SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Artificial intelligence (AI)
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

What Are The Security Industry’s Newest Buzzwords?

6 Mar 2017

What Are The Security Industry’s Newest Buzzwords?
6 Mar 2017
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Security buzzwords evolve with tech changes, reflecting industry trends and market shifts.
  • Expert Panel identifies new buzzwords indicative of changing security technology landscape.
  • Industry language highlights technological advances and shifts in security market dynamics.

Editor Introduction

Changes in our industry’s technologies are reflected in the language we use. Over the years, more than one industry trend has been tied to associated buzzwords – for better or worse. As the technologies change, so does the language. We asked this week’s Expert Panel Roundtable: What are the industry’s newest “buzzwords” and what do they reflect about the changing market?


Card image cap
Joe Oliveri Johnson Controls, Inc.

The Industrial Internet of Things (IIoT) remains an important topic for the security industry in 2017. While some companies are still building strategies to harness the promise of the Internet of Things (IoT), many industrial organizations are putting real solutions in place and maximizing operations by utilizing the IoT. As applications of this connected infrastructure move from ideas to real-life implementations, an understanding of how it integrates physical and virtual and introduces new and emerging cybersecurity threats is crucial for properly protecting businesses. The IIoT applies connectivity and automation to the commercial space, integrating cyber systems with physical systems like building management, video surveillance and physical access control. Within this ecosystem, a compromised device can be used to disrupt other devices and/or enterprise systems, thereby giving rise to cascading threats. Organizations should ensure that procedures for system update management and IIoT system access are central to their cybersecurity plans.

Card image cap
Steve Reinharz Robotic Assistance Devices, LLC. (RAD)

One of the main buzzwords emerging in today's market is Intelligence as it relates to artificial or business intelligence, both of which will have a huge impact on the market in the coming years. Security leaders are looking for solutions that offer far more than simply tools to keep assets safe and secure. They want solutions that also go further to offer business intelligence insights using existing technology, such as video data or access management. The emerging security robotics market is poised to provide this kind of intelligence to managers, as the data gathered through perimeter patrol and guarding services can be used to streamline operations. Artificial intelligence, in turn, can allow robots to learn from the environment around them to better navigate obstacles, search for and address potential threats, and offer better insight into business operations.

Card image cap
Arjan Bouter Nedap Security Management

End-to-End Security is a buzzword reflecting how cyber threats are increasing and the importance of “the security of security systems,” especially for companies operating in the critical national infrastructure. Convergence has been a “hot topic” for years, but has it really happened? In order to create true end-to-end security solutions, IT and physical security best practices need to be combined. And in order to implement those solutions, IT and security departments within organizations need to cooperate. The need for cloud-based solutions is rising in the security industry, too. When implementing this kind of solutions, however, a discussion should take place about the importance of security on one hand and convenience and usability on the other.

Card image cap
Reinier Tuinzing Milestone Systems

Some buzzwords are Metadata, Business Intelligence, AI (Artificial Intelligence), Deep learning, Cognitive Computing and Neural Networks. There are a lot of people who don’t know that metadata is inter-linked with the Internet of Things (IoT) and business intelligence. This is the continuing expansion of the physical security industry with IT technology and its ongoing innovations. IoT assimilates input from all kinds of sensors and the sensor metadata is now possible to tag, making it searchable as business intelligence with video verification. Machine Learning is when algorithms are written so they learn on their own. One example of machine learning is based on cross communication within the system, to model the human brain; this is called Deep Learning. “Connected deep learning nodes” refer to “neural networks,” which can provide an output. Over time the neural network can “learn” from these different categorizations and biased weighting to produce the desired output.


Editor Summary

A buzzword is defined as an item of jargon that is fashionable at a particular time or in a particular context. Buzzwords have a lifespan determined by changing technologies and continuing innovation in the environments they are used to describe. As go the technologies, so go the buzzwords. Our Expert Panel Roundtable serves up a thought-provoking range of terms to consider this week, all of them reflecting a changing marketplace brimming with innovation.

  • Related links
  • Nedap AEOS Access control software
  • Nedap AEOS Access control controllers
  • Related categories
  • Access control controllers
  • Access control software
  • Electronic lock systems
Related white papers
The 4 Pillars Of AI In Managing High-Stakes Critical Events

The 4 Pillars Of AI In Managing High-Stakes Critical Events

Download
How Biometrics Are Reshaping Security In A Connected World

How Biometrics Are Reshaping Security In A Connected World

Download
Using Artificial Intelligence (AI) To Automate Physical Security Systems

Using Artificial Intelligence (AI) To Automate Physical Security Systems

Download
Related articles
SentriGuard: Revolutionizing Key Management Solutions

SentriGuard: Revolutionizing Key Management Solutions

CrowdStrike 2025: Navigating The Threat Landscape

CrowdStrike 2025: Navigating The Threat Landscape

AI-Driven Security: HiveWatch's New Leadership

AI-Driven Security: HiveWatch's New Leadership

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Artificial intelligence (AI)
  4. News
  5. Round table discussions
About this page

Discover security industry's latest buzzwords, exploring key trends like artificial intelligence, IoT, and cyber-physical integration for enhanced protection.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec