Summary is AI-generated, newsdesk-reviewed
  • Cloud systems and mobile credentials drive security debates, forecasted to gain acceptance in 2018.
  • IoT adoption heightens cybersecurity risks, demands new security requirements and system audits.
  • 2018: Success for manufacturers and integrators embracing advanced security technologies.

Overall, it’s been quite a year for the industry and Vanderbilt. Last year, we predicted that the security industry would see a rise in cloud-based systems in 2017, and based on the developments and trends we've seen over the last 12 months, that forecast has come true.

ACT365 Access Control And VMS

Vanderbilt introduced the ACT365 cloud-based access control and video management solution to its portfolio, and it has plans to educate the marketplace on the technological and economic advances with this platform in 2018. Cloud-based applications and mobile credentials continue to drive discussions and debates, and will ultimately gain acceptance as their numerous advantages are realised.

New Projects In 2017

From an industry perspective, 2017 was successful and productive for not only Vanderbilt, but also many of our peers, as we saw a number of advancements in business development and product refinement. The overall economy did not negatively impact the vertical markets Vanderbilt serves; many new large projects were rolled out as well as the continuation of technology upgrades performed on the installed base.

Heightened Cybersecurity Risk

An unexpected yet relevant occurrence this year was the acknowledgment of cyber threats to many existing security systems. The growing use of the Internet of Things (IoT) has brought many opportunities to the security world, but also presents a heightened cybersecurity risk. This threat should propel the understanding to craft new requirements and policies needed to properly and responsibly design and install new security systems. Additionally, this threat should drive mandatory audits and hardening of the installed base.

As we look ahead to next year, the influx of IoT solutions will place an even greater emphasis on cybersecurity. With the acceptance of hosted solutions, intelligent locking systems and mobile applications and credentials, the typical security systems architecture is evolving rapidly to more streamlined, technologically advanced hardware and software applications.

The winners of 2018 will be the manufacturers, system integrators and end users that embrace the advanced technologies made available.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...