pressing security industry issues you expect to remain unresolved? Any ideas how to address or improve these situations?

Jain: The biggest issue is still that physical security is viewed as a cost center rather than as providing value or improving the organization’s bottom line. A unified solution such as PIAM addresses this by increasing efficiencies, automating manual processes and allowing the physical security team to reduce operating costs. Further, organizations can realize significant savings via PIAM solutions – for example by automating compliance attestation, consolidating multiple applications into a single self-service tool, reducing manual updates/email via automated policy based notifications, and enabling personnel updates such as photo uploads.

A unified PIAM solution also presents security intelligence as a new opportunity for trend and data analysis in order to make better decisions for the organization. Beyond this, by centralizing security functions and analytics, business units can more easily expand to new markets as they will be able to update or deliver tools without the necessity for custom modifications for each location. This will help to guarantee business continuity and protect global assets, reducing overall physical and cyber security risks without compromising regulatory compliance requirement specific to each country.

What is something that might surprise people in 2014?

Jain: The best way to stay prepared for all the changes that the rapidly evolving global market will bring is by providing tools targeted to global locations and the multilingual workforce. That includes security portals that can be extended to support multiple-languages, along with localized services and mobile applications. All of these things will help employees and partners create and expand newer markets.


Article Topics
Blogs · Ajay Jain · PSIM · Quantum Secure · Security Predictions · Under Surveillance · All Topics

About the Author
Scott Goldfine
Scott joined SECURITY SALES & INTEGRATION in October 1998 and has distinguished himself by producing award-winning, exemplary work. His editorial achievements have included blockbuster articles featuring major industry executives, such as Tyco Electronic Products Group Managing Director Gerry Head; Protection One President/CEO Richard Ginsburg; former Brink’s Home Security President/CEO Peter Michel; GE Interlogix President/CEO Ken Boyda; Bosch Security Systems President/CEO Peter Ribinski; and former SecurityLink President/CEO Jim Covert. Scott, who is an NTS Certified alarm technician, has become a respected and in-demand speaker at security industry events, including presentations at the Central Station Alarm Association (CSAA) Annual Meeting; California Alarm Association (CAA) Summer and Winter Conferences; PSA Security Network Conference; International Security Conference and Exhibition (ISC); and Security Industry Association (SIA) Forum. Scott often acts as an ambassador to mainstream media and is a participant in several industry associations. His previous experience as a cable-TV technician/installer and running his own audio company -- along with a lifelong fascination with electronics and computers -- prepared Scott well for his current position. Since graduating in 1986 with honors from California State University, Northridge with a degree in Radio-Television- Film, his professional endeavors have encompassed magazines, radio, TV, film, records, teletext, books, the Internet and more. In 2005, Scott captured the prestigious Western Publisher Maggie Award for Best Interview/Profile Trade for "9/11 Hero Tells Tale of Loses, Lessons," his October 2004 interview with former FDNY Commander Richard Picciotto, the last man to escape the Ground Zero destruction alive.
Contact Scott Goldfine: sgoldfine@ehpub.com
View More by Scott Goldfine
Ajay Jain, PSIM, Quantum Secure, Security Predictions, Under Surveillance


Latest Download
The exponential explosion of digital video surveillance systems has…
Trending


SPONSORED LINKS


Don't miss out! Subscribe to Security Sales & Integration magazine today. - Security Sales & Integration

EDITOR'S CHOICE