Physical security - Expert commentary

Why 2018 Needs More Intelligence And Integration To Drive The Industry

  Demand for video surveillance equipment continued to grow rapidly in 2017 with price competition remaining intense. The important trends in 2017 were in three areas: Multi-sensor technology, artificial intelligence/deep learning, and stronger integration with VMS partners. Security professionals are turning to emerging technologies such as multi-sensor panoramic cameras, which can dramatically increase situational awareness, improve operator efficiency, and are more cost-eff...

Why Collaboration In The Security Industry Is Needed To Increase Cybersecurity In 2018

2017 demonstrated the need for increased safety, security, and collaboration. We predicted that there would be an increase in the role of cybersecurity in 2017, and without a doubt there was great focus around the need for stronger network security protocols. Growing Focus On Cybersecurity Cybersecurity continues to be top of mind and organizations demand solutions that are cyber-secure. Manufacturers, integrators, and end-users must actively collaborate to develop policies and solutions that...

The New Alliance Of Humans And Robotics In Security Solutions In 2018

  The past year has proved to be a year full of many changes both within our industry and for Robotic Assistance Devices (RAD). While we have experienced increased adoption of artificial intelligence-based solutions, the industry has been challenged with an ever-evolving technology landscape. Protecting enterprise organizations from both cyber and physical security threats will be an ongoing challenge the industry must grapple with. Greater Adoption Of Robotic Solutions To...

How Integration And Global Expansion Will Help The Security Industry Succeed In 2018

  Economic recovery has enabled companies to continue global expansion efforts. We’re seeing substantial growth with our enterprise clients – 45% year-over-year increase – and sound growth with our local markets – 14% year-over-year increase. Both existing and new clients are upgrading their current security infrastructure and investing in the development of long-term solutions. Convergence of physical security and IT security continues to trend. Threat...

How The Cloud Is Bringing Change Into The Security Market In 2018

  In January of 2017, ISONAS forecasted that the year would be a transformational year in access control with strong movement to IP access control, and that the adoption of IP access control hardware and software would significantly outpace the growth of the overall industry. In retrospect, our forecasts were on point and accurate. The industry has seen robust growth in the high single digits, while IP access control is seeing growth rates of up to 30-35%. The market drivers...

How Society And Politics Impacted The Security Industry In 2017

For the security industry, 2017 was a good year, but not a great year. With political changes coming and greater interest in border control, perimeter security and analytic technologies, we have seen an increase in enquiries from both federal, and state law enforcement agencies and municipalities. The Political Security Landscape The series of unexpected, natural and self-inflicted disasters that swept across the United States over the last few months have also created a greater int...

Learning To Combine The Cloud And On-Premise Security In 2018

This time last year, we predicted 2017 would be the year digital identities began transforming trusted access and other interactions in physical and online environments. Continuous Authentication Experience Demand grew for unified identity and access management systems supporting both cards and cellphone devices. Trusted identities began bridging the gap between connected workers and smart buildings. We saw new IoT use cases that employ location services technologies to create a continuo...

SIA Predicts Top Physical Security Trends For 2018

In the wake of Securing New Ground event in New York City in 2016, the Security Industry Association (SIA) published an inaugural “Security Megatrends” report that assessed for major “megatrends” for the security industry in 2017. 10 Major Megatrends Only days ago, SIA published “Security Megatrends: The 2018 Vision for the Security Industry,” again identifying 10 major megatrends to watch in the year ahead. SIA saw a great deal of activity unfold in 2017, a...

Security System Interoperability To Become Standard In 2018

At ONVIF, we believe our perspective for 2017 turned out to be reasonably accurate. We did see an increasing interest for interoperability all the way to system-to-system level; not only within the security industry, but also in neighbouring industries where the prospects for IoT have drastically improved. I believe the industry as such has matured in its relation to IoT and today we can imagine how IoT will play a part of smarter and safer system deployments. Increased Cybersecurity Threat T...

2017 Security Trends: Increased Role Of Technology Integration And Robotics

The year 2017 has been a banner one for physical security with the advent of increasingly sophisticated technology to manage threats. As we approach 2018, the field widens with regard to solutions that will expand the capability of security teams seeking ways to shore up their risk exposure and expand situational intelligence. Here’s a recap of milestones and areas we see as important in the new year. Technology Integration Technology integration played an even greater role in the market...

2018 Security Trends: AI Continues To Grow As Business Systems Integrate

Throughout 2017, customers have been increasingly looking for technological answers to a plethora of their business needs, and the surveillance industry has seen a rapid boost because of this. In particular, we’ve seen more organizations harness video to fulfill much more than just their security requirements. Combining Physical And Cyber Security Businesses are now using surveillance to address areas such as health and safety, sales and marketing as it fast becomes more of a business op...

Video Surveillance And Access Control Data Will Allow Users To See The Bigger Picture In 2018

As we take a look back on 2017, there are a number of trends we need to highlight — all of which have redefined our industry. Cybersecurity played a huge role in physical security, driven by the increase in the use of the Internet of Things (IoT) and the overall interconnectivity between devices and expanding cloud technologies. Although exceptionally beneficial, the IoT also brings with it an increased amount of cyber vulnerabilities. As security systems are using the Internet more and m...

Video Analytics Will Be Key To Security ROI In 2018

The security industry was strong and healthy in 2017. High-end security markets, such as the power distribution and critical infrastructure sectors, saw continued growth and opportunity for perimeter security technologies like thermal imaging, video analytics and radar. For the low-end security markets, there was significant competition from Chinese manufacturers. Despite this challenge, we saw continued growth from premium Western security manufacturers in 2017 in which many introduced cost-ef...

Surveillance In 2017: 360-degree Cameras A Primary Device For Total Situational Awareness

The physical security market continues to experience growth as users look to capitalize on the promises of emerging technologies and because of this, 2017 proved to be a great year for Oncam. In fact, this year was the best year in Oncam's history in terms of sales, as 360-degree fisheye cameras have gone from being a “specialty” camera used only in certain applications to a primary device for enabling total situational awareness. Today, many of our customers leverage 360-degree ca...

Year In Review: Top 10 Security Industry Expert Panel Discussions From 2017

SourceSecurity.com’s Expert Panel covered a lot of ground in 2017 about a variety of topics resonating in the security market.   The most-read Roundtable discussion in 2017 was about a familiar and ongoing debate: What is an open system? Other hot topics that made the Top-10 list of Roundtable discussions included smartphones, buzzwords, standards and product life cycles. Here is a listing of our Top 10 Expert Panel Roundtable discussions posted in 2...

How Drone Detection Will Protect Cyber Security In 2018

Over the past year, there was an unprecedented rise in drone incidents. Drones were unwelcomed at and threatening the physical and cybersecurity of defense organizations, stadiums, corporations, and data centers, among organizations with critical infrastructure. Legislation is only just emerging now, and laws protecting airspace are hard to enforce, especially if a pilot is unaware of the risks of their flight or is flying with malicious intent. Laws can be circumvented, but detection technology...

Connected, Cyber-secure Solutions Will Lead The Security Market In 2018

2017 was quite an interesting and eventful year for the physical security industry. The economy has been robust and technology has become progressively sophisticated—with interactive services, cloud computing and network-based solutions taking charge to provide new insights to installers and their end-user customers. The Internet of Things is creating increasingly integrated solutions, with a heightened emphasis on total connectivity. Changing Security Expectations World events have als...

Security Software Trends: Operational Resiliency And Privacy Protection Key In 2018

Last year, Genetec predicted that cybersecurity would be taken much more seriously as the Internet of Things (IoT) opened more doors for hacking and network take overs. We also predicted that that there would be an increase in the adoption of Software as a Service (SaaS), expanding choice and convenience from new ownership models via hybrid (on-premises and Cloud) and Cloud-only models. Cyber Accountability Awareness 2017 was also a year of awareness about ‘Cyber Accountability’....

Five Key Steps For US Security Companies To Become GDPR-compliant

News of cyberattacks seems constant these days. Recently, Equifax, a US-based consumer credit reporting agency, announced that a private customer data breach impacted 143 million people. Earlier this year, 1.5 million connected cameras around the world were hijacked in an unprecedented DDoS attack. As cyber-attacks become more rampant, it’s hardly surprising that governments are stepping in to hold organizations more accountable. One of the most recent examples of this is the European Un...

Top 3 Mistakes When Integrating Security Entrances And Access Control Systems

Access control and security entrance integration is a specialized discipline. It is true that security entrances require only a dry contact and can integrate with virtually any access control system, but there are some things to be considered when researching the right access control system for your organization’s security goals. After 21 years’ experience in the security industry—four of those serving as an advisor for security solutions to dozens of Fortune 1000 companies&md...

How Live Streaming Video Adds Security, Safety And Business Intelligence For End Users

End users can add security, safety and business intelligence – while achieving a higher return on investment at their protected facilities – with live streaming video. It can be deployed effectively for IP video, network video recorders (NVRs) and body-worn cameras. The growing use of streaming video is resulting in vast technological developments and high-end software that promotes reduced bandwidth, high scalability and lower total cost of ownership (TCO). Here’s how users c...

Advanced Threat Detection: How Video Analytics Is Evolving To Meet The Need For Speed

In the digital age, speed has never been more critical. Customers expect an instant response to a query. Executives expect sales data on their tablets in front of them in real-time. A site manager at an oil refinery needs an instant alert about a defective valve. An IT manager expects to know about a phishing email before it hits his employees’ inboxes. The 'need for speed' is impacting the physical security sector too. Customers increasingly expect their security systems to identify and...

How IT will help you exceed your video surveillance goals

If I asked you today how your video surveillance environment has changed over the past few years, how would you respond? I bet the answer could include the following options: An increase in the number of cameras The addition of more advanced technologies such as high-definition video, video analytics, 360-degree video devices, cloud-based services and more IT innovations. Demand for more video data to drive business, IT and security initiatives. Modern Video Surveillance The modernizati...

Six Advantages Of An Effective PSIM Solution

PSIMs have had a bad rap in the pro security industry for a multitude of reasons; ranging from suppliers overpromising on integration and control capabilities to complexity of implementation and use. However, there is a silver lining to this story. Today, advanced PSIM solutions are being successfully deployed in commercial applications with the ability to integrate previously disparate professional access, video, notification, building operations and more onto a unified control and management...

Four Ways The Cloud Improves Your Cyber Security Posture

Adoption of the cloud is not slowing down. In fact, what’s happening is quite the opposite. According to IDC, worldwide spending on cloud computing is expected to reach $162 billion USD in 2020, growing at a compound annual rate of 19%. This isn’t surprising when you consider that more organizations are looking outside their own environment for solutions that will help them become more agile, maximize resources and save money. Yet, while this study and countless others show that mo...

Download: Is Your Access Control System As Secure As You Think?

Recent research shows most access control technology currently in use is not as secure or convenient as many security managers believe, according to day-to-day users of the system. In this HID Global white paper, you will discover what different companies look for in an access control system, why certain legacy access control systems may be vulnerable to attack, and why upgrading to a new access control system can result in huge benefit for enterprises and end users.  Find Out M...

How Intelligent IP Cameras Enhance Predictive Analytics

For many years, video analytics have enabled end users to detect specific people or vehicles entering restricted areas, capture license plate information, scan crowds for specific individuals and much more. Today’s Video Management Systems (VMS) and IP cameras are built with powerful processing capabilities, helping to drive the development of more advanced analytics to more accurately detect abnormalities in behaviors that trigger alerts – an important component of predictive analys...

How To Choose The Right Security Entrance For Effective Customer Security

Security and systems integrators across the nation are recommending and providing long-term security solutions to their customers. But when it comes to physical security entrances, integrators can easily fall into the trap of simply fulfilling an end user’s exact request without much pushback. Why? We believe the complexity and variety of entrances available makes it difficult to consult on the best solution, but also because there are a lot of assumptions at play. 1) Ask Questions To De...

ONVIF Profile A To Drive Interoperability For Access Control Solutions

The need for interoperability, which is making different types of devices or technologies communicate with one another, is certainly nothing new in our industry. At Anixter, we have been testing interoperability in our Infrastructure Solutions Lab for many years, connecting devices and clients from different suppliers to our test server site to ensure that integrations and multi-supplier solutions are going to work correctly for our customers in real-world scenarios. Open Standards In Access Co...

Key Practical Steps To An Effective Business Security Culture

There has never been closer integration between physical and logical security systems, so there has also never been greater importance when it comes to defining and maintaining the security culture within an organization. Unfortunately, with increasingly complex security protocols required on a daily basis (and used by every employee), a security regime can easily become lax through apathy – which offers the perfect opportunity for potential intruders to take advantage. While securi...