SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Have Security Protocols And Practices Kept Up With How People Work?

28 May 2022

Have Security Protocols And Practices Kept Up With How People Work?
Larry Anderson
Larry Anderson
28 May 2022
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Security protocols must evolve to match workplace changes driven by the pandemic.
  • Technological flexibility for employees requires upgraded security practices to ensure protection.
  • Companies need adaptive security measures to sustain business operations amid workstyle shifts.

Editor Introduction

It’s safe to say there has been more change in the workplace in the last two years than ever before. Driven by the pandemic, technology has both allowed greater flexibility for employees and enabled continuing prosperity for many companies that otherwise would have had to cease operation. But have security protocols and practices done enough to enable companies to keep pace with the changes? We asked this week’s Expert Panel Roundtable: Have security protocols and practices kept up with the changing ways people work?


Card image cap
Mathieu Chevalier Genetec, Inc.

As companies embrace different return-to-office practices based on more flexible hours, use of space, and digital transformation, they are looking at physical security systems differently. Organizations are increasingly using the data gathered by their physical security systems for more than controlling access and monitoring their spaces. To meet the changing needs of the hybrid workplace, they are also tapping into the data gathered by their security systems to come up with new standard operating procedures, optimize space, improve business efficiency, and comply with public health requirements. This fundamental change in the way people work also means that the traditional IT perimeter no longer exists. Organizations need to keep up with these changes, strengthen their security protocols and bolster their cyber-posture, or risk undermining the safety of their intellectual property, sensitive data, and personal information.

Card image cap
Hiroshi (Huey) Sekiguchi i-PRO

From a manufacturing and technology perspective, we think of protocols as a way to communicate information. It is hard for protocols to keep up with the rapid pace of technology innovation. In the video security market, we have ONVIF as an example of an open industry forum that promotes standardized interfaces between vendors. But we can’t expect ONVIF to communicate all the advanced metadata coming from an AI camera overnight. As such, manufacturers like i-PRO rely on APIs or SDKs to develop plugins for interoperability between partners. This enables us to get important AI metadata into a VMS such as Genetec Omnicast, which allows operators to search or set alarm triggers for specific characteristics. Of course, the data itself means nothing until we transform it into useful information. As protocols and practices evolve, it’s important to pick the right partners to guarantee interoperability as communication protocols and standards emerge.

Card image cap
John Davies TDSi

Security is always evolving, but not necessarily in a linear way. For example, touchless secure access control features have been embedded in security for some time but were not necessarily prominent for many operators until the pandemic struck. Suddenly we were all hyper-aware of the need to control infection vectors, and touchless systems went from a convenient feature to an essential one. The use of mobile device credentials for access control is a good example of another technology that has been “in the right place at the right time.” Whilst it has garnered considerable interest as a post-pandemic touchless technology, the primary driver was to boost security and flexibility whilst presenting security users with a solution that fits their expectations in using their mobile devices for multiple applications. Undoubtedly the pandemic has also accelerated the market’s interest in exploring and adopting the latest solution options. 

Card image cap
Osvaldo San Martin Johnson Controls, Inc.

Looking back on the two years since the COVID-19 pandemic began, it’s clear our day-to-day lives have transformed drastically as we adapted to remote/hybrid work environments. These changes have urged the implementation of stronger protocols for in-person working. A few ways this is happening are by businesses and organizations utilizing touchless access control that delivers streamlined and healthy occupant experiences and updating existing video systems with AI-powered contact tracing and mask detection solutions. Additionally, security technology and practices are being updated with advancements that include AI-driven ransomware detection, cloud-based cybersecurity, two-factor authentication steps, and maintaining good cyber hygiene. 2021 was a year filled with cyberattacks, such as Logj4, Kaseya, and REvil, and security companies are doing everything they can to prevent this from happening in 2022. Today, more protocols are being put into place to help recognize threats and inform on how to cope with attacks should they happen. Hackers might be getting smarter but so are security practices. 

Card image cap
Will O'Donnell Vanderbilt Industries

As there has been a significant transition to remote work over the last two years, security practices have rapidly developed and adapted to combat threats and protect organizations while maintaining a level of convenience for individuals. Today’s innovation efforts like cloud-based access control, SaaS, biometrics, mobile credentials, and similar technologies create more secure ways to authenticate people and grant access ultra-convenient. With this being said, it’s still crucial to remember that each organization requires a deployment that is specific to them and their access rights, which means that every security system needs flexibility, adaptability, and the ability to scale with a customer’s ongoing security requirements and demands. There are open and unified platforms readily available on the market today that help users configure their systems to match their unique security requirements. These modern solutions offer built-in tools and open architecture to quickly adjust to the changing environment.


Editor Summary

The workplace has undergone a drastic transformation in the last two years. For that matter, so has the security industry. The security industry has unveiled a wealth of well-timed technologies that have played a major role in helping companies adapt to recent changes, both those necessary during the pandemic and those that will continue long after the crisis is behind us. 

  • Related links
  • ACT Intercom Systems
  • ACT Access control software
  • Genetec Video Surveillance software
  • Genetec Access control software
  • TDSi Video Surveillance software
  • TDSi Access control software
  • TDSi Mechanical digital locks
  • ACT Electronic lock systems
  • ACT Access control readers
  • Johnson Controls Limited Access control readers
  • TDSi Access control readers
  • TDSi Electronic lock systems
  • ACT Access control cards/ tags/ fobs
  • Genetec Network Video Recorders (NVRs)
  • TDSi Network Video Recorders (NVRs)
  • TDSi Access control cards/ tags/ fobs
  • Related categories
  • Access control software
  • Video Surveillance software
  • Intercom Systems
  • Mechanical digital locks
  • Access control readers
  • Electronic lock systems
  • Network Video Recorders (NVRs)
  • Access control cards/ tags/ fobs
  • Video signal devices & accessories
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Modernizing Access Control

Modernizing Access Control

Download
Enhancing Physical Access Control Using A Self-Service Model

Enhancing Physical Access Control Using A Self-Service Model

Download
Related articles
AI-Driven Security: HiveWatch's New Leadership

AI-Driven Security: HiveWatch's New Leadership

Securitas Acquires Sonitrol Ft. Lauderdale & Level 5

Securitas Acquires Sonitrol Ft. Lauderdale & Level 5

Join Kindoo's Partner Program For Security Dealers

Join Kindoo's Partner Program For Security Dealers

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Round table discussions
About this page

Explore security protocols blending technology, practices, and people for optimal workplace safety - enhancing access control, surveillance, and cybersecurity.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec