Video Surveillance Trends to Watch

With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud.

Any surveillance application always begins with cybersecurity. However, some of the biggest cybersecurity challenges still include overcoming the mentality of “good enough” in a system installation. Too often, considerations like cybersecurity are still left as an afterthought. It’s important for everyone involved in an installation – manufacturers, integrators, consultants – to collaborate closely to understand the capabilities of all products and devices and how they work together.

An integrator may not be completely familiar with a product’s cybersecurity features and, as a result, they may not necessarily be optimizing that model’s capabilities or applying best practices for that brand. That's why it's important to work with a manufacturer that is a trusted advisor to learn what their cyber practices are.

A common gap in understanding when it comes cybersecurity occurs when there is an assumption that a product’s cybersecurity will prevent any intrusion, and no further steps need to be taken. Another important issue is insider threats. You might have the most secure firewall or the most secure cameras or devices, but a malicious virus or malware may already be in your network. Too often, people assume having a strong firewall is enough. That's why taking a holistic approach is so important -- installing antivirus and anti-malware software on desktops, establishing firewall rules between VLANs, and separating several types of devices on a network.

Getting Smarter About Artificial Intelligence

With security and surveillance devices now increasingly being tasked to do more than just “monitor and protect,” comprehensive, AI-powered intelligent technologies are becoming total business solutions. With the combination of AI and intelligent analytics, security professionals are better equipped to design and build safer and more efficient surveillance environments.

The continued evolution of new cameras combining AI with on-board audio and video analytics is resulting in highly accurate object detection and classification. In addition to fewer false alarms, customers can also receive actionable data that can drive intelligent monitoring to enhance operational efficiency and generate data-driven business insights.

The past few years have seen companies throughout the security and surveillance industry expand their use of AI, doing more than improving camera imaging performance, taking data out of legacy silos so that different systems can make use of this data.

One example is visual verification of access control alarm systems. Using AI, a rule could be written to ignore an alert if a person is not seen at a certain doorway. Or an operator verifying the alert can quickly look for people in the forensic search instead of having to manually review hours of footage. They can then search for those attributes (clothing color, etc.) to see if there have been repeated attempts.

We will see additional types of devices and a fusion of AI to bring more intelligence to surveillance cameras and systems. Cameras or audio sensors are being AI enabled to make them more accurately detect certain scenarios based on the monitored audio alone, while ignoring false positives.

Cloud benefits

With cloud-based systems, users can eliminate many up-front costs. They don't need to buy and maintain massive servers and storage space. Often, systems with high camera counts or long required retention times have high storage and maintenance costs. Hard drives have limited lifespans, servers need updates, licensing, reboots, and antivirus software. With cloud-based systems, in addition to eliminating those types of initial costs, you're also shifting from capital expenditures to operational expenses.

The cloud is flexible, elastic and scales to your needs and resources. Users can have a cloud-based video system up and running quickly. Also, with the growing demand for video retention, which is a requirement in some markets, since cloud recording is elastic, it only requires a few clicks to extend storage retention. You don't need to go on site and change out hard drives. Small businesses may also be attracted to using the cloud on an “as-a-service” basis, creating customized security network infrastructures enabling flexibility, efficiency, lower unit cost and scalability – all while being simple enough for users to manage themselves. They will embrace the ability to easily scale bandwidth up or down, or for certain time periods, for example if their business is seasonal, they can plan for busier times of the year.

Many small businesses can take a hybrid cloud approach. A hybrid approach allows you to have full on-site video recording capability combined with a full cloud user interface with all the necessary features and functionality without tying up network bandwidth. If you don't need to send all your data to the cloud all the time, then hybrid gives you the best of both worlds.

Once a cloud system is up and running, users can have full access to their system from any device from anywhere. Cloud removes the barrier of physical access or needing to be onsite only versus the flexibility of being offsite. Once the data egresses and is ingested to the cloud, it's the same ease of access from anywhere.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities