What is on the Horizon?

What is on the Horizon?

The security industry has a long history of pushing the technology envelope. Whether taking quantum leaps or building incrementally on past achievements, we’re in constant forward motion. While no one can guarantee how that will play out in 2021, here are a few observations about where I think we are going.

MEETING NOVEL CHALLENGES WITH NOVEL SOLUTIONS

Technology continues to advance at an accelerated pace. Software and hardware are being integrated in novel ways to create smarter solutions. We are seeing more solutions being designed to serve multiple purposes from safety and security to business operations. What’s driving these trends? Some of the impetus is simply the natural evolution of technology and the fiexibility that networks offer. Another thing spurring innovation is the need to respond to crises. As the well-worn adage says, “Necessity is the mother of invention.” COVID-19 is no exception. During 2020, many IP devices— originally designed for security—have been integrated with other technologies and put into service in new ways.

For example, hospitals using IP cameras and networks to scale their ability to visually monitor patients remotely, ef- flciently manage resources and rapidly respond to emergencies. They are using audio and object detection analytics to recognize a patient in distress from a fall, injury or other difflculty, and expedite lifesaving response. They’re using in-room video cameras to monitor patient vital signs remotely through integrated telemetry systems. In today’s COVID world, this greatly decreases the frequency of inperson encounters between patients and medical staff thereby reducing exposure and the risk of transmitting the virus— and ultimately improving healthcare outcomes.

COVID-19 will continue to have a major impact on how the world operates in the coming year. To help their customers remain safe and protected in this new reality, security professionals will flnd themselves creatively adapting traditional surveillance and security devices to new roles and employing new technologies–offering solutions for touchless entry, social distancing and virtual interactions designed to contain the spread of the virus. With lessons- learned and resourcefulness in mind, technological advancement, integrated network solutions, and future challenges will increasingly create opportunity for IP solutions to add value.

OVERCOMING ERODING TRUST IN INSTITUTIONS AND TECHNOLOGY

It is no secret that trust in business, government, media and NGOs has been eroding for a while. Trust comes in many forms: being an honest and transparent partner, standing behind your products and following a consistent business model. Furthermore, it’s crucial to deliver products that can capture, process and store data responsibly and protect against cyberattacks. This starts with forward-thinking and best practices in the design, development and testing of products in order to minimize risks.

As security professionals, we need to embody a strong business ethic, one that resists corruption, demonstrates social responsibility, and personifles good global citizenship. We must manage that flne line between protecting individual privacy and providing sufflcient surveillance to make the community feel safe and secure in public and private environments. It is a dynamic landscape that that requires navigating changing attitudes and regulations both within the United States and across the globe.

DRIVING NEW APPROACHES TO CYBERSECURITY

As the technology ecosystem continues to expand, so, too, does the threat landscape. With an exponential growth in connected devices, the need for heightened cybersecurity measures is more important than ever. This has led to some important trends in the areas of zero trust networks, layered cybersecurity, lifecycle and device management and OEMs.

Zero trust networks. To counter the high risk of a permeable network, companies are adopting the philosophy of “never trust, always verify” everyone and everything trying to connect to their systems, before granting access. In zero trust networks, the identity of an entity is veri- fled multiple times in different ways, depending on its behavior and the sensitivity of speciflc data in the network being ac cessed. Network micro-segmentation lets businesses apply varying levels of security to specific parts of the network where more critical data resides. Granular network perimeter security – based on users and devices, their physical locations, and other identifying data – determines whether their credentials can be trusted to access the network.

Layered cybersecurity. Another trend gaining traction is hardening a device’s operating core where sensitive information such as end-user data, log-in credentials and network access certificates reside. In the coming year, I expect more manufacturers will be incorporating chipsets encoded with protective features like device identification to prevent port hijacking, secure boot and signed firmware checking to prevent unauthorized or malicious downloads. They’ll be implementing a more layered approach to cybersecurity so that each layer of hardware and software shields the layer below with additional security features. To further reduce cyber vulnerability, we’ll see more manufacturers automating procedures to ensure that customers implement changes, upgrades, and patches throughout their ecosystems in a timely manner.

Device management and lifecycle management. Two other aspects of cybersecurity coming to the forefront are individual device management and comprehensive lifecycle management of the entire surveillance solution. With cyberattacks becoming increasingly numerous and sophisticated, it’s becoming even more important for manufacturers, integrators and end users to work together to institute consistent hardware, software and user policies that conform to cybersecurity best practices and continue over the lifetime of the ecosystem and its individual components.

Fewer OEM relationships. OEM partnerships will become less common as it is difficult for the end-user to know the real manufacturer, which is a must for valid cybersecurity processes.

SHIFTING MORE COMPUTING TO THE EDGE

Billions of devices are already connected to the network and this number continues to increase exponentially. With all that potential computing power at the edge, there’s more momentum for manufacturers to harness that in-camera resource to help customers detect and identify threats, and make split-second decisions on how to mitigate them.

Driving the move to edge-based processing is the opportunity for customers to reduce system complexity and lower their operating costs. They can build faster and more scalable systems, and facilitate more complex, real-time analysis of events at the point at which they occur, which can lead to more timely response to incidents.

In the coming year we’ll likely see more powerful edge devices embedded with deep-learning processing units (DLPU). These devices will provide a perfect platform for third-party developers to create analytics based on AI and deep learning that can provide more granular object classification and more predictive behavior analysis. Furthermore, because these deep learning programs only transfer relevant video over the network, customers will be able to lower bandwidth consumption and reduce their storage needs. With the improvement in analytics accuracy, customer will also experience fewer false alarms which will lead to additional cost savings and more efficient use of human resources.

REACHING FOR MORE PREDICTIVE ANALYTICS

Inspired by the way the human brain processes information, manufacturers will continue the trend of building cameras embedded with deep learning processing units. Developers will be able to use these DLPUs to improve the reliability of their video analytics algorithms and enhance surveillance, security and business processes.

These deep learning tools correlate the massive amount of data collected by devices and sensors to train the analytics to better recognize patterns, classify information and make decisions by labeling and categorizing what the camera sees. While it will still take some discernment on the part of customers and integrators to separate hype from fact, the opportunities for deep learning solutions will rise as the technology matures. With continued investment in refining this learning process, I expect we’ll see dramatic increases in video analytics accuracy, and a demand for these solutions, in the coming years.

BRIDGING THE EDGE AND CLOUD COMPUTING DIVIDE

As we look towards 2021, with more processing power available in edge devices, hybrid computing solutions will become an emerging trend. Companies will be looking to implement smart architecture that directs processing tasks across the edge, core, and cloud to wherever it makes the most sense. These multi-tiered solutions will give customers the flexibility to deploy and manage their ecosystem more efficiently and more cost-effectively. The traditional client-server model alone presents limitations, inefficiencies and network performance issues due to centralized cloud servers that must respond to a multitude of device requests.

Leveraging a hybrid edge-cloud model—where central and edge computing resources are combined—can reduce cloud hosting costs, bandwidth and latency issues. With more powerful devices companies will be able to take better advantage of processing at the core, the cloud and now, the edge—essentially where another server can process significant amounts of data on the device.

As an added benefit, edge devices offer an unparalleled level of built-in cybersecurity features. Many of these devices can be managed with on-premise tools that allow users to perform device configuration, back up, firmware upgrades and manage cybersecurity controls—ensuring a greater level of security than cloud environments.

MITIGATING RISKS AND CAPITALIZING ON OPPORTUNITIES

As in past years, the security industry will have its hands full mitigating the risks of cyberattacks, navigating regulations on privacy, information collection and storage, and meeting customer demands for tools that can help them be more proactive in protecting their people, property, and electronic data. But with each challenge there comes new opportunity to devise new technologies and solutions to create a smarter, safer ecosystem that can better meet customers’ security and business needs.

This article originally appeared in the November / December 2020 issue of Security Today.

Featured

  • Bringing New Goods to Market

    The 2024 version of GSX brought with it a race to outrun incoming hurricane Helene. With it’s eye on Orlando, it seems to have shifted and those security professionals still in Orlando now have a fighting chance to get out town. Read Now

    • Industry Events
    • GSX
  • Live from GSX 2024: Day 3 Recap

    And GSX 2024 in Orlando, is officially in the books! I’d like to extend a hearty congratulations and a sincere thank-you to our partners in this year’s Live From program—NAPCO, Eagle Eye Networks, Hirsch, and LVT. Even though the show’s over, keep an eye on our GSX 2024 Live landing page for continued news and developments related to this year’s vast array of exhibitors and products. And if you’d like to learn more about our Live From program, please drop us a line—we’d love to work with you in Las Vegas at ISC West 2025. Read Now

    • Industry Events
    • GSX
  • Live from GSX 2024: Day 2 Recap

    Day 2 was another winner at GSX 2024 in Orlando. Aisles and booths were packed with attendees looking at some of the new and latest security technology. Remember to follow the GSX Live page from Security Today, as well as SecurToday on X and Security Today on LinkedIn to find out more about what’s happening on the show floor during tomorrow’s final day. Here’s what was happening with all four of our partners during the event on Tuesday. Read Now

    • Industry Events
    • GSX
  • How Much Carbon is Your Footprint Leaving?

    A more sustainable future is not only shared responsibility, it is increasingly critical. Securitas, is inviting clients and industry partners to make a difference in an ever-evolving world that faces diverse sustainability challenges. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3