SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Artificial intelligence (AI)
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

What Are The New Developments In Networking And Connectivity For Security?

11 Nov 2022

What Are The New Developments In Networking And Connectivity For Security?
Larry Anderson
Larry Anderson
11 Nov 2022
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Security products demand innovative networking and connectivity approaches for better integration and efficiency.
  • Mature technologies underpin today's security devices, but innovation is essential for advancement.
  • Expert panel highlights new security connectivity developments crucial for system power enhancement.

Editor Introduction

Connectivity is literally the difference between products operating individually and those combined into a more powerful system. Many of the devices that connect today’s security products reflect mature technologies that have been proven over time. However, innovation is also driving the need for new approaches to connectivity and networking. We asked this week’s Expert Panel Roundtable: What are the new developments in networking and connectivity for security?


Card image cap
Fredrik Nilsson Axis Communications

The World Bank predicts that by 2050, the current urban population will double in size. As cities grapple with the corresponding increase in foot traffic, motor vehicles, and cyclists, authorities will have to work harder to keep the uptick of pedestrians safe and transportation systems efficient. In large urban areas, network video surveillance technology and high-quality analytics not only provide valuable evidence in forensic investigations but can also help to improve mobility throughout cities city by providing both immediate and long-term insights to ensure comfortable and safe movement for people and vehicles. Network camera solutions can also detect accidents in real-time, identifying traffic incidents quickly and improving situational awareness for emergency responders. Regulators estimate that reducing 911 response times by just one minute could save as many as 10,000 lives each year, which means this technology provides real, tangible results in the community.

Card image cap
Leo Levit ONVIF

The growing prevalence of 5G will be one of the biggest development drivers for security in terms of connectivity for years to come. Many manufacturers are already developing solar panel-powered 5G devices, which can be rapidly deployed in a remote location with a simple 5G connection. This will be a game changer for security for remote sites or where hardwired connectivity is problematic due to 5G’s network capability, which provides broader bandwidth for video streaming. This removes much of the traditional barriers such as cabling and bandwidth constraints.

Card image cap
Paul Leudtke Aiphone

Security systems have evolved to be more connected than ever before. Different technologies integrate together seamlessly and effectively. Customers are looking for a layered security solution through a single point of interoperability. Security manufacturers can ensure that their product opens the door to integration opportunities with other industry leaders. For example, intercom systems that integrate with Session Initiation Platforms (SIP) allow end users to receive audio or video calls from any desk phone, mobile phone, or computer. Intercoms also integrate with video management systems and can be reviewed similarly to IP cameras. Overall, these integrations provide a better user experience through simplicity, readiness, and speed. The ability to easily adapt is the key, when addressing security issues promptly, and having a multi-layered approach makes that easier.

Card image cap
Jaroslav Barton HID

In the access control market, we are seeing a migration away from Wiegand and other proprietary communications protocols to OSDP developed by SIA. Wiegand has been around for decades, but it doesn’t meet today’s requirements. OSDP, which became an international standard in 2021, is much more secure and supports high-end AES-128 encryption. OSDP constantly monitors wiring to protect against attack threats and is bi-directional, meaning that readers and controllers communicate both ways to not only authorize access, but allow configuration and remote management to be carried out efficiently. In addition, total cost of ownership (TCO) is lower – you need less wires for OSDP communication. As a result, OSDP is being adopted quickly in many markets, particularly the United Kingdom (UK), Germany and the United States of America (USA). From an HID Global perspective, the good news is that our two main reader families – Signo and iCLASS SE – both support OSDP. Launched two years ago, Signo has OSDP built-in, with iCLASS SE technology easily upgradable using an additional module.

Card image cap
Sarah Bowden Ava Security

The cloud has been a game-changing development for security in the networking and connectivity space. The world of physical security is a great example here; with industry finally coming to the realization that an ‘isolated’ patched network cannot adequately compare to a cloud-connected solution. Super flexibility, scalability, and ease of use alongside lighter weight and IoT networking technologies are going to drive adoption. We will see the functional breadth of cloud offerings increase leading to unified security platforms and category collapse in the industry. This is great for customers who are all looking for greater value from the systems they purchase.

Card image cap
Kayne McGladrey Hyperproof

The growing acceptance of Zero Trust as a legitimate security architecture is a significant improvement in the past decade for modern cyber security. Although initially maligned as a marketing buzzword, and still unfortunately misused in product announcements, zero trust now reflects table stakes to support the needs of hybrid and fully remote workforces. Network connections should no longer be implicitly trusted because of a user’s location behind a corporate firewall or the use of a company’s VPN. Rather, each transaction and connection from a user and their associated device should be inspected and validated to confirm that the access is appropriate. The ability of network solutions to provide both real-time telemetry and controls, so that an automated and external policy engine can take enforcement actions is also a recent improvement, as networking equipment vendors historically tried to place their products and subscriptions at the center of cyber security strategies. Today’s effective networking solutions integrate well with other solutions to provide one part of a holistic cyber security strategy.


Editor Summary

New developments in connectivity include 5G mobile networks, SIPs for intercoms, OSDP for access control, and even the cloud. As physical security continues to rely on multiple products and systems working together to achieve broader goals, secure and effective communication and networking will continue to be at the forefront of maximizing innovation.

  • Related links
  • Aiphone Access control software
  • Aiphone Access control systems & kits
  • HID Access control software
  • Ava IP cameras
  • Ava IP Dome cameras
  • Access Control Software Access control software
  • Indoor/Outdoor IP Dome cameras
  • Standalone / Networked Access control systems & kits
  • Network IP cameras
  • Proximity Access control systems & kits
  • Proximity Access control software
  • Centrally managed access solution Access control software
  • High Level Interface Access control software
  • Management Systems Upgrade Access control software
  • Related categories
  • Access control systems & kits
  • Access control software
  • IP cameras
  • IP Dome cameras
Related white papers
The 4 Pillars Of AI In Managing High-Stakes Critical Events

The 4 Pillars Of AI In Managing High-Stakes Critical Events

Download
How Biometrics Are Reshaping Security In A Connected World

How Biometrics Are Reshaping Security In A Connected World

Download
Using Artificial Intelligence (AI) To Automate Physical Security Systems

Using Artificial Intelligence (AI) To Automate Physical Security Systems

Download
Related articles
SentriGuard: Revolutionizing Key Management Solutions

SentriGuard: Revolutionizing Key Management Solutions

CrowdStrike 2025: Navigating The Threat Landscape

CrowdStrike 2025: Navigating The Threat Landscape

AI-Driven Security: HiveWatch's New Leadership

AI-Driven Security: HiveWatch's New Leadership

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Artificial intelligence (AI)
  4. News
  5. Round table discussions
About this page

Discover new developments in networking, connectivity, and security technology driving advanced solutions for IPs, cybersecurity, and edge devices.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec