Moving Into 2020: Video and IoT Trends

             As 2019 comes to a close and we begin to look forward to the next decade, we can now reflect on the year and the trends that have begun to influence both video surveillance and the physical security industries. December tends to be the start of a lull in business, including for the end user. Many businesses can be reluctant to make new purchases in security, or of any kind at the close of the year, and so those in the security industry also feel this slowdown. Still, this time offers us the chance to look forward and prepare for the coming year and beyond.
Here we will look into the security trends we expect in the near future.
Cybersecurity for IoT
            IoT device security will continue to be a major focus, as it has been throughout 2019. Threat actors will continue to target IoT devices at the enterprise level in order to attack business infrastructure. In fact, more than 30 percent of denial of service attacks are targeting enterprise IoT devices already. Because these threats continue to evolve, the IoT and physical security industries must make an effort to keep up with cybersecurity trends and take measures to implement defenses against these threats. Still, many integrators continue to ignore this aspect of the field simply out of a lack of knowledge and a failure to properly gauge the severity of the threat.
             One of the best solutions here are automated tools, which are more advanced than ever. These tools can seamlessly integrate IoT hardening without  requiring a significant level of cybersecurity knowledge. These tools can give a complete asset inventory, secure those assets, and then insure compliance through ongoing monitoring. Automated tools also offer reports to the end user which can be helpful in filling in security gaps and determining where weaknesses and potential breaches in infrastructure are at. It is critical for the modern integrator to adopt such hardening tools to implement security from the beginning and throughout the life cycle of a system.
Device Monitoring
               With IP cameras and other IoT security devices continuing to proliferate and expected to grow to billions of connected devices with IPv6, the demand for services that can assure and track physical security assets will grow alongside them. These device monitoring services track physical assets, monitor the performance of physical security and help with life-cycle management. Real-time management can be achieved through software platforms offering remote connections. These platforms help security integrators to assure system compliance, increase system up-time and performance, all while lowering the overall cost of maintenance. Such services also offer the benefit of RMR to the integrator through remote monitoring service contracts.
The Cloud
                      Much has been said about cloud computing, and it is perhaps one of the most important pieces of the modern internet, allowing off-site data storage and processing using the resources of cloud service companies rather than requiring traditional on-site server setups. Ease of use, reduction in cost, and the simple fact that cloud computing has been critical for the last several years all lead to the end-user wanting these services.
                      Decision makers want to move hardware off premises and are looking for cloud-based solutions to video, access control, device management and monitoring. This demand will increase with time as the cost of entry goes down and cloud computing becomes the gold standard for IoT security platforms. Access control software will be hosted in the cloud, with the data from IP cameras and other security infrastructure fed into it, processed, and stored.
                     There is the issue of upstream bandwidth limitations for some larger commercial security and surveillance deployments. But with 5G coming in the early 2020s, and storage becoming cheaper every year, this is something that will likely be solved in time. In the very near future however, expect some video storage for larger facilities to remain on-site along hybrid solutions involving the use of the cloud for analytics and event video archiving.
                      Another advantage of the cloud is that it streamlines software updates for applications and firmware. Failure to manually manage such updates has historically been a problem in maintaining a hardened network. The cloud allows both these updates as well as new features to be deployed rapidly and securely, all while reducing the costs for integrators.
                        These are all security themes we can expect to continue to grow into the coming years, and the opportunity to remotely service security systems through improved wireless and cloud infrastructure will be leading the way. We can expect the key security changes of the last 5 years to be predictors, ultimately leading us to an age of extremely fast and hardened wireless security that is fully scalable and as cost efficient for both the end-user and integrator as possible.

STST Inc. is South Texas’ source for professionally designed and integrated security and access control systems.

To set up an appointment to get a quote on your project,

Call us at 210-446-6306
or send an email through our website:

Brivo and Eagle Eye Network Integration

Brivo and Eagle Eye are now working together for total system integration of access control systems and cameras. With the ability to review live events and to record video to a Brivo Onair interface, this cloud-based solution is pushing the envelope in networked, cloud-based access control.
With Brivo Onair being fully integrated with Eagle Eye Networks, a fully comprehensive access control and video surveillance solution can be designed from the ground up. The platform exists in the cloud, taking care of the processing needed for access control and video monitoring, and it can be accessed and administered from anywhere, with any computer with a web browser.
An intuitive interface enables integration with Eagle Eye networks and makes administrating a system simple. On the Brivo home page are two new shortcut buttons. One of these accesses Brivo Mobile Pass, and the other takes you to the Eagle Eye video integration panel.
By logging into your Brivo Onair account and entering your Eagle Eye credentials, you have now created a link between the accounts. The next step will be to associate existing Eagle Eye cameras with the Brivo Onair account. Once this is done, you can access the Eagle Eye Directory in the sub-menu of your Brivo Onair account. This directory page will show you all Eagle Eye cameras that are presently associated with the Brivo account. In order to add new cameras, simply click the New Eagle Eye Camera button. On this page you can name each camera and associate both sites and devices to it.
This seamless integration between these two top-level access control and video monitoring companies gives you incredible ease of access, simplicity of administration, and cutting edge security for your building or site. STST is experienced with both Eagle Eye and Brivo systems and is the answer to your access control needs in South Texas.


Security Technology of South Texas is an authorized integrator for many surveillance and access control manufacturers and has designed systems with this kind of functionality.


Please contact us at on our website

or by phone at  210-446-4863   24/7

Brivo: A Fully Integrated Security Platform

Brivo systems for building security and access control are able to automate security and management of access control systems for buildings. These systems are fully scalable and are cloud-based.

The features of a Brivo access control system are robust and extensive. With general access control, building access control can be automated and include reports to your phone. Brivo offers a mobile management platform which allows administrators to enable users to access doors with their phones remotely. Visitor management is also a focus, and a comfortable and welcoming environment is maintained while still automating tracking of visitors.

Video surveillance cameras will offer real-time visual access to critical areas and simple access to visual records. Identity management updates the user identity across multiple IT systems. Elevator control is also available. This allows a view of who has access to what floors as well as the ability to manage elevator traffic in taller tower buildings.

Brivo uses a unique security platform called Brivo Onair API. This cloud-based solution allows building access control to be custom designed with centralized management. Of course, without solid cybersecurity, electronic systems such as these are vulnerable to attack and exploitation. Brivo builds their products to use 256 bit AES encryption, with no open inbound ports to allow for attacks. Real-time alerts allow administrators to see DDos and Bot attacks and begin to take action against the attack.

AES 256 bit encryption is the same protocol used in banks, and Brivo also employs a SHA256 certificate with a 4096-bit key. Control panels communicate on just a single outbound port (443), which greatly reduces the “attack surface” that open ports create in a network. The Onair Cloud service also has components to detect bots and DDos attacks, with every production component having a redundant counterpart. This includes firewalls, load balancers, web servers, application servers and database servers. Furthermore, an independent auditor conducts annual SOC 2 audits to verify full security and compliance of Brivo Onair systems.

This is a small summation of the technology behind Brivo’s industry leading access control and video surveillance technology. By putting total control in your hands, this cloud-based system allows simple, time-efficient management of systems of any scale remotely.

The user can feel safe in the knowledge that Brivo is aware of potential risks and attack vectors, and has taken measures to protect against them. While these details of cybersecurity are not often looked at in depth in articles about access control, they are critical in ensuring the safety and viability of the system, and without them, an access control system may merely be creating new vulnerabilities to a buildings security and safety.



Security Technology of South Texas is an authorized integrator for many surveillance and access control manufacturers and has designed systems with this kind of functionality.

Please contact us at on our website

or via phone at 210-446-4863 24/7

SALTO XS4 GEO Cylinder and The JustIN  Mobile Interface

SALTO’s range of compact electronic cylinder locks are designed for doors where fitting a full-sized conventional handle and lock is not possible or needed. These cylinder locks, like the other SALTO products, are totally free of wires and are networked through the SALTO Virtual Network and SALTO Wireless network.


Several models are available including half cylinder, cylinder with thumb turn, double cylinder, padlock, and with a wide variety of profiles, e.g., Euro profile, UK oval, Swiss Round, Australian oval, Scandinavian profiles, ANSI profiles.


These locks can be integrated into existing Brivo infrastructure, among other manufacturers. It is also common for SALTO secured facilities to include interior facing panic bars to equip emergency exit doors with the ability to trigger a panic alarm as soon as they are pushed open.


In order to bring smartphones into the access control environment, SALTO uses their JustIN technology to integrate smartphones with their locks. JustIN Mobile BLE permits doors to be opened via smartphone, turning the phone into an update terminal for credentials.


This is accomplished through Bluetooth Low Energy (BLE), a standard for communicating between a smartphone and electronic locks. The mobile key is provided Over the Air (OTA) from proprietary management software to an installed JustIN Mobile app on a registered and verified smartphone. After this, the user will receive a message that a new key has been provided and information on which doors he now has the access rights to.


After this, the user only needs to present the smartphone to the lock in order to gain access. All data including the mobile key are encrypted and secured against cloning.


Because users can get these mobile keys at any time and any place, access control solutions are given greater flexibility when issuing and receiving rights without losing out on security.


This system can be used in conjunction with or as a replacement of RFID credentials.


Another SALTO protocol for phone based access control integration is JustIN mSVN.


JustIN mSVN (mobile SALTO Virtual Network), is technology for updating access rights for any credentials using mobile communications. It makes use of the mSVN app and the NFC interface of smartphones. Through this technology, the SVN can be expanded to spots with no online wall reader. Access rights are updated via direct communication between the phone and the credential instead.


Any new access rights or blacklist information are communicated to the user from a server to the mSVN app. The smartphone will then serve as the update point for any new credentials moving forward, taking the place of what an XS4 online reader would usually do. All data is encrypted and secured using Mifare DESFire EV1 technology.


Security Technology of South Texas is an authorized integrator for many surveillance and access control manufacturers and has designed systems with this kind of functionality.


Please contact us at on our website


or via phone at  210-446-4863   24/7