Keeping People Safe With IOT | Armored Things
(pulsating electronic music) >> Welcome everybody, this is theCube, I'm Paul Gillin. Physical security and cybersecurity have traditionally been sort of isolated worlds, they didn't talk to each other. But in the age of the Internet of Things we now have unprecedented opportunities to unite these two traditionally separate areas. Armored Things is a startup out of Boston and is doing some very interesting work in using intelligent devices to make decisions and to intuit patterns in crowd behavior which has applications in cybersecurity, crowd management, traffic management, a lot of different potential uses of this technology. With me are Julie Johnson the co-founder and President of Armored Things, and Chris Lord, the Chief Technology Officer, Welcome. >> Thank you. >> Why don't you describe in a nutshell, let's start out, what you do Julie. >> Great, Armored things is building software to do next generation incident response. We're using the IOT devices and their data to power decisions across large environments used for safety. So for example the data that we're collecting can be used to get better situational awareness within seconds and drive incident response in seconds instead tens of minutes, which is the state of the art today. >> And so it's sounds like, is security the primary target area or are there others? >> That's right, we sit at the intersection of physical and cybersecurity. This information can also be used to drive additional value over time but right now we're really focused on achieving that mission, using these devices, this technology to improve both the physical and cyber realms for Internet of Things. >> Chris why don't you give us an example of how your technology might be applied? >> Sure, so a very common one is, you know active shooter. People are very concerned about active shooter, and so how can you leverage all the data that you have across different devices, different systems that you have out there, in order to understand what happened, and get people the right information at the right time. A more commonplace example might be something like a protest formation. So if you look at a university campus where you might have a controversial group meeting on campus and you need to get early warning when there's a protest forming on the other side. Our technology will allow you to see that before it's gotten to a critical proportion or before it's marching down the street. >> So why don't you take a deeper dive and talk about what, how are you federating these devices? How are you using these multiple devices together? >> Well that's exactly what we are. So we're a data analytics layer across all the silos of data that you already have in your environment. So as you look around you might have motion sensors in your environment, you might have access control systems in your environment, you have wireless infrastructure in your environment, all these things are used for specific purposes now but nothings really trying to correlate and connect the data across all of them. So Armored Things builds a layer across all of them, brings that data together to give you better understanding of what's going on in your environment, people and your physical space. >> Julie talk about how the company came about, what are the origins? >> Sure, so I started working with Charles Curran our CEO about two years ago at Qualcomm. We were really focused on understanding the security portion of the IOT layer and how to manage these things in enterprise. So if you're familiar with IOT in the household there's been a lot of proliferation around turning your lights on, understanding who's at your front door, but in enterprise it's been much slower to adopt. Fundamentally we believe that part of that was because management took a lot of time. Every time you provisioned a device it took a number of minutes and because there was an intrinsic lack of security on each of the devices. So we went around and started talking to different potential customer groups about what it would look like to bring more IOT into their environments. And we really got pulled into universities, and large sporting and entertainment venues, who we're still working with as our primary customers today. Because they saw a desperate need for IOT, not only to save time on managing these devices, and to make sure that they're secure in their environments, but also to use them for physical security. So now that we've spent, you know $15 million in selling IP video cameras, or a few million dollars in selling access control systems, how do we actually elevate their use from what they were initially intended for. That spend has a secondary use when it comes to physical security. That ability to, you know quickly get cameras on the scene of an incident. That ability to harness data coming off of motion sensors or environmental sensors. How do we use all of that information to drive an awareness of our environments day-to-day and then use it in critical emergencies for a better response. >> I understand you're working with some sports teams right now. Can you describe a scenario in which you might be able to help them manage crowds more effectively? >> So there was a great example we heard about two weeks ago from a top team, who's recently hosted some World Series events. They had a unfortunate incident where they were watching, they were hosting a watch party for the World Series in their venue during an away game, and they handed about 40,000 paper tickets out. They got a great turnout, 20,000 people came to the venue. But in the seventh inning of the game the other 20,000 people decided that they also wanted to be in the venue in order to celebrate. That was a pretty unanticipated event. Usually in the fifth or sixth inning you start to consolidate your entrances, you start to consolidate your security personnel and send them to other parts of the venue, and the net result of that was they ended up closing the doors, not allowing additional entrance in, and tweeting that there wouldn't be additional people allowed to enter. There were a lot of security issues with letting 20,000 people in, in the seventh inning, not of the least is you don't know where they're coming from, and you don't really know what their intent is in coming so late to that venue. But there's patterns in the data that we could've seen sooner. So hypothetically, understanding that a normal game day has a couple hundred people entering in the fifth, sixth, seventh innings. Seeing a significant uptick in that number of people coming into your environment should immediately say, what's unique, you know what's different about this situation? Now how do I tie in my resources, my security personnel, my responders, and just maybe notify people who are in charge of making these types of decisions, so that we're not closing the gate and tweeting out to our fans that there's no more entries. >> And getting back to the technical nuances of this situation, how might your technology detect this crowd assembling before it was even visually apparent? >> Good question, so there's many, many different things. So part of what we do is rely on diversity of data from different sources. So that might be mobile devices. That might be from wireless. That might be from cameras that you have there and doing occupancy counts on those cameras. It might be from other, you know motion sensors you have in your environment. All this data gets aggregated so that we can come up with a good understanding of population and flow within your environment. So we would have early indications and bring that awareness to people that have to respond, people who might be sitting in a network operations center, and looking at other cameras but not seeing the information. So we can bring the information right there, notify them that there's a problem forming before it's gotten to critical proportions. >> Fantastic. >> One more thought on that is there's kind of a unique advantage in data to go beyond what humans can perceive. When we're looking at these knocks, you know they have thousands of video cameras potentially united in one central screen. It takes not only having the right camera up but also noticing a degree of difference that might be quite minute, to actually see it as an anomaly in real-time. So you can imagine, you know a university campus where people are walking through the campus at a certain pace every single day. One day everyone's walking just 30% faster, not running just walking, why? You know is there a suspicious package? Is there someone gathered there that you know is attracting people that they don't necessarily want to be associated with, or end up in a vulnerable position? How can we see that in the data faster than someone in the control room might notice it and alert people to respond. >> And with machine learning, of course now we have the means to do that. Chris, talk about the, it strikes me that there must be a lot of complexity involved. You've got a great diversity of devices out there you have to connect to. Every institution would have a different fabric. How are you technically pulling this all together? >> Well the nice thing about a lot of these technologies is there is standardization across many of these different types of devices, and there are, you know there are tiers of players right. And so we do have to be selective about who we integrate with. We are integrated with the top-tier players in all these categories, and we'll prioritize other integrations over time based on our customers and our market so. >> And Julie, what are your plans for deployment? What's your timeframe? >> We're looking to rollout our first generation of product in the next nine to twelve months. That really drives home at that situational awareness piece. So before we even get to building through incident response at scale, the ability to give people very specific cues during a critical emergency. How do we start with getting more information to the people who are there? So getting occupancy, flow, the dynamics of movement around a campus or a large venue. How do we start equipping the police personnel, and security personnel to make better decisions and drive value from there. >> I understand there's no shortage of demand for your solution. >> We do have some top-tier universities, and pro-sporting and entertainment venues who we're working with to build the right solution not just the solution that we think is needed, but the solution that they're telling us, "Hey we would really like to use something like this." >> I also understand you've pulled together a team, kind of a dream team, talk about some of the people that you've brought on board for this operation which few people have even heard of. >> Yeah so I think the first of those you're seeing here, so Chris joined us as co-founder and CTO and has been really an asset to this team given his background in cybersecurity from Carbon Black and before that. And you know if you want to add more to that please feel free to. >> No thanks. >> We've also brought in, I would call it two pillars of our strategy. One one the physical security side and one on the machine learning data analytics side, and those two women are Elizabeth Carter. Who came to us from Apple, where she led crisis management for the Americas. She previously worked at Chertoff Group where she sat at the intersection of physical and cybersecurity, and before that actually worked for the city of New York, where she understood weapons of mass destruction, different types of biological and chemical weapons response planning. So she's kind of the pillar of our physical security response understanding and driving product. The other woman, her name is Clare Bernard and she recently joined us from another Boston startup called Tamr where she was running product and engineering for them. Clare's background is actually in particle physics. She was BU and John's Hopkins, and happened to work with the team that discovered the God particle while she was getting her PhD. So we' think she's as smart as you can find, and is going to help us think about these data challenges, the analytics piece at a scale that, you know we think has the potential to really improve physical security and cybersecurity. I would be remiss if I didn't mention the rest of our team. Our CEO Charles comes from a background in the venture capital community and is just incredibly knowledgeable about the process of building a company from the ground up, and has many skills when it comes to recruiting as well. Really helped drive some of these hires forward and the rest of the team is the next generation of rising stars, people from Oracle, HP Vertica, other Carbon Black individuals. People who just have experience from across the board that's going to help us build the right solution. >> And you know at a time when diversity has been a major issue for tech companies, I understand your team is unusually well represented. >> I think our executive team is about 60% women, which we're very proud of. I think our team in general might actually be, >> About that too, yup. >> About 60% women, which we're also very proud of. And I'd like to say that that's organic. That we've worked with some great advisors and potential customers, and I do think that from my perspective, it's been helpful to have younger women coming in who see a path forward for senior women in executive roles in their company. I think that's something that can't be underestimated. >> Where do you stand in funding right now? >> We just closed our first institutional capital about a week and a half ago. We're still finishing the close of that round but we have a Boston based partner who's very focused on machine learning and analytics, and also has been a well recognized investor in the cyber security realm. So we're very fortunate to have this investor as our partner, and excited to keep working with them. >> Chris, as someone whose background is in cybersecurity how do you see the security landscape changing now with the IOT coming on and the possibility of really transforming the way organizations look at their physical and cybersecurity operations? >> Good question, so over time they're converging, and they're converging I think more rapidly than we expected, so now I'm going to step back a little bit and say that there's a lot of parallels. Cybersecurity I think is probably about five years ahead of physical security in terms of maturity of technology and approaches to problems. And then so what we're seeing right now, and we're part of the force behind that, is taking the learnings from cyber security and applying them to physical security right. So when we talk about situational awareness, when we talk about the data analytics that supports that, and when we talk about incident response and orchestration automation. All of those are core to taking cybersecurity and applying it to physical security. In terms of convergence, we're seeing many cases, and this is going back a number of years, where people are using cyber events to create physical problems right. Stuxnet is a classic example, but you can do the same thing by taking over something and instilling panic in a stadium, and causing you know, all sorts of grief, cyber driving physical. You can also see cases where people who are running cybersecurity operation centers want access to physical knowledge of their environment in order to do their job better. Whether it is a malicious insider that they suspect, whether it's an infection that occurs on a particular machine, being able to pull up the cameras, know who was there at the time, bringing all that information together, is again necessary in order to understand their perception of situational awareness. So two converging towards one, we're going to be building towards that goal from our perspective. >> Now the flip side of federating IOT devices is that the bad guys can do the same thing. So you potentially have a much broader attack surface. That has to be factoring into your thinking. What is the embedded security in your platform? >> So, we're not going to address fully that right now, but so we take advantage of best in breed security principles in our design both for security and for privacy. But in terms of the dependency we have on a lot of IOT devices and IOT systems, part of what helps us is diversity of data across those, and diversity of devices right. And so while you might have compromises in specific cases, the fact that you are dealing with so many, and so many different categories at the same time, allows you to maintain and fulfill your mission, and deliver what you're trying to do regardless of some of those individual compromises. We're also in a unique vantage point where we can actually see the operational integrity of what's going on. So when you look across all those different categories and you look at the data that we're collecting, whether it's malicious or not, we're able to identify a failure, and bring that to the attention of the people who are dependent on those systems. So we could be an early morning to cyber events, malicious or not. >> Julie, entrepreneurs love to dream. I'm sure you are thinking big, beyond the immediate cybersecurity applications. Where could Armored Things eventually go? >> That's a great question. The dream is that we become not only the dominant solution for physical and cyber security for schools and large venues. But we bring our solution into K, 12 where some of this is desperately needed. That's kind of the mission orientation of our team. How do we start to drive value in a way that we can get to every school in the country sooner. In the longer term though, I think there's a lot of opportunities with IOT and we're still kind of at the tip of the iceberg here. We're going to see all sorts of new devices come online over the next two, five, 10 years. The growth of these devices is incredible. And the question is how do we continue this challenge of solving the data at scale in a way that continues to drive value, not just for some of the first use cases, which are often around marketing, and understanding an environment in that sense, but also continuing that physical cybersecurity angle. >> Enormous potential and hope you stay based in Boston. We can use more companies like that. Chris Lord and Julie Johnson, thanks very much for joining us today on theCUbe. >> Thanks Paul. >> Thank you. >> Armored Things, keep your eye on them. You're going to be hearing a lot more about this company in the months to come. I'm Paul Gillin, this is theCube.
SUMMARY :
and Chris Lord, the Chief Technology Officer, let's start out, what you do Julie. and their data to power decisions this technology to improve both the physical and so how can you leverage all the data and connect the data across all of them. and how to manage these things in enterprise. Can you describe a scenario in which you might be able not of the least is you don't know and bring that awareness to people that have to respond, and alert people to respond. of course now we have the means to do that. and there are, you know there are tiers of players right. in the next nine to twelve months. for your solution. not just the solution that we think is needed, kind of a dream team, talk about some of the people and has been really an asset to this team and is going to help us think about these data challenges, And you know at a time when diversity I think our executive team is about 60% women, and I do think that from my perspective, in the cyber security realm. and applying it to physical security. is that the bad guys can do the same thing. and bring that to the attention of the people beyond the immediate cybersecurity applications. And the question is how do we continue this challenge Chris Lord and Julie Johnson, in the months to come.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Chris | PERSON | 0.99+ |
Julie Johnson | PERSON | 0.99+ |
Elizabeth Carter | PERSON | 0.99+ |
Chris Lord | PERSON | 0.99+ |
Julie | PERSON | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
Charles | PERSON | 0.99+ |
Charles Curran | PERSON | 0.99+ |
Boston | LOCATION | 0.99+ |
Clare | PERSON | 0.99+ |
$15 million | QUANTITY | 0.99+ |
New York | LOCATION | 0.99+ |
Paul Gillin | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
Carbon Black | ORGANIZATION | 0.99+ |
Paul | PERSON | 0.99+ |
sixth | QUANTITY | 0.99+ |
five | QUANTITY | 0.99+ |
20,000 people | QUANTITY | 0.99+ |
World Series | EVENT | 0.99+ |
Qualcomm | ORGANIZATION | 0.99+ |
Chertoff Group | ORGANIZATION | 0.99+ |
tens of minutes | QUANTITY | 0.99+ |
fifth | QUANTITY | 0.99+ |
each | QUANTITY | 0.99+ |
30% | QUANTITY | 0.99+ |
two women | QUANTITY | 0.99+ |
10 years | QUANTITY | 0.99+ |
seventh inning | QUANTITY | 0.99+ |
Clare Bernard | PERSON | 0.99+ |
first | QUANTITY | 0.99+ |
Tamr | ORGANIZATION | 0.98+ |
Armored Things | ORGANIZATION | 0.98+ |
one | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
both | QUANTITY | 0.98+ |
One | QUANTITY | 0.98+ |
Americas | LOCATION | 0.98+ |
HP Vertica | ORGANIZATION | 0.98+ |
thousands of video cameras | QUANTITY | 0.98+ |
first generation | QUANTITY | 0.98+ |
sixth inning | QUANTITY | 0.97+ |
about 40,000 paper tickets | QUANTITY | 0.97+ |
John's Hopkins | ORGANIZATION | 0.96+ |
about five years | QUANTITY | 0.96+ |
seventh innings | QUANTITY | 0.95+ |
theCube | ORGANIZATION | 0.94+ |
one central screen | QUANTITY | 0.93+ |
About 60% | QUANTITY | 0.93+ |
twelve months | QUANTITY | 0.92+ |
about a week and a half ago | DATE | 0.92+ |
two pillars | QUANTITY | 0.92+ |
Apple | ORGANIZATION | 0.91+ |
about 60% women | QUANTITY | 0.9+ |
two years ago | DATE | 0.89+ |
One day | QUANTITY | 0.87+ |
first use cases | QUANTITY | 0.85+ |
couple hundred people | QUANTITY | 0.83+ |
about two weeks ago | DATE | 0.8+ |
few million dollars | QUANTITY | 0.79+ |
first institutional capital | QUANTITY | 0.79+ |
One more | QUANTITY | 0.76+ |
separate areas | QUANTITY | 0.75+ |
every single day | QUANTITY | 0.73+ |
theCUbe | ORGANIZATION | 0.7+ |
IOT | ORGANIZATION | 0.65+ |
President | PERSON | 0.64+ |
seconds | QUANTITY | 0.63+ |
K | LOCATION | 0.5+ |
nine | DATE | 0.49+ |
12 | OTHER | 0.49+ |
Stuxnet | PERSON | 0.41+ |