SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One System, One Card
    One System, One Card
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One System, One Card
    One System, One Card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    One System, One Card
    One System, One Card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    One System, One Card
    One System, One Card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One System, One Card
    One System, One Card
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One System, One Card
    One System, One Card
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Wire-Free Locks
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • 6
Video analytics
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

SourceSecurity.com 2015 Review And 2016 Forecast

SourceSecurity.com 2015 Review And 2016 Forecast
Larry Anderson
Larry Anderson
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • 2015 saw increased cybersecurity concerns in physical security networks, prompting stronger IT collaboration.
  • Rise in video surveillance; demand for high-definition, networked systems grew significantly in 2015.
  • 2016 forecasts emphasize interoperability and smarter systems, driven by cybersecurity and technology advancements.
Related Links
  • Security Industry’s Top 10 Mergers & Acquisitions Of 2015

2015 has been an eventful year for the physical security industry. As 2016 looms, the pace of industry change shows no sign of decreasing.

 

Seeking insights into the state of the physical security market at year-end, SourceSecurity.com this month is publishing dozens of 2015 Review and 2016 Forecast articles submitted by manufacturers, integrators and other industry leaders. Taken together, the articles portray a mostly optimistic view of the industry’s present, and an even more hopeful view anticipating the year ahead. This article will provide a compilation of that variety of viewpoints with links to the individual articles. We appreciate all the contributions to our Review and Forecast initiative, and welcome any feedback.

Nobody could have predicted the significant number of international security and terrorism threats this year, says one contributor. Undoubtedly this will result in even closer ties among the security industry, police and security services moving forward, as everyone looks to further enhance public safety.

Combine Physical And Cyber Security

The nature of risk has changed, and there is a blurring of lines between cyber, physical and online security. These changes are spurring organisational changes as well. Concern over cyber-attacks via physical security networks grew in 2015, as more and more networked devices interact with security systems.

The IT department continues to be a big buying influence as networked systems thrive. Developing IT-friendly solutions and communicating effectively to IT-focused buyers (whose needs can be slightly different than traditional security-focused buyers) is more important than ever.

Cybersecurity concerns are likely to see a broader focus beyond the servers, workstations and communications infrastructure that we are used to, growing to encompass appliances, vehicles, factories, utility infrastructure, medical devices, and myriad other devices that will eventually all be connected to the Internet – and therein lies the ongoing task.

Concern over cyber-attacks via physical security networks grew in 2015
There is a blurring of lines between cyber, physical and online security


Needs: Personnel, ROI And Good Integrators

Given the growing economy, one challenge is to find and retain top talent, especially in the North American business. One company pointed to the tight employment market that has made it difficult to fill several open positions needed because of growth. The tightening labour market has propelled to the forefront a pressing need for talent. There are fewer candidates for security officer openings – and openings in most industries. The competition for top talent is escalating.

End users are also seeing change. The economy and economics demand that end user organisations direct their decision-making based on two very well-known terms, return on investment (ROI) and total cost of ownership (TCO). One unexpected development integrators began to see in 2015 is that they no longer have to be the lowest bidder to win a project. Customers are starting to see value in working with a knowledgeable and reputable systems integrator. Integrators continue to bring new value to customers through new capabilities enabled by the Internet of Things. By utilising connected technology and sensors, security integrators are able to provide increased business intelligence across systems.

One manufacturer says security projects seem very attractive because they normally can bring up to 30% profit for a standard security system installation. IT and networking professionals can install IP-based security systems, and there is a wide variety of cost-effective high-tech products available for every need.

Interoperability will be the major trend of 2016 in the security industry. Initiatives like open standards and cooperation among suppliers are emerging to help companies react faster to changing security demands.

The competition for top talent is escalating
The tight employment market has resulted in fewer candidates to fill security officer openings

Video Sector Leading Industry Change

The video sector displayed perhaps the most change in the physical security market in 2015.

Perhaps there was some slim-down in scope and size of video projects this year, but one contributor certainly saw an upswing in new project installations. In 2015, the industry saw much more scrutiny placed on the quality of the video stream at display level. And new networked systems are meeting the demand. The end customer is expecting pristine, non-pixelated imagery. The affordable technology within the newest-generation of PCs and workstations from the CPU and graphics standpoint allow multiple views of high-definition camera activity.

Other contributors agreed that video surveillance technology continues to evolve at a strong pace with improvements in resolution, integration, intelligence and bandwidth utilisation – all of which contribute to better overall security and cost-efficiency. There is also a broader variety of vertical markets showing an increasing need for video surveillance; security vendors must be versatile in their product offering. The products themselves must be highly scalable and must provide high performance at a competitive price.

One-Stop System Or Better Integration?

The tension continued in the market in 2015 between the need for effective integration of “best of breed” systems from a variety of manufacturers and a preference for a one-stop total system from a single manufacturer. Our contributors made good arguments for each.

One company expects those with comprehensive solutions using embedded intelligence will dominate the business. This requires a dedicated focus on innovation in intelligent solutions rather than specific products, they say. “2016 will involve not only digitising the physical world, but also in understanding it with applications that go beyond the realm of security into business intelligence to generate actionable insights. This is the way of the future.”

Vicon claims that the surveillance industry is undergoing 'siliconisation'
The cost of megapixel cameras has dropped dramatically as this functionality is now available on chips

Another contributor sees a continuing and growing need to support heterogeneous systems that may include multiple brands of cameras and other devices, driven in part by the fast pace of new model introductions. Prediction: This trend will continue, and could even increase, through 2016.

The industry also experienced more price pressure on hardware than in previous years. The discussion of price versus value will be a common one in 2016. There can only be one player with the lowest cost, but there is a part of the market focused just on cost. However, many companies will keep building on value and quality.

The “siliconisation” of surveillance cameras has had a great impact on the security industry, especially this year. The cost of complex megapixel cameras has decreased dramatically as this functionality is now available on chips. The camera industry has gone from innovating on the camera’s performance and functionality to acting more like the PC OEM business, and this siliconisation is driving industry commoditization.

Smarter Systems Coming Fast

More intelligent systems offer plenty of opportunity for the market. The inclusion of high-quality analytics on board the camera, says one company, will be a continuing trend in 2016 and beyond. 2015 saw an accelerated adoption of thermal cameras with video analytics.

Several contributors predict that the adoption of video analytics will continue to grow. There will be more enterprise-level and mission-critical installations where analytics are specified into the system. The technology will also trickle down into everyday installations, like larger retail stores, schools and offices. Indeed, video analytics are experiencing a renaissance, with even more applications of analytics likely in 2016. Another contributor predicts that increasingly accurate camera- and server-based analytics applications, available in 2016, can provide valuable data and insights for business operations, management and more.

4K cameras will likely continue to dominate new offerings in 2016. However, one contributor points out that 4K surveillance faces diverse technical challenges. Every element in the video surveillance collection chain — lenses, sensors, image processors, local-site transport (LST), monitors, codecs, HDDs, and WAN interfaces — must be “ready for prime time” in order for the mainstream market to migrate to the higher resolution.

4K cameras will dominate offerings in 2016, but also face technical challenges
Every element in the video surveillance collection chain - from lenses to image processors - must be ready for the migration to 4K resolution   

However, analog is still dominant in parts of the market with some still reluctant to make the move to HD and IP. However, 2016 will see a new generation of high-performance IP camera (4K) become established in the market.

Cyber-security is another concern in the video market, as well as the physical security market in general. More attention is being paid to IT security because of high-profile cyber-attacks and data theft incidents, accelerating the adoption of IT security standards by system manufacturers and integrators.

Wireless And Other Trends

Wireless connectivity is a coming trend. A cost-effective solution is to upgrade network connectivity with a novel breed of wireless technology, millimeter wave (mmWave), which is the next unlicensed band.

One participant attributes their success to not following trends. They favour an approach of questioning conventional wisdom and placing the greatest emphasis on customer benefits. They see themselves not as a manufacturer but as a provider of solutions that provides added value for the customer.

It seems that regardless of the economic gains or losses over any given period of time, video surveillance continues to grow at a good to great clip. The demand for surveillance is always there, and the request from the end users and channels are always the same – great technology at a fair total cost, that allows them to run their business more efficiently, effectively and safely.

Security will move to a much greater focus on the user experience
The appearance of numerous mobile credential offerings signals the "beginning of the end" for card-based identity   

Access Control, Biometrics, And Beyond

News in the marketplace in 2015 included the rise in advanced biometrics, the development of more and more mobile applications for access control and important acquisitions that put smaller manufacturers on the map. 2016 will see an acceleration in the broad adoption of fingerprint solutions for corporate security applications. The market is maturing and producing reliable, effective and secure solutions that specifically address the issues that caused concern in previous years such as dirty fingers or spoofing attempts.

One contributor sees a growing awareness in the C-suite of the perils of unauthorised entry, often called “piggybacking” or “tailgating” in security vocabulary. Top executives are becoming more aware of the threat and the potential cost of such threats, and they’re motivating their organisations to take action.

How customers interface with solution providers is changing. One (cloud-based) company seeks to become “strategic partners” – to become “part of [the] customers’ overall planning and embedded in their organisation.” In effect, they are looking to add value every day.

Market research is showing that IP access control is gaining significant strength and growing at rates that the IP surveillance world experienced for the last 8 -10 years.

End user organisations continue to contain costs any way they can and have an interest in being as green as possible.

The Changing World Of Credentialing

The world of credentialing in the access control market is changing rapidly. The appearance of numerous mobile credential offerings signals the “beginning of the end” of card-based identity. Mobile offerings are strengthening in general. In fact, “invisible” access credentials are coming into their own, thanks in large part to technologies that enable smartphones to be used as electronic keys for locking and unlocking doors.

Customers increasingly expect similar types of experiences where they live, learn and work, which is impacting how they interface with their company’s systems. The transition to electronic credentials is increasing as a result of more awareness of credential options and tangible improvements in operating efficiency. Security will move to a much greater focus on the user experience.

The rising drone threat is pushing the security industry to resolve the issue of safe and effective interception
The rising drone threat is pushing the development of low-cost radar and other solutions for detection and interception 

In contrast, the increase in school shootings and other emergency situations in 2015 has made ID badging top-of-mind for facilities throughout the country, says one contributor.

Instead of upgrading or replacing hardware, end users in many cases will be able to upgrade the software to have new features, even related to systems like key control.

In general, key control is gaining mindshare. Whereas previously key management systems and lockers for asset management were seen as a periphery issue, facilities and security managers are now starting to see them as a vital part of the overall security strategy.

There are other trends, too. The rising drone threat will bolster development of low-cost radar and other solutions. However, the industry will still need to resolve the issue of safe and effective interception. In fact, drones are only one of the futuristic trends likely to impact the market in 2015.

The Middle East is a particular hotbed for vehicle barriers and other increased security measures for explosive-laden vehicles. One company focuses on providing real-time information to security personnel and first responders to help them identify, respond and mitigate emergency situations.

Looking Ahead To 2016

In the new year, look for predictive security to be a more prevalent theme as organisations are tasked with not only providing more data but making sense of the data for use in improving security operations.

Also, digitalisation for consumers (social media, tech offerings from financial companies and wireless service providers) are helping to drive IP conversion in the security industry: the advantages people have at home are desired at work, too.

We should expect that more of the large technology giants known outside of our industry will enter the professional security market, predicts another contributor, as the trend towards networking and more advanced integration continues to gain traction.

See the full coverage of 2015/2016 Review and Forecast articles here

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Physical security
  • Video analytics
  • Fingerprint recognition
  • Security training
  • Wireless security
  • Door access control
  • HD CCTV
  • Mobile surveillance
  • Thermal imaging
  • IP security solutions
  • Cyber security
  • Internet of Things (IoT)
  • Corporate Security
  • 4K
  • Related links
  • AMAG Video Surveillance software
  • AMAG Access control controllers
  • AMAG Access control software
  • AV Costar Video Surveillance software
  • Axis Communications Access control software
  • Axis Communications Access control controllers
  • Axis Communications Video Surveillance software
  • Axis Communications Intercom Systems
  • Axis Communications Intruder detectors
  • Bosch Video Surveillance software
  • Bosch Access control software
  • Bosch Intruder detectors
  • Bosch Surveillance cameras
  • Bosch Access control systems & kits
  • Bosch Intruder alarm system control panels & accessories
  • Bosch Access control controllers
  • Brivo Systems Access control software
  • Brivo Systems Intercom Systems
  • Brivo Systems Access control controllers
  • Brivo Systems Access control systems & kits
  • IQeye Access control software
  • IQeye Video Surveillance software
  • Milestone Video Surveillance software
  • Oncam Video Surveillance software
  • Oncam Surveillance cameras
  • Panasonic Intercom Systems
  • Panasonic Surveillance cameras
  • Panasonic Video Surveillance software
  • Senstar Intruder alarm system control panels & accessories
  • Senstar Video Surveillance software
  • Senstar Intruder detectors
  • Senstar Access control software
  • TDSi Video Surveillance software
  • TDSi Access control software
  • TDSi Access control systems & kits
  • TDSi Access control controllers
  • TDSi Surveillance cameras
  • TDSi Intruder detectors
  • Vicon Access control systems & kits
  • Vicon Access control controllers
  • Vicon Access control software
  • Vicon Surveillance cameras
  • Vicon Video Surveillance software
  • AMAG Access control readers
  • AV Costar IP cameras
  • Axis Communications IP cameras
  • Axis Communications Access control readers
  • Bosch IP cameras
  • Bosch Access control readers
  • IQeye IP cameras
  • MicroPower Technologies IP cameras
  • Oncam IP cameras
  • Panasonic IP cameras
  • TDSi Access control readers
  • TDSi IP cameras
  • Vicon IP cameras
  • Vicon Access control readers
  • AV Costar IP Dome cameras
  • Axis Communications IP Dome cameras
  • Bosch IP Dome cameras
  • Bosch Access control cards/ tags/ fobs
  • Bosch Security Systems Access control cards/ tags/ fobs
  • Brivo Systems Access control cards/ tags/ fobs
  • IQeye IP Dome cameras
  • Oncam IP Dome cameras
  • Panasonic IP Dome cameras
  • TDSi Access control cards/ tags/ fobs
  • TDSi IP Dome cameras
  • Vicon IP Dome cameras
  • Vicon Access control cards/ tags/ fobs
  • Axis Communications Storage
  • Bosch Storage
  • Thermal Surveillance cameras
  • Wireless Surveillance cameras
  • Thermal IP cameras
  • Articles by Larry Anderson
  • 2015 security trends
  • Related categories
  • Access control controllers
  • Access control systems & kits
  • Intercom Systems
  • Access control software
  • Intruder alarm system control panels & accessories
  • Intruder detectors
  • Surveillance cameras
  • Video Surveillance software
  • IP cameras
  • Access control readers
  • Access control cards/ tags/ fobs
  • IP Dome cameras
  • Barriers
  • Storage
Related white papers
Understanding AI-Powered Video Analytics

Understanding AI-Powered Video Analytics

Download
Open Credential Standards And The Impact On Physical Access Control

Open Credential Standards And The Impact On Physical Access Control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
Related articles
Interface Systems: 2026 Retail Security Trends

Interface Systems: 2026 Retail Security Trends

Why Open Matters In The Age Of AI

Why Open Matters In The Age Of AI

Verkada AI Tech Reshapes Enterprise Security Industry

Verkada AI Tech Reshapes Enterprise Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Video analytics
  4. News
  5. Expert commentary

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One System, One Card
One System, One Card
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec