Report: Physical Security Market Turning to Cloud and Hybrid Solutions

Genetec, a provider of unified security, public safety, operations, and business intelligence solutions, today shared the results of its 2024 State of Physical Security report. Based on insights from over 5,500 physical security leaders worldwide (including end users and channel partners), the report looks at the security strategies organizations are putting in place to effectively navigate the realities of a changing industry.

Cloud adoption is picking up speed
The adoption of cloud-based solutions for physical security has been gradually increasing over the past decade, but it is now picking up speed. According to the survey, 44% of end users reported that more than 25% of their physical security setups are now either in the cloud or use a combination of cloud and on-premises solutions. This is a significant jump from the 24% reported in last year's survey.

Cyber concerns about the cloud are diminishing
Cyber concerns about cloud-based solutions are lessening significantly. In last year's survey, end-users considered perceived cybersecurity risks to be the primary factor discouraging their organizations from adopting cloud-based security systems. However, there seems to be a shift in attitudes. This shift underscores growing confidence in the capabilities of cloud solution providers to establish robust cybersecurity measures. As a result, in the 2024 survey, respondents have relegated perceived cybersecurity risks to the sixth position among the factors deterring their organizations from adopting security systems in the cloud.

Channel expects increased demand for cloud and hybrid solutions
Feedback from channel partners also supports the idea that end-users are eagerly shifting towards cloud solutions. A substantial 74% of channel partner respondents anticipate that more of their current customers will embrace cloud connectivity for security in the coming year. Furthermore, 39% of channel partners stated that they prioritize cloud-based solutions whenever possible, and an additional 52% offer cloud-based solutions upon customer request.

IT and physical security departments are increasingly interconnected
The increasing adoption of cloud-based physical security systems has led to a rise in cybersecurity threats, data handling, and compliance requirements. As a result, IT and physical security teams are becoming increasingly interconnected as evidenced by 55% of end users indicating that the IT department has access to physical security data. As technology adoption grows and remote access from external networks becomes more common, the partnership between IT and physical security will continue to develop.

The future looks hybrid
It appears that most organizations will prefer a hybrid approach, combining both on-premises and cloud-based solutions. 60% percent of end-user respondents revealed that their organizations aim for a security deployment strategy that combines both. The transition to hybrid systems is already in progress, with 15% of end-users stating that their organizations are currently storing video surveillance data both locally and in the cloud, marking a notable increase from the 4% reported in last year's survey.

“A hybrid cloud deployment clearly emerges as the ideal path forward for many organizations, seamlessly blending local infrastructure with the power of the cloud," said Christian Morin, Vice President Product Engineering / Chief Security Officer at Genetec Inc. "With a hybrid-cloud solution, organizations can optimize their physical security installation to best fit their business. And no matter how their security needs evolve, their systems will remain agile and adaptable to continue providing them with the capabilities they require.”

Featured

  • Why Communication is Key in an Emergency

    During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery. Read Now

  • Trust But Verify

    Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks. Read Now

  • Impact on Digital Transformation

    A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries. Read Now

  • Optimizing Security and Business Performance with Clarity and Control

    In recent years, the security sector has experienced a significant influx of innovative technologies that have fundamentally transformed how organizations design, implement, and oversee their security programs. The widespread adoption of cloud-based infrastructure, edge processing, and AI or machine learning (ML) driven analytics has brought about revolutionary changes in applications such as access control, video surveillance and emerging areas like threat detection and drone identification. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3