SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

What Are The Most Promising New Technologies In Security?

27 Jan 2025

What Are The Most Promising New Technologies In Security?
Larry Anderson
Larry Anderson
27 Jan 2025
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • New technologies enhance security efficiency for manufacturers, integrators, and end users.
  • Adopting technology gives companies a competitive edge in the security market.
  • Expert Panel discusses promising innovations in physical security technology.

Editor Introduction

New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry? 

 


Card image cap
Andrew Elvish Genetec, Inc.

One of the most promising trends in physical security is the growing adoption of hybrid-cloud technologies. Hybrid solutions offer a flexible balance between on-premises and cloud-based systems, enabling centralized monitoring, reduced maintenance, and streamlined hardware deployment. Cloud-managed appliances further simplify this process: They enable the connection of legacy systems to the cloud and significantly reduce costs and deployment time. This approach lets organizations modernize at their own pace while optimizing efficiency and performance. In addition to hybrid cloud technologies, work management solutions are poised to revolutionize how physical security teams collaborate, communicate, and manage their tasks. By integrating security dispatching, work ticketing, and activity tracking into a single platform, these new solutions enable users to manage tasks more effectively ,maintain real-time visibility of their operations, and collaborate seamlessly across teams.

Card image cap
Larry Newman Axis Communications

First introduced in 2018, the AV1 video encoding standard from the Alliance for Open Media (AOM)—an open-source, license-free coding format designed specifically for efficient network video transmission—is just now starting to make a positive impact on the physical security space, and it'll only continue to improve security as support for it grows. AV1 delivers high-quality video at low bitrates, effectively reducing bandwidth consumption and storage costs, and allowing for robust systems without breaking the bank. Beyond this, hybrid solutions are also starting to make an impact on the industry, with organizations combining edge, cloud, and on-premise technologies to create unique systems tailored toward their business goals. Hybrid solutions will be the most flexible option for designing architectures tailored to specific organizational needs, while also enabling seamless system scalability. And, though not new, continued adoption of AI and analytics will unlock more possibilities in security, transforming the industry as we know it.  

Card image cap
Dan Berg Salient Systems

The physical security industry is experiencing exciting advancements, with Artificial Intelligence (AI) leading the charge. Early AI-powered security systems already excel at identifying people, vehicles, and objects. However, the next frontier lies in systems capable of understanding the context and relationships between these elements to predict and effectively mitigate potential threats. Achieving this will require addressing challenges such as minimizing biases during AI training and safeguarding privacy rights, which remain critical considerations. Another promising development is the adoption of AV1, a license-free video compression algorithm. With efficiency comparable to H.265 HEVC and native support in major web browsers, AV1 eliminates licensing barriers, paving the way for broader adoption of cloud-based surveillance systems. Its potential to reduce storage and bandwidth requirements could significantly enhance the scalability and cost-effectiveness of modern video surveillance solutions. 

Card image cap
Adam Lowenstein i-PRO

It’s easy to mention AI as the most promising since we are still very much at the beginning of what is possible. However, I would like to focus on how AI can be deployed on the edge for physical security and on the importance of doing so via an open architecture. It is no secret that the security industry follows trends in the larger IT world. An example of a trend is the evolution of edge processing and, specifically, how edge devices can work together and share resources. An example of this is Docker, a container technology that is like lightweight, portable packages that carry everything needed to run software—a development platform. At the edge, they allow applications to work consistently across devices, process data locally, share compute resources between devices, and update quickly, enabling faster responses and reduced reliance on central servers. i-PRO recently added Docker support to its X-series line. 

Card image cap
Daniel Reichman Ai-RGUS

The most promising new technologies in the physical security industry are those that can effectively drive recurring monthly revenue for integrators. Those technologies are often ones that allow the integrator to offer a service to end users. This is a win-win situation in that the integrator can position themselves as an expert in offering that service which could result in better outcomes for the end-user in terms of experience and safety because a dedicated, professional organization with deep expertise in offering that service is working with the end-user. Security maintenance is a topic full of pitfalls and gotcha’s that an end-user may not realize until after an incident and after missing critical evidence. An integrator who does this across many customers and many locations can be a much more reliable and beneficial alternative.

Card image cap
Justin Eayrs Entrust Inc.

AI-enabled biometric verification has ushered a new paradigm to traditional physical card issuance. While traditional issuance software adequately secures cardholder data, identity verification remains the weakest link in the issuance workflow. Verification methods like the visual inspection of a driver’s license or passport introduce sizable risks, leaving organizations vulnerable. Instead, a remote digital identity verification workflow not only offers a significant boost in security but also unlocks additional cardholder and card office advantages. An identity verification workflow can be connected to issuance software to secure the handoff of cardholder data throughout the entire issuance process. As a result, cardholders can perform digital onboarding from the comfort of their home, and card offices can enhance efficiency with self-service issuance stations, knowing the cardholder has already been verified remotely. Adding digital cardholder identity verification to an organization’s issuance platform strengthens security for the card office while elevating the cardholder experience.

Card image cap
Woodie Andrawos National Monitoring Center

AI and IoT are redefining physical security, with AI-driven video analytics setting a new standard by cutting down false alarms and improving threat detection accuracy. This shift from reactive to proactive monitoring allows systems to distinguish between real threats and everyday activities, helping operators respond more effectively. IoT integration enhances this by creating a seamless, data-rich environment where multiple devices provide a cohesive view, improving response times and enabling a flexible approach to security needs. Mobile access is also transforming how security professionals manage systems, allowing users to monitor, adjust, and troubleshoot alarms directly from their devices. This capability adds a new layer of responsiveness, making it easier to support customers with real-time assistance and efficient issue resolution, even from the field. Cloud-based technologies further support these innovations by enabling subscription-based services for ongoing monitoring, secure video storage, and more, strengthening customer loyalty through continuous value. 

Card image cap
Meredith Palmer Gallagher Security

The physical security industry is undergoing a seismic shift. What was previously quite low-tech, characterized by perimeter protection, alarm management, surveillance, and physical security guards, is being revolutionized by high-tech solutions and innovations. This industry is following the lead of the technology giants and will benefit from the inventions and innovations they develop such as quantum computing, cybersecurity, generative AI, autonomous systems, and sustainable technologies. These are promising developments as the security industry seeks to anticipate higher-order threats and sophisticated attacks. The industry will demand faster calculations enabling real-time decision making at the edge. Megatrends around minimizing environmental impact will increase demand for sustainable provenance. And, as AI becomes ubiquitous across all industries, it will be expected as a tool for efficiency and continuous improvement. Underlying cloud-native technologies are laying the foundation for these innovations which are already beginning to change the security landscape. 

Card image cap
Greg Colaluca Intellicene

We live in a digital world, and everyone is looking for a unified, seamless experience in all aspects of life. At this point, most people expect it. This includes the physical security industry. The future of physical security lies in the seamless integration of intelligence-driven solutions. As industries continue to embrace interconnection, the possibilities for transformation are broad. With fully integrated intelligent solutions, personnel can access all critical information in real time through a single platform, eliminating the time-consuming process of analyzing disparate data streams. We have seen first-hand how mobile integrations for emergency response have impacted rural communities that rely on volunteer emergency responders. That use case has the potential to make huge impacts across the globe. We also have seen how security intelligence can assist in situations like mass riots and violent protests to pinpoint instigators. There is so much opportunity on the horizon. 

Card image cap
Kurt Takahashi Netwatch USA

The growth potential of AI-driven technology is immense, revolutionizing physical security through tech-enabled services like remote and proactive video monitoring. These services enhance threat detection and enable incident prevention by continuously monitoring and anticipating risks, empowering security teams to respond swiftly and effectively. With seamless scalability, they can integrate real-time analytics and live audio capabilities that enable operators to actively deter intruders or intervene before incidents escalate. Leveraging IoT connectivity and cloud-based platforms, unified, scalable services will support greater levels of remote oversight and rapid response. This convergence of technologies is redefining security services and establishing a new benchmark for adaptive, intelligent protection.

Card image cap
Rebecca Herold Privacy & Security Brainiacs

The most promising new technologies in the security industry are those that are being created that can replace the long-used VPN. Throughout the past several decades, VPNs provided the best available cybersecurity choice. However, the full pathway of the transmission packets within VPNs contains many types of vulnerabilities. This has allowed for a variety of ways in which VPN vulnerabilities can be exploited, which puts associated networks, applications, data, and physical facilities at risk. These VPN security incidents are happening more often. When security/safety systems depend upon VPNs, these inherent vulnerabilities put the safety of those in the associated facilities at risk. This makes moving to zero Trust architecture an important consideration for organizations that are targeted, and those that depend upon having a secure environment to keep activities going, such as within hospitals and surgery centers. Tools that do not need open network ports, and that can strongly encrypt the transmissions, are particularly impressive because they increase the security, and safety, of those using such technology by helping to ensure the technology is not turned off, modified, or otherwise corrupted. For safety, this would be a huge improvement for Internet of Things (IoT) products such as security cameras, alarm systems, medical devices, and intruder detectors. 

Card image cap
Jason Crawforth SWEAR

Over the past year, as I have become more integrated into the physical security industry, it has been fascinating to witness the significant progress and potential for innovation in addressing modern challenges. Among these, the rise of disinformation stands out as a critical concern for end users, integrators, and manufacturers. As AI-generated manipulations and deepfakes grow increasingly sophisticated, the need for technologies that protect video and digital assets at the point of creation is vital. Proactive approaches that assign a unique cryptographic fingerprint to every video frame, sound bite, and pixel at the point of creation and securely store them on an immutable blockchain ledger have garnered considerable attention. By authenticating content at its creation, we can build trust and ensure the integrity of video surveillance data. This helps organizations stay ahead of threats and maintain confidence in their security investments. And, I believe, the more trust we build as an industry, the more confidence people will have in our security strategies overall. 


Editor Summary

New technologies in the physical security industry include artificial intelligence (AI), AV1 video encoding, hybrid-cloud technologies, and edge processing, among others mentioned by our Expert Panelists. Embracing these and other new technologies pave the way for more efficient and productive operation of our industry’s systems, all to the benefit of protecting people, facilities, and assets – and to make the world a safer place.  


Which challenge do you see as the biggest barrier to wider AI adoption in physical security?

28.6%

42.9%

14.3%

14.3%
  • Related links
  • Axis Communications Video Surveillance software
  • Genetec Video Surveillance software
  • Salient Systems Video Surveillance software
  • Axis Communications Access control readers
  • Gallagher Access control readers
  • Biometric Access control readers
  • Control Software Video Surveillance software
  • Card Swipe Access control readers
  • Standalone / Networkable Access control readers
  • IP Surveillance Software Video Surveillance software
  • Management Software Video Surveillance software
  • Proximity Access control readers
  • Monitoring Software Video Surveillance software
  • Surveillance Software Video Surveillance software
  • Smart Card Access control readers
  • Related categories
  • Video Surveillance software
  • Access control readers
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
Related articles
How Physical Security Consultants Ensure Cybersecurity For End Users

How Physical Security Consultants Ensure Cybersecurity For End Users

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Round table discussions
About this page

Discover the most promising new technologies in physical security, enhancing efficiency and competitiveness for manufacturers, integrators, and end users. Stay ahead with innovative solutions.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec