The COVID-19 global pandemic will have a profound and lasting impact on the physical security industry. It will boost adoption of new technologies to address new types of threats. It will map out a path for new involvement of physical security technologies in areas of public health. It will raise new notions of privacy and turn previous thinking about privacy on its head. And the aftermath of the pandemic will give rise to all these changes in a breathtakingly accelerated timeframe.

In the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace.

Security and the futureIn the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace

These were some of the thoughts I heard recently in a panel discussion titled “Crisis and the Everyday,” which was part of Genetec’s Connect’DX virtual trade show, April 20-21. The virtual conversation – emphasising both in form and content the current topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry.

In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists.

Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security.

“How do you support the business and, more broadly, societies and communities?”

The new normal for security

The “new normal” for security will include addressing biological risks alongside our traditional emphasis on physical risk and digital risk. “Some industry sectors are being challenged in a way I have not seen in my lifetime,” said Brekke. “But they are learning fast.”

We should take a look at where we have been and where we are going,” said Brekke, whose firm develops comprehensive strategies to align security organizations with corporate missions. “This is a point in time that has never existed, and a time to take a fresh look at what security is to the corporation and greater community. It’s more a mindset than a specific set of tasks.

“We just need to take a fresh look from a mix of perspectives.”

“Crisis and the Everyday" was part of Genetec’s Connect’DX virtual trade show

Infrared cameras and access control technologies

New technologies to address the pandemic are enabling some nations around the world to track how people come and go and who they are exposed to. Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing.

But what will such use of these technologies mean in the long term?

Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing

We will see whether people will become more comfortable with this technology,” said Ken Lochiatto, President and CEO, Convergint Technologies, a service-based security integration company.

Tools are in hand, and coming soon, that will allow us to be more proactive, to step in and measure the health of colleagues, for example,” said Lochiatto. “There are a lot of questions that will have to be addressed, and a lot of discussion will have to happen. Coronavirus will knock down the barriers (to the use of newer technology) in the short term, but where will it settle two years from now?”

Manufacturer philanthropy

Security product manufacturers are expanding their scope beyond law enforcement and emergency management and stepping forward to help with the public good.

Technology in the security space is moving faster than the political establishment is thinking about,” adds Lockiatto. “We have to manage it as an industry so the government will not step in. We need to manage the discussion.”

An accelerated timeline will raise the stakes even further.

All the questions that would have taken longer to answer will be answered in the next 6-8 months. For the security industry, it will drive even greater need for products,” said Lochiatto.

The biggest question is ‘Where does this all go?’” said Brekke. “What is the new normal? What is the future, and how do we prepare our companies for it? What does technology look like in the future? There isn’t just one particular set of questions, just a constant stream of ‘What’s next?’”

Public health versus individual liberty

The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection, especially as it pertains to sharing medical information.

There will be a new balance between public health and safety as a whole versus individual liberties,” said Brekke. “Technology providers need to be at the table talking about the solutions. We should all be engaged in government affairs to balance the discussion and add our own perspectives. As a society and country, we have to come to a different perspective on this.”

The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection

There are not enough ethics and guard rails,” said Jonathan Ballon, Vice President and General Manager, Intel Corp. “The majority of people are not afraid enough. They should be afraid; we need more regulation. We need to establish an ethical code of conduct for use of technology in these situations. We need to eliminate bias, respect individuals, and ensure people are being treated fairly.

In the next several years, there will be a lot of experimentation in the quest to get to a future state we can see and almost grasp. There will be black eyes and bruises on the path to getting there.

From smart security to more intelligent technology

After the pandemic, the innovation climate will befit new technology adoption. “Platforms are only limited by our imaginations, and it creates an extraordinary opportunity and drives a lot of economic value,” said Ballon. “Long-term, the future is extremely bright. Companies should ensure that they are resilient and take advantage of another period of technology adoption, which we see coming out of every economic downturn.”

After the pandemic, the innovation climate will befit new technology adoption

Another evolution in the market is a transition from “smart” systems to more “intelligent” ones. Intelligence includes the ability to “learn” using tools such as deep learning and artificial intelligence. “Systems are going from smart to intelligent to autonomous, including systems that can operate within the constraints we have established,” said Ballon.

Pierre Racz, president and CEO of Genetec, offered some words of caution about the growth of artificial intelligence in his keynote presentation, “AI Hype Self Defense.” Racz sought to provide guidance on the limits of the technology and urged the online audience to be skeptical of technology that “works best when you need it least.”

Science and technology are morally neutral,” he said. “How we use them is not.”

Intelligent automation over artificial intelligence

Specifically, Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm”. AI systems don’t know anything that isn’t included in their input data – for better and for worse.

Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm”

A properly designed system can be useful [only] if you engineer around the false positives, false negatives and the unanticipated training set biases,” said Racz. For example, because AI is based on probabilities, it doesn’t perform as well when identifying improbable things.

In lieu of “artificial intelligence,” Racz recommends the term “intelligent automation” (IA), which describes using a machine (computer) for heavy computational lifting and keeping a human in the loop to provide intuition and creativity.

Do not misinterpret crafty guessing for intelligence or thinking,” Racz warns. “AI doesn’t exist, but real stupidity exists. And we must design our systems taking into account the legitimate fears of the public we serve.”

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

Author profile

Larry Anderson Editor, &

An experienced journalist and long-time presence in the US security industry, Larry is's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SecurityInformed's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

What’s New with Video Management Systems (VMS)?
What’s New with Video Management Systems (VMS)?

Video management systems (VMS) have been around almost since the advent of IP cameras. During those years, VMSs have evolved from software that provides basic functionality to more user-friendly systems offering a growing list of capabilities, many of them related to analyzing data as well as recording and displaying video. But the evolution is far from over. We asked this week’s Expert Panel Roundtable: What’s new with video management systems (VMS), and what are the new opportunities?

Arteco VCA Applies Deep Learning Analytics To Event-Based Video Management
Arteco VCA Applies Deep Learning Analytics To Event-Based Video Management

Arteco’s VCA video analytics system is their latest new product, signaling a move from machine vision-based analytics to deep learning video analytics. A server – separate from the Arteco video management system (VMS) – manages the algorithms for the analytics. Arteco has been field-testing the product for a year and a half and had planned to launch it officially at ISC West in March (which was postponed). In lieu of the trade show launch, the company has been presenting the product (along with partners) through a series of webinars. The deep learning video analytics product operates out of the box – “just turn it on,” says Steve Birkmeier, Arteco VP of Sales. Functionality is based on “training” of pre-classified objects, such as differentiating between a person, an animal, a vehicle, or just clutter. The deep learning library focuses on people and vehicles. Detection and identification The new system detects everything in the field of view The new system detects everything in the field of view and only identifies what the operator is looking for, thus reducing false alarms. Any identified object is provided with an accuracy reading (e.g., 92% confident it is a human.) The system can be set up from the graphical user interface (GUI). Arteco VCA (video content analysis) also uses analytics rules, such as “if A+B=C, then do D.” Therefore, an abandoned object may elicit a different response than a violated area. With roots in the industrial automation market of the early-2000s, Arteco offers an event-based video management system (VMS) platform. That is, their emphasis is on identifying and providing video at the moment something happens rather than managing a vast amount of video that shows, in effect, nothing of interest. Arteco’s system, providing functionality expected in a full-featured VMS, is designed around the need to react to exceptions and events. Video verification “We can pull in events from any type of system and provide the related video,” says Steve Birkmeier, Arteco VP of Sales. “It can be access control, fire, intrusion, perimeter security, radar or microwave barriers, vape sensors, license plate recognition, or whatever.” An open connector, xml framework enables Arteco to interface with other systems and provide video verification of events. In addition to a focus on event-based video, Arteco also emphasizes ease of use, building on their 20-year history with video analytics. Another point of differentiation is their open architecture that easily and repeatably enables incorporation of third-party “events.” Finally, Arteco’s systems are competitively priced (less expensive), including flexible pricing and licensing structure to maximize value for a customer.  In addition to security, there are multiple operational applications that use video verification In addition to security, there are multiple operational applications that use video verification. For example, integration with warehouse management software using metadata from warehouse surveillance video can provide a searchable database. An operator can enter a purchase order number, for instance, and the system provides video associated with that sale.  The role of video in physical security Arteco has traditionally been a strong player in the utilities vertical, where event-based video management is useful to keep watch on high-value assets located in remote areas with little physical security. Another strong vertical is car dealerships in the United States, including security and loss prevention applications as well as integration with fleet management (using RFID and/or license plate reading). Arteco’s heat mapping capabilities can help a car dealer analyze customer activity to guide merchandising decisions, in the same way a retail store might. Big-box stores are another application for Arteco’s combination of marketing analytics, security and loss prevention.  Arteco’s strength is also proving useful in the emerging, highly regulated cannabis industry. State regulations require that each marijuana plant be tagged, and systems are required to provide total chain of custody records from “seed to sale.” In the case of Arteco, video associated with a specific plant tag is available at each stage of growth, production and sale. Coronavirus and video management The analytics can detect when people are grouped together closer than 2 meters As an Italian company, Arteco has already applied its deep-learning VCA product at city centers in Italy, which was hard hit by the novel coronavirus. The analytics can detect when people are grouped together closer than 2 meters, for example, and can provide an alarm if social distancing requirements related to the coronavirus are not being observed. The system can also detect and confirm the use of face masks at an entrance. Tracking that number – the percentage of customers who comply – in real time might offer additional peace of mind for high-risk customers entering a store, for example. Birkmeier contends the world has been changed forever by the pandemic, although acceptance over time of new technologies being introduced will vary greatly by geographic location. Already, in the last decade or so, acceptance of video surveillance has been greater, even in the U.S. market, he says. ”More often you hear ‘why don’t you have cameras’ rather than ‘I don’t like these camera here,’” he comments.

5G Will Expand Flexibility and Choice in Networks, Decrease Latency
5G Will Expand Flexibility and Choice in Networks, Decrease Latency

The next step in the journey of digital transformation, the fifth generation of wireless communications technologies (5G) will have an enormous impact on mankind, and on every industry including security. In short, 5G will disrupt the way we live and work. To discuss the changes, we presented our questions to Benoît Jouffrey, VP 5G Expertise at Thales, which is at the forefront of the transformation with an emphasis on trust and security. Following are his responses. Q: In layman's terms, what is the difference between 4G and 5G ecosystems as they relate to opportunity, flexibility and choice in networking tools? Jouffrey: Compared with largely one-size-fits-all 4G services, the 5G ecosystem will provide organizations with much greater choice and flexibility in the way they communicate over mobile networks. The network slicing capabilities of 5G means that business can have their own independent networks, with each one customized to their unique requirements and backed up by service-level agreements (SLA). Another aspect of 5G will be the ability to drive latency between UE (User Equipment) and network down to below a few milliseconds, which will massively boost the performance and scalability of enterprise applications. Q: How can these capabilities drive a company's digital operations? 5G will allow enterprises to be connected more efficiently Jouffrey: 5G will allow enterprises to be connected more efficiently: they can rely on a higher density of connected devices exchanging more information in a better timeframe. Due to these slicing capabilities, 5G networks allow for much greater personalization than 4G networks. This means that businesses could benefit from this personalized network, tailored to their portfolio of Internet of Things (IoT) use cases, and not be necessarily expected to rely on a one-size-fits-all network. By combining the unique capabilities of 5G with the insights derived from analytics, machine learning, and artificial intelligence, enterprises will be in much better stead to run their operations efficiently and securely. Q: How might 5G impact the use of cloud systems? Jouffrey: 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have a small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate. Q: How can one provide trustworthy 5G lifecycle management for IoT devices? Jouffrey: Trustworthy IoT lifecycle management is an end-to-end approach from the secure provisioning of keys within the devices, to the proper identification of the users, from the authentication on the network or the network slice, to the secure handling of the data either at stored or in motion. Resources need to be invested long before this to qualify the business model, in prototyping, as well as prototype testing. Most organizations don’t have the resources to counter all the security challenges of their 5G IoT deployments. Businesses will often end up choosing between navigating a risk-laden 5G environment, with inadequate or incomplete trust mechanisms, or outsourcing these requirements. When looking at outsourcing, companies must choose a provider with expertise in digital security, ensuring 5G IoT deployments have data protection and connectivity credentials built in, together with end-to-end data protection solutions such as encryption – protecting data in the device, network, and cloud at rest and in transit. Q: How can wireless modules address new 5G IoT use cases? Wireless modules can be expected to play a bigger role than in previous generations of cellular Jouffrey: As IoT considerations are integrated into the 5G ecosystem, wireless modules can be expected to play a bigger role than in previous generations of cellular. 5G modules support different characteristics to earlier generations – the 5G use cases are much more complex, varied, from high-end use cases requiring high data usage and throughput, such as for industrial routers, to low-throughput, energy consumption optimized devices, as required for some IoT sensors. At the end, compared to the largely one-size-fits-all approach that preceded it, 5G will increase the demand for vertical-tailored wireless modules. Importantly, these wireless modules need to support new data protection and security features that go well beyond conventional compliance to 3rd Generation Partnership Project (3GPP) standards. Due to the extent of personalization within 5G networks, wireless modules must also offer providers and customers greater security as well as agility all along the device lifespan. Q: What are the new data protection challenges posed by 5G, and how can they be addressed? Jouffrey: The 5G era presents exciting opportunities, as well as security challenges. The greatest risks to enterprise data on 5G networks – including eavesdropping, man-in the middle attacks, denial of services, loss or compromisation of data – were already known in 4G. The 5G standards have looked at providing answers to these threats and come with some noticeable improvements, such as the encryption of the international mobile subscriber identity (IMSI), otherwise known as the Subscription Permanent Identifier in 5G. But what’s different with 5G is the threat surface area, due notably to the variety of devices that will be used over these 5G networks and the underlying technologies used for the deployment of the networks, such as cloud native virtualization. On top of this, it’s the first generation of cellular to launch in an era of global cyber-crime, funded by organized crime and states alike. So, whilst enterprises should look to the ecosystem of telecom operators and cloud providers, vendors, and system operators to help understand the opportunities presented by 5G – this same ecosystem needs to guide them in countering any new risks that the 5G architecture may pose. The key to securing 5G enabled devices is to build security into devices from the outset using encryption. The key to securing 5G enabled devices is to build security into devices from the outset Q: What new roles can the 5G embedded universal integrated circuit card (eSIM) endorse in network authentication? Jouffrey: 5G is the first generation of cellular to launch in a buoyant eSIM market. The eSIM will be key in supporting network slicing authentication and security, enabling enterprises to leverage their credentials to pre-select network slices. However, to support secure authentication for mobile networks that may require the usage of different authentication algorithms over time, these 5G eSIMs must support this flexibility of usage of multiple authentication and authorization credentials. With this capability built into these eSIMs from the start, mobile operators can remotely swap the authentication algorithm either for a dedicated primary authentication, or in a definitive way, thanks to key rotation management, thus maintaining a trusted environment.