The Trend of Change

Education will play large role for integrators needing to keep pace with convergence

CHANGE will continue to be the biggest the biggest trend in the security industry well into 2008. Enterprise security management systems are becoming larger and more integrated. Multi-level convergence is occurring in logical security, IT, data, access control and integrated components. Video management and access control are forming an integrated security management system. The future is leading the industry toward an integration platform that involves access control, video, audio, building control, intrusion and fire protection.

Traditional access control manufacturers are on the forefront in producing new platforms which will be in great demand because of usability. These deeply integrated platforms allow the user to operate previously disparate systems from one common user interface without having to jump from system to system. For instance, multiple video systems from disparate manufacturers can be integrated and operated on one user interface with a common look and feel. Add to this video the overlay of alarms and events in one user-friendly interface. Functionality will be greatly enhanced, and training will be simplified to learning the basic operation of one integrated system.

Today, a security director can easily access and control pertinent information and commands, including alarms and video from remote locations such as from a home. These technological advances will not only be available in large, complex enterprise-level systems, but also in the small-business system where the user will choose desired system functionalities. Systems will become more open in architecture.

Living on the Edge
The industry is moving away from DVRs to IP cameras and encoders. Edge devices now exist which provide a flexible video management hardware platform for organizations moving toward digital video. Professional video server options enable customers to integrate existing analog CCTV systems into an IP-based solution, so a company can acquire all the benefits that digital technology offers without reinvesting in a new system. These IP-based solutions work with old and new technology including DVRs, IP and analog cameras on the same system. Video and access control integration allows recording based upon alarms and defined events. Video can be stored at the edge and only forwarded across the network upon an alarm or predefined event, or during non-peak network hours, helping to optimize a network.

Now, video can be tagged both before and after an alarm is triggered, when the system is recording or buffering. A truly integrated system also can tag alarms from other systems such as intrusion detection, building management and visitor management.

The fledgling, but rapidly growing, video analytics field will be a disruptor in the security space in coming years. There was a taste of it at ISC West in March, as more companies entered the analytics arena with native solutions. Operators are unlikely to spot incidents when there are many camera views. Intelligent video analytics turns video into a proactive tool, creating an extra layer of security for the organization. The demand for advanced analytics will increase as users understand the benefits of the technology, the costs of ownership diminish and internal applications become apparent.

A Critical Puzzle Piece
Integrators are being pushed by new requirements demanding IT or IP expertise for installation and service. These new requirements are quickly becoming the norm as security decisions are being significantly impacted by IT departments. Integrators are facing an expensive quandary, struggling to acquire the skill and proficiency demanded by the new technologies and network infrastructure. Change is becoming standard business in the industry, and successful integrators will either bring the necessary IT talent on board or will partner with companies with the expertise already on-hand.

Some IT companies are looking at the security space as a market to enter and grow business. This may prove to be a threat to the security integrator who is lacking IT expertise.
Education is a critical piece of the puzzle. Becoming educated in order to successfully install and support a system is commonplace, but the way to accomplish such training is by change. Options such as Internet-based learning tools and Web-based alternatives, are becoming available and attractive. Online training provides an alternative means to traditional training. Technicians can choose the appropriate timeframe to take online training classes so there is minimal downtime in the field. Integrators can educate more staff without sending their technicians to an offsite facility, thereby eliminating many travel-related expenses. The technician has the ability to review the course work prior to an installation, thereby refreshing his or her memory with up-to-date, pertinent course material.

The ever-changing security industry will not disappoint in 2007. Manufacturers, integrators, IT professionals and users will need to adjust accordingly to the continuing trend in the use of IP technology and the consolidation within the industry.

Education remains a key ingredient to success, and companies are providing convenient, cost-effective education solutions. Multi-level convergence with deeper integration across an open platform provides the solution today’s savvy end users demand.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.