SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Robotics
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

What Does The Metaverse Mean For Security?

7 Jul 2022

What Does The Metaverse Mean For Security?
Larry Anderson
Larry Anderson
7 Jul 2022
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Metaverse introduces new security technology challenges and opportunities across multiple markets.
  • Security in the Metaverse involves managing complex technology needs and potential risks.
  • Experts discuss Metaverse's transformational impact on security at roundtable event.

Editor Introduction

The Metaverse sounds like the plot of the latest summer action movie. In reality, it’s a technology - or, more accurately, a group of technologies - that will likely have a transformational impact on a host of markets. For security, the Metaverse has an extensive list of needs. It also presents some opportunities. We asked this week’s Expert Panel Roundtable: What does the Metaverse mean for security?


Card image cap
Ed Bacco ADT Commercial

I think we first need to understand that ‘Metaverse’ is not some new technology, but rather a new view at how humans interact with technology. As an industry, we’ve been slow to leverage and trust technologies that can help us make sense of our sensor-driven world. We’re often still stuck at sending in a human to validate what an analytic has already told us. What’s driving this mistrust is that the data is presented in a two-dimensional form and humans think in 3D. Emerging technologies will help bridge that gap by enabling a 3D view of our environments that will supply data beyond just the visual range to eventually include the sense of hearing, touch and feel, and even at some point, a sense of smell through advanced analytics. Enabling a true, multi-sensory, virtual presence will fundamentally change the way we interact with environments and how we secure our facilities.

Card image cap
Jumbi Edulbehram NVIDIA

The Metaverse is a virtual universe, where digital representations exist for spaces, objects, people, transactions, etc. For practical purposes, the Metaverse is essentially a digital twin of physical reality, i.e., a digital representation of indoor and outdoor spaces such as buildings, cities, airports, stadiums, etc. Key uses include:

  • Visualization: Imagine security personnel being able to ‘walk through’ the 3-D digital twin of a facility, while getting real-time video and data from cameras and sensors.
  • Collaboration: Using digital twins, architects, IT providers and security systems designers can easily visualize and collaborate, when designing a facility.
  • Simulation: Responses to threats and events can be simulated to achieve desired outcomes, enhancing safety/security for real-world incidents.
  • Training: A lot of machines, robots, and self-driving vehicles all use AI (artificial intelligence) these days. The AI models need to be ‘trained’, and it is less expensive to train them using synthetic data in the digital realm.
Card image cap
Lyron Bentovim The Glimpse Group

When people talk about security in the Metaverse, there are usually two primary concerns: individual identities and digital assets. Blockchain technology and tokenization are the two key elements for securing identities and assets in the Metaverse. Tokenization means replacing sensitive information with non-sensitive information and storing the sensitive information safely elsewhere, like how museums will display a replica of a painting and keep the real one in a safe. To stick with the analogy, blockchain technology means that a safe is completely transparent. Everyone could see what was inside, so there’s public accountability, but only one person would have the key to the safe. Individual identities are a bit more complex than digital assets, but can ultimately benefit from the same technology. Currently, online identities are siloed on particular websites and applications. This is likely how Metaverse identities will initially operate, as individual identities tied to particular 3D worlds. But, interoperability is a major focus of Metaverse developers.

Card image cap
Simon Randall Pimloc Limited

The Metaverse is an exciting development in the digital world, but we must remember that protecting people’s data is paramount. The key thing is to change the way we think about capturing people’s personal data – it’s private - and people’s personal data should be obscured as standard when stored, and in some cases, when in use, to avoid any risks from hacking. With the use of avatars and open platforms in the Metaverse, there are more risks around child safety content moderating and using biometrics to authenticate individuals. Knowing who’s who in these environments is a concern, and the Metaverse will amplify the current issues we are seeing with online platforms – putting pressure on policy reform and pushing leading platforms to do more, in order to keep their users safe, while continue innovating new products, especially when more of us are wearing head mounted cameras and microphones around our homes and offices.

Card image cap
John Davies TDSi

The Metaverse is a really interesting concept, using augmented reality (AR), virtual reality (VR), and blockchain to replace some of our offline interactions completely. At TDSi, we have been mulling over the idea of using this approach, with the possibility of bringing training and demos into the Metaverse, in order to make it more convenient for some of our partners and customers, by avoiding physical travel. I think we have all seen the power of online interactions, during the COVID-19 pandemic restrictions, but the flipside is that we have also seen the drawbacks too. We are yet to reach a stage, where online conversations can be as fluid and natural as face-to-face ones. You also miss the ability to enjoy informal ad-hoc conversations, as the technology does not really lend itself to that yet. Certainly, our ideas about using the Metaverse are now at an embryonic stage. There is a way to go before this technology starts to be adopted by the masses, but we will fully embrace it when (or if) they do.


Editor Summary

The responses from our Expert Panel Roundtable alert us to the imminent possibilities of embracing the Metaverse in the security market. Far from a distant, futuristic concept, the Metaverse offers real-world opportunities for security in the here-and-now. Furthermore, extreme security of identities and digital assets will be a foremost attribute of the Metaverse.

  • Related links
  • TDSi Access control systems & kits
  • TDSi Access control software
  • Access Control Software Access control software
  • Proximity Access control systems & kits
  • Standalone / Networked Access control systems & kits
  • Proximity Access control software
  • Centrally managed access solution Access control software
  • High Level Interface Access control software
  • Issuance and identification system Access control software
  • Management Systems Upgrade Access control software
  • Related categories
  • Access control systems & kits
  • Access control software
Related articles
AITX Reports Strong RADCam Enterprise Orders

AITX Reports Strong RADCam Enterprise Orders

AI Tech Solution's SARA At ISC East 2025: Future Of Security

AI Tech Solution's SARA At ISC East 2025: Future Of Security

Agentic AI For Security: SARA ASSIST Solutions

Agentic AI For Security: SARA ASSIST Solutions

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Robotics
  4. News
  5. Round table discussions
About this page

Explore Metaverse Security: challenges, opportunities, and vital strategies for safeguarding virtual spaces in an ever-evolving digital landscape.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec