Video Surveillance Trends to Watch

With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud.

Any surveillance application always begins with cybersecurity. However, some of the biggest cybersecurity challenges still include overcoming the mentality of “good enough” in a system installation. Too often, considerations like cybersecurity are still left as an afterthought. It’s important for everyone involved in an installation – manufacturers, integrators, consultants – to collaborate closely to understand the capabilities of all products and devices and how they work together.

An integrator may not be completely familiar with a product’s cybersecurity features and, as a result, they may not necessarily be optimizing that model’s capabilities or applying best practices for that brand. That's why it's important to work with a manufacturer that is a trusted advisor to learn what their cyber practices are.

A common gap in understanding when it comes cybersecurity occurs when there is an assumption that a product’s cybersecurity will prevent any intrusion, and no further steps need to be taken. Another important issue is insider threats. You might have the most secure firewall or the most secure cameras or devices, but a malicious virus or malware may already be in your network. Too often, people assume having a strong firewall is enough. That's why taking a holistic approach is so important -- installing antivirus and anti-malware software on desktops, establishing firewall rules between VLANs, and separating several types of devices on a network.

Getting Smarter About Artificial Intelligence

With security and surveillance devices now increasingly being tasked to do more than just “monitor and protect,” comprehensive, AI-powered intelligent technologies are becoming total business solutions. With the combination of AI and intelligent analytics, security professionals are better equipped to design and build safer and more efficient surveillance environments.

The continued evolution of new cameras combining AI with on-board audio and video analytics is resulting in highly accurate object detection and classification. In addition to fewer false alarms, customers can also receive actionable data that can drive intelligent monitoring to enhance operational efficiency and generate data-driven business insights.

The past few years have seen companies throughout the security and surveillance industry expand their use of AI, doing more than improving camera imaging performance, taking data out of legacy silos so that different systems can make use of this data.

One example is visual verification of access control alarm systems. Using AI, a rule could be written to ignore an alert if a person is not seen at a certain doorway. Or an operator verifying the alert can quickly look for people in the forensic search instead of having to manually review hours of footage. They can then search for those attributes (clothing color, etc.) to see if there have been repeated attempts.

We will see additional types of devices and a fusion of AI to bring more intelligence to surveillance cameras and systems. Cameras or audio sensors are being AI enabled to make them more accurately detect certain scenarios based on the monitored audio alone, while ignoring false positives.

Cloud benefits

With cloud-based systems, users can eliminate many up-front costs. They don't need to buy and maintain massive servers and storage space. Often, systems with high camera counts or long required retention times have high storage and maintenance costs. Hard drives have limited lifespans, servers need updates, licensing, reboots, and antivirus software. With cloud-based systems, in addition to eliminating those types of initial costs, you're also shifting from capital expenditures to operational expenses.

The cloud is flexible, elastic and scales to your needs and resources. Users can have a cloud-based video system up and running quickly. Also, with the growing demand for video retention, which is a requirement in some markets, since cloud recording is elastic, it only requires a few clicks to extend storage retention. You don't need to go on site and change out hard drives. Small businesses may also be attracted to using the cloud on an “as-a-service” basis, creating customized security network infrastructures enabling flexibility, efficiency, lower unit cost and scalability – all while being simple enough for users to manage themselves. They will embrace the ability to easily scale bandwidth up or down, or for certain time periods, for example if their business is seasonal, they can plan for busier times of the year.

Many small businesses can take a hybrid cloud approach. A hybrid approach allows you to have full on-site video recording capability combined with a full cloud user interface with all the necessary features and functionality without tying up network bandwidth. If you don't need to send all your data to the cloud all the time, then hybrid gives you the best of both worlds.

Once a cloud system is up and running, users can have full access to their system from any device from anywhere. Cloud removes the barrier of physical access or needing to be onsite only versus the flexibility of being offsite. Once the data egresses and is ingested to the cloud, it's the same ease of access from anywhere.

Featured

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities