What Are The Security Industry’s Newest Buzzwords?
Editor Introduction
Changes in our industry’s technologies are reflected in the language we use. Over the years, more than one industry trend has been tied to associated buzzwords – for better or worse. As the technologies change, so does the language. We asked this week’s Expert Panel Roundtable: What are the industry’s newest “buzzwords” and what do they reflect about the changing market?
The Industrial Internet of Things (IIoT) remains an important topic for the security industry in 2017. While some companies are still building strategies to harness the promise of the Internet of Things (IoT), many industrial organizations are putting real solutions in place and maximizing operations by utilizing the IoT. As applications of this connected infrastructure move from ideas to real-life implementations, an understanding of how it integrates physical and virtual and introduces new and emerging cybersecurity threats is crucial for properly protecting businesses. The IIoT applies connectivity and automation to the commercial space, integrating cyber systems with physical systems like building management, video surveillance and physical access control. Within this ecosystem, a compromised device can be used to disrupt other devices and/or enterprise systems, thereby giving rise to cascading threats. Organizations should ensure that procedures for system update management and IIoT system access are central to their cybersecurity plans.
One of the main buzzwords emerging in today's market is Intelligence as it relates to artificial or business intelligence, both of which will have a huge impact on the market in the coming years. Security leaders are looking for solutions that offer far more than simply tools to keep assets safe and secure. They want solutions that also go further to offer business intelligence insights using existing technology, such as video data or access management. The emerging security robotics market is poised to provide this kind of intelligence to managers, as the data gathered through perimeter patrol and guarding services can be used to streamline operations. Artificial intelligence, in turn, can allow robots to learn from the environment around them to better navigate obstacles, search for and address potential threats, and offer better insight into business operations.
End-to-End Security is a buzzword reflecting how cyber threats are increasing and the importance of “the security of security systems,” especially for companies operating in the critical national infrastructure. Convergence has been a “hot topic” for years, but has it really happened? In order to create true end-to-end security solutions, IT and physical security best practices need to be combined. And in order to implement those solutions, IT and security departments within organizations need to cooperate. The need for cloud-based solutions is rising in the security industry, too. When implementing this kind of solutions, however, a discussion should take place about the importance of security on one hand and convenience and usability on the other.
Some buzzwords are Metadata, Business Intelligence, AI (Artificial Intelligence), Deep learning, Cognitive Computing and Neural Networks. There are a lot of people who don’t know that metadata is inter-linked with the Internet of Things (IoT) and business intelligence. This is the continuing expansion of the physical security industry with IT technology and its ongoing innovations. IoT assimilates input from all kinds of sensors and the sensor metadata is now possible to tag, making it searchable as business intelligence with video verification. Machine Learning is when algorithms are written so they learn on their own. One example of machine learning is based on cross communication within the system, to model the human brain; this is called Deep Learning. “Connected deep learning nodes” refer to “neural networks,” which can provide an output. Over time the neural network can “learn” from these different categorizations and biased weighting to produce the desired output.
Editor Summary
A buzzword is defined as an item of jargon that is fashionable at a particular time or in a particular context. Buzzwords have a lifespan determined by changing technologies and continuing innovation in the environments they are used to describe. As go the technologies, so go the buzzwords. Our Expert Panel Roundtable serves up a thought-provoking range of terms to consider this week, all of them reflecting a changing marketplace brimming with innovation.
- Related categories
- Access control controllers
- Access control software
- Electronic lock systems
Expert commentary
Security beat
Security bytes
- Getting To Know Dan Grimm, VP And General Manager Of Computer Vision At RealNetworks
- Big Wins And The Importance Of Showing Up: Insights From SecurityInformed.com Editor Larry Anderson
- Setting Goals, Business Travels And Radioactivity: Success Secrets From Tiandy's John Van Den Elzen
- Getting To Know Jeff Burgess, President/CEO At BCDVideo
Healthcare security articles
Milestone Systems, a global pioneer in video technology, is at the forefront of the video security industry, emphasizing responsible technology innovation across its operations. The company will host...
Just like fighting against the spread of disease in a clinical environment, healthcare providers must mobilize, coordinate with interconnected partners, and apply sufficient budgetary resources to com...
A distinguished nonprofit organization recently launched a cutting-edge 1000-bed Multi Super Specialty Hospital and Research Center in Surat, Gujarat. This initiative aims to address medical gaps, esp...
Innodisk, a pioneering global AI solution provider, is showcasing its comprehensive new products at Computex 2024 with a focus on edge AI. Key highlights include the industry's pioneering CXL 2.0 mem...
Global AI Industry Ecosystem Association, Deep Knowledge Group, in collaboration with Tom Giffard, a distinguished member of the Welsh Parliament, has launched the AI in Wales platform and report, off...
Cloudbrink, the personal SASE provider, has named Graphene Networks as a distribution partner for North America. North Carolina-based Graphene Networks, a specialist in managed WAN edge services, wil...
DeepL, a pioneering language AI company, announced $300 million of investment at a $2 billion valuation. Led by Index Ventures, the heavily oversubscribed round attracted strong support from new inves...
Kepler Vision Technologies has announced its 20th patent for its innovative fall-detection technology. The patent reinforces Kepler’s commitment to providing trusted and proven technologies that...
Axis Communications celebrated the grand opening of its latest Axis Experience Center (AEC) in Frisco, Texas on Wednesday, May 8, 2024. The new Dallas-area facility replaces the original Irving AEC l...
Check Point® Software Technologies Ltd., an AI-powered, cloud-delivered cyber security platform provider, has published its Global Threat Index for April 2024. Androxgh0st and LockBit3 atta...
VIPRE Security Group, a global pioneer and award-winning cybersecurity, privacy, and data protection company, released its Q1 2024 Email Threat Trends report, based on an analysis of 1.8 billion email...
Johnson Controls, the global pioneer for smart, healthy, and sustainable buildings, demonstrated complete building security solutions at ISC West 2024 in Las Vegas. The company showcased its comprehen...
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, a...
ASIS International, the world’s largest association for security management professionals, has announced its programming lineup for Global Security Exchange (GSX) 2024 with in-person and di...
Next DLP, a pioneer in data loss prevention and insider threat solutions announced that their Reveal Platform is the first Insider Risk Management solution to automatically map detection events to MIT...
Total Cost Of Ownership For Video Surveillance
DownloadThe Truth Behind 9 Mobile Access Myths
Download5 Surprising Findings From OT Vulnerability Assessments
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadBank Security
DownloadASSA ABLOY Aperio® KL100: A New Wireless Access Solution For Lockers And Cabinets
Verkada AC12 One-Door Controller
Anviz W3 Smart Cloud-Based Face Recognition Time Attendance & Access Control Terminal