2015 has been an eventful year for the physical security industry. As 2016 looms, the pace of industry change shows no sign of decreasing.

 

Seeking insights into the state of the physical security market at year-end, SourceSecurity.com this month is publishing dozens of 2015 Review and 2016 Forecast articles submitted by manufacturers, integrators and other industry leaders. Taken together, the articles portray a mostly optimistic view of the industry’s present, and an even more hopeful view anticipating the year ahead. This article will provide a compilation of that variety of viewpoints with links to the individual articles. We appreciate all the contributions to our Review and Forecast initiative, and welcome any feedback.

Nobody could have predicted the significant number of international security and terrorism threats this year, says one contributor. Undoubtedly this will result in even closer ties among the security industry, police and security services moving forward, as everyone looks to further enhance public safety.

Combine Physical And Cyber Security

The nature of risk has changed, and there is a blurring of lines between cyber, physical and online security. These changes are spurring organisational changes as well. Concern over cyber-attacks via physical security networks grew in 2015, as more and more networked devices interact with security systems.

The IT department continues to be a big buying influence as networked systems thrive. Developing IT-friendly solutions and communicating effectively to IT-focused buyers (whose needs can be slightly different than traditional security-focused buyers) is more important than ever.

Cybersecurity concerns are likely to see a broader focus beyond the servers, workstations and communications infrastructure that we are used to, growing to encompass appliances, vehicles, factories, utility infrastructure, medical devices, and myriad other devices that will eventually all be connected to the Internet – and therein lies the ongoing task.

Concern over cyber-attacks via physical security networks grew in 2015
There is a blurring of lines between cyber, physical and online security


Needs: Personnel, ROI And Good Integrators

Given the growing economy, one challenge is to find and retain top talent, especially in the North American business. One company pointed to the tight employment market that has made it difficult to fill several open positions needed because of growth. The tightening labour market has propelled to the forefront a pressing need for talent. There are fewer candidates for security officer openings – and openings in most industries. The competition for top talent is escalating.

End users are also seeing change. The economy and economics demand that end user organisations direct their decision-making based on two very well-known terms, return on investment (ROI) and total cost of ownership (TCO). One unexpected development integrators began to see in 2015 is that they no longer have to be the lowest bidder to win a project. Customers are starting to see value in working with a knowledgeable and reputable systems integrator. Integrators continue to bring new value to customers through new capabilities enabled by the Internet of Things. By utilising connected technology and sensors, security integrators are able to provide increased business intelligence across systems.

One manufacturer says security projects seem very attractive because they normally can bring up to 30% profit for a standard security system installation. IT and networking professionals can install IP-based security systems, and there is a wide variety of cost-effective high-tech products available for every need.

Interoperability will be the major trend of 2016 in the security industry. Initiatives like open standards and cooperation among suppliers are emerging to help companies react faster to changing security demands.

The competition for top talent is escalating
The tight employment market has resulted in fewer candidates to fill security officer openings

Video Sector Leading Industry Change

The video sector displayed perhaps the most change in the physical security market in 2015.

Perhaps there was some slim-down in scope and size of video projects this year, but one contributor certainly saw an upswing in new project installations. In 2015, the industry saw much more scrutiny placed on the quality of the video stream at display level. And new networked systems are meeting the demand. The end customer is expecting pristine, non-pixelated imagery. The affordable technology within the newest-generation of PCs and workstations from the CPU and graphics standpoint allow multiple views of high-definition camera activity.

Other contributors agreed that video surveillance technology continues to evolve at a strong pace with improvements in resolution, integration, intelligence and bandwidth utilisation – all of which contribute to better overall security and cost-efficiency. There is also a broader variety of vertical markets showing an increasing need for video surveillance; security vendors must be versatile in their product offering. The products themselves must be highly scalable and must provide high performance at a competitive price.

One-Stop System Or Better Integration?

The tension continued in the market in 2015 between the need for effective integration of “best of breed” systems from a variety of manufacturers and a preference for a one-stop total system from a single manufacturer. Our contributors made good arguments for each.

One company expects those with comprehensive solutions using embedded intelligence will dominate the business. This requires a dedicated focus on innovation in intelligent solutions rather than specific products, they say. “2016 will involve not only digitising the physical world, but also in understanding it with applications that go beyond the realm of security into business intelligence to generate actionable insights. This is the way of the future.”

Vicon claims that the surveillance industry is undergoing 'siliconisation'
The cost of megapixel cameras has dropped dramatically as this functionality is now available on chips

Another contributor sees a continuing and growing need to support heterogeneous systems that may include multiple brands of cameras and other devices, driven in part by the fast pace of new model introductions. Prediction: This trend will continue, and could even increase, through 2016.

The industry also experienced more price pressure on hardware than in previous years. The discussion of price versus value will be a common one in 2016. There can only be one player with the lowest cost, but there is a part of the market focused just on cost. However, many companies will keep building on value and quality.

The “siliconisation” of surveillance cameras has had a great impact on the security industry, especially this year. The cost of complex megapixel cameras has decreased dramatically as this functionality is now available on chips. The camera industry has gone from innovating on the camera’s performance and functionality to acting more like the PC OEM business, and this siliconisation is driving industry commoditization.

Smarter Systems Coming Fast

More intelligent systems offer plenty of opportunity for the market. The inclusion of high-quality analytics on board the camera, says one company, will be a continuing trend in 2016 and beyond. 2015 saw an accelerated adoption of thermal cameras with video analytics.

Several contributors predict that the adoption of video analytics will continue to grow. There will be more enterprise-level and mission-critical installations where analytics are specified into the system. The technology will also trickle down into everyday installations, like larger retail stores, schools and offices. Indeed, video analytics are experiencing a renaissance, with even more applications of analytics likely in 2016. Another contributor predicts that increasingly accurate camera- and server-based analytics applications, available in 2016, can provide valuable data and insights for business operations, management and more.

4K cameras will likely continue to dominate new offerings in 2016. However, one contributor points out that 4K surveillance faces diverse technical challenges. Every element in the video surveillance collection chain — lenses, sensors, image processors, local-site transport (LST), monitors, codecs, HDDs, and WAN interfaces — must be “ready for prime time” in order for the mainstream market to migrate to the higher resolution.

4K cameras will dominate offerings in 2016, but also face technical challenges
Every element in the video surveillance collection chain - from lenses to image processors - must be ready for the migration to 4K resolution   

However, analog is still dominant in parts of the market with some still reluctant to make the move to HD and IP. However, 2016 will see a new generation of high-performance IP camera (4K) become established in the market.

Cyber-security is another concern in the video market, as well as the physical security market in general. More attention is being paid to IT security because of high-profile cyber-attacks and data theft incidents, accelerating the adoption of IT security standards by system manufacturers and integrators.

Wireless And Other Trends

Wireless connectivity is a coming trend. A cost-effective solution is to upgrade network connectivity with a novel breed of wireless technology, millimeter wave (mmWave), which is the next unlicensed band.

One participant attributes their success to not following trends. They favour an approach of questioning conventional wisdom and placing the greatest emphasis on customer benefits. They see themselves not as a manufacturer but as a provider of solutions that provides added value for the customer.

It seems that regardless of the economic gains or losses over any given period of time, video surveillance continues to grow at a good to great clip. The demand for surveillance is always there, and the request from the end users and channels are always the same – great technology at a fair total cost, that allows them to run their business more efficiently, effectively and safely.

Security will move to a much greater focus on the user experience
The appearance of numerous mobile credential offerings signals the "beginning of the end" for card-based identity   

Access Control, Biometrics, And Beyond

News in the marketplace in 2015 included the rise in advanced biometrics, the development of more and more mobile applications for access control and important acquisitions that put smaller manufacturers on the map. 2016 will see an acceleration in the broad adoption of fingerprint solutions for corporate security applications. The market is maturing and producing reliable, effective and secure solutions that specifically address the issues that caused concern in previous years such as dirty fingers or spoofing attempts.

One contributor sees a growing awareness in the C-suite of the perils of unauthorised entry, often called “piggybacking” or “tailgating” in security vocabulary. Top executives are becoming more aware of the threat and the potential cost of such threats, and they’re motivating their organisations to take action.

How customers interface with solution providers is changing. One (cloud-based) company seeks to become “strategic partners” – to become “part of [the] customers’ overall planning and embedded in their organisation.” In effect, they are looking to add value every day.

Market research is showing that IP access control is gaining significant strength and growing at rates that the IP surveillance world experienced for the last 8 -10 years.

End user organisations continue to contain costs any way they can and have an interest in being as green as possible.

The Changing World Of Credentialing

The world of credentialing in the access control market is changing rapidly. The appearance of numerous mobile credential offerings signals the “beginning of the end” of card-based identity. Mobile offerings are strengthening in general. In fact, “invisible” access credentials are coming into their own, thanks in large part to technologies that enable smartphones to be used as electronic keys for locking and unlocking doors.

Customers increasingly expect similar types of experiences where they live, learn and work, which is impacting how they interface with their company’s systems. The transition to electronic credentials is increasing as a result of more awareness of credential options and tangible improvements in operating efficiency. Security will move to a much greater focus on the user experience.

The rising drone threat is pushing the security industry to resolve the issue of safe and effective interception
The rising drone threat is pushing the development of low-cost radar and other solutions for detection and interception 

In contrast, the increase in school shootings and other emergency situations in 2015 has made ID badging top-of-mind for facilities throughout the country, says one contributor.

Instead of upgrading or replacing hardware, end users in many cases will be able to upgrade the software to have new features, even related to systems like key control.

In general, key control is gaining mindshare. Whereas previously key management systems and lockers for asset management were seen as a periphery issue, facilities and security managers are now starting to see them as a vital part of the overall security strategy.

There are other trends, too. The rising drone threat will bolster development of low-cost radar and other solutions. However, the industry will still need to resolve the issue of safe and effective interception. In fact, drones are only one of the futuristic trends likely to impact the market in 2015.

The Middle East is a particular hotbed for vehicle barriers and other increased security measures for explosive-laden vehicles. One company focuses on providing real-time information to security personnel and first responders to help them identify, respond and mitigate emergency situations.

Looking Ahead To 2016

In the new year, look for predictive security to be a more prevalent theme as organisations are tasked with not only providing more data but making sense of the data for use in improving security operations.

Also, digitalisation for consumers (social media, tech offerings from financial companies and wireless service providers) are helping to drive IP conversion in the security industry: the advantages people have at home are desired at work, too.

We should expect that more of the large technology giants known outside of our industry will enter the professional security market, predicts another contributor, as the trend towards networking and more advanced integration continues to gain traction.

See the full coverage of 2015/2016 Review and Forecast articles here

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Larry Anderson Editor, SecurityInformed.com & SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SecurityInformed.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SecurityInformed's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

Which Security Technologies Are Becoming Outdated Or Obsolete?
Which Security Technologies Are Becoming Outdated Or Obsolete?

When technology performs a required task effectively, there is little reason to upgrade to the ‘next big thing’. In this regard, the physical security market is notoriously slow to change. Much of yesterday’s most robust and dependable equipment is still in place at thousands of customer sites, still performing as well as the day it was installed. However, there comes a point when any technology becomes outdated. We asked this week’s Expert Panel Roundtable: Which security technologies are becoming outdated or obsolete?

Physical Security And The Cloud: Why One Can’t Work Without The Other
Physical Security And The Cloud: Why One Can’t Work Without The Other

Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is still incredibly new to humans when we look at the long relationship that we have with security in general. As much as we understand the basics, such as keeping our passwords secure and storing data in safe places, our understanding of cybersecurity as a whole is complicated and so is our understanding of the threats that it protects against. However, the relationship between physical security and cybersecurity is often interlinked. Business leaders may find themselves weighing up the different risks to the physical security of their business. As a result, they implement CCTV into the office space, and alarms are placed on doors to help repel intruders. Importance of cybersecurity But what happens when the data that is collected from such security devices is also at risk of being stolen, and you don’t have to break through the front door of an office to get it? The answer is that your physical security can lose its power to keep your business safe if your cybersecurity is weak. As a result, cybersecurity is incredibly important to empower your physical security. We’ve seen the risks posed by cybersecurity hacks in recent news. Video security company Verkada recently suffered a security breach as malicious attackers obtained access to the contents of many of its live camera feeds, and a recent report by the UK government says two in five UK firms experienced cyberattacks in 2020. Cloud computing – The solution Cloud stores information in data centres located anywhere in the world, and is maintained by a third party Cloud computing offers a solution. The cloud stores your information in data centres located anywhere in the world and is maintained by a third party, such as Claranet. As the data sits on hosted servers, it’s easily accessible while not being at risk of being stolen through your physical device. Here’s why cloud computing can help to ensure that your physical security and the data it holds aren’t compromised. Cloud anxiety It’s completely normal to speculate whether your data is safe when it’s stored within a cloud infrastructure. As we are effectively outsourcing our security by storing our important files on servers we have no control over - and, in some cases, limited understanding of - it’s natural to worry about how vulnerable this is to cyber-attacks. The reality is, the data that you save on the cloud is likely to be a lot safer than that which you store on your device. Cyber hackers can try and trick you into clicking on links that deploy malware or pose as a help desk trying to fix your machine. As a result, they can access your device and if this is where you’re storing important security data, then it is vulnerable. Cloud service providers Cloud service providers offer security that is a lot stronger than the software in the personal computer Cloud service providers offer security that is a lot stronger than the software that is likely in place on your personal computer. Hyperscalers such as Microsoft and Amazon Web Service (AWS) are able to hire countless more security experts than any individual company - save the corporate behemoth - could afford. These major platform owners have culpability for thousands of customers on their cloud and are constantly working to enhance the security of their platforms. The security provided by cloud service providers such as Claranet is an extension of these capabilities. Cloud resistance Cloud servers are located in remote locations that workers don’t have access to. They are also encrypted, which is the process of converting information or data into code to prevent unauthorized access. Additionally, cloud infrastructure providers like ourselves look to regularly update your security to protect against viruses and malware, leaving you free to get on with your work without any niggling worries about your data being at risk from hackers. Data centres Cloud providers provide sophisticated security measures and solutions in the form of firewalls and AI Additionally, cloud providers are also able to provide sophisticated security measures and solutions in the form of firewalls and artificial intelligence, as well as data redundancy, where the same piece of data is held within several separate data centres. This is effectively super-strong backup and recovery, meaning that if a server goes down, you can access your files from a backup server. Empowering physical security with cybersecurity By storing the data gathered by your physical security in the cloud, you're not just significantly reducing the risk of cyber-attacks, but also protecting it from physical threats such as damage in the event of a fire or flood. Rather than viewing your physical and cybersecurity as two different entities, treat them as part of one system: if one is compromised, the other is also at risk. They should work in tandem to keep your whole organization secure.

Hybrid Working And The Threat Of Desk Data
Hybrid Working And The Threat Of Desk Data

The transition to remote working has been a revelation for many traditional office staff, yet concerns over data security risks are rising. Mark Harper of HSM explains why businesses and their remote workers must remain vigilant when it comes to physical document security in homes. Pre-pandemic, home offices were often that neglected room in people’s homes. But now things are different. After the initial lockdown in 2020, 46.6% of UK workers did some work at home with 86% of those doing so because of the pandemic. Semi-Permanent workspaces Since then, many have found that over time, those semi-permanent workspaces have become slightly more permanent – with official hybrid working coming into effect for an assortment of businesses and their teams. The adoption of hybrid working can in fact be seen as one of the few positives to come from the pandemic, with less travel, more freedom and higher productivity top of the benefits list for businesses and their employees. The handling of sensitive documents, is a growing concern for office managers But those welcomed benefits don’t tell the whole story. The transition to remote working has undoubtedly impacted workplace security, with various touch points at risk. The handling of sensitive documents for example, is a growing concern for office managers. In simpler times, sensitive data was more or less contained in an office space, but with millions of home setups to now think about, how can businesses and their office managers control the issue of desk data? Physical document security As of January 2021, it’s said that one in three UK workers are based exclusively at home. That’s millions of individuals from a variety of sectors, all of which must continue in their efforts to remain data secure. With that, reports of cyber security fears are consistently making the news but that shouldn’t be the sole focus. There is also the underlying, but growing, issue of physical document security. The move to remote working hasn’t removed these physical forms of data – think hard drives, USBs and paper based documentation. A recent surge in demand for home printers for example, only exemplifies the use of physical documents and the potential security issues home offices are facing. Adding to that, research conducted in 2020 found that two out of three employees who printed documents at home admitted to binning those documents both in and outside of their house without shredding them. Data security concern Without the right equipment, policies and guidance, businesses are sure to be at risk Those findings present a huge data security concern, one that must be fixed immediately. The Information Commissioner’s Office (ICO) has since released guidance for those working from their bedrooms and dining tables. Designed to help overcome these challenges, the ‘security checklists’ and ‘top tips’ should be the first port of call for many. Yet throughout, the ICO make reference to ‘following your organization’s policies and guidance’ – highlighting that the onus isn’t solely on the individuals working from their makeshift offices. Office managers have a monumental task on their hands to ensure teams are well equipped within their home setups. Without the right equipment, policies and guidance, businesses are sure to be at risk. But it would be wrong to insinuate that unsecure desk data has only now become an issue for organizations. Modern office spaces Keeping clear desks has long been a battle for many office managers. In fact, clear desk policies are practiced in most modern office spaces, with it recognized as a key preventative to personal information being wrongly accessed and so falling foul of GDPR legislation. Throwing sensitive documents in the bin was never an option pre-pandemic However, the unsupervised aspect of home working has led to a potentially more lax approach to these policies, or in some cases, they can’t be followed at all. For those taking a more laid back approach, organization leaders must remind staff of their data security responsibilities and why clear desk policies have previously proven effective. Ultimately, throwing sensitive documents in the bin was never an option pre-pandemic and this must be carried through to home workspaces now. Securely destroy documents There are also concerns over the equipment people have access to at home. For example, without a reliable home shredding solution, data security suddenly becomes a tougher task. To add to that, several recommendations state that employees working from home should avoid throwing documents away by instead transporting them to the office for shredding once lockdown rules ease. While this is an option, it does pose further issues, with document security at risk of accidental loss or even theft throughout the transportation period, not to mention the time spent in storage. The best and most effective way to securely destroy documents is at the source, especially in environments where higher levels of personal data is regularly handled. Correct shredding equipment The recent findings on home office behavior represent a true security risk Only when home workers implement their own clear desk policies alongside the correct shredding equipment (at the correct security level), can both home office spaces and regular offices become data secure. Realistically, these solutions should, like the common home printer, become a staple in home office spaces moving forward. The likelihood is that many UK workers will remain in their home offices for the foreseeable future, only to emerge as hybrid workers post-pandemic. And while the current working environment is more ideal for some than others, the recent findings on home office behavior represent a true security risk to organizations. With this in mind, it’s now more key than ever for business leaders, their office managers and homeworkers to all step up and get a handle on home data security policies (as well as maintaining their standards back at the office) – starting with the implementation of clear desk policies. After all, a clear desk equals a clear mind.