SourceSecurity.com US Edition
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
In focus
Round Table discussion

What technology will have the greatest impact in the second half of 2017?

What technology will have the greatest impact in the second half of 2017?

Technology is changing at a break-neck pace, and the security marketplace is currently being bombarded by a wealth of new capabilities and innovations. But what will be the impact? Which of the currently-hyped new innovations will have a major impact, and which will fade over time? And even acknowledging the long-term significance of various technologies, what can we expect to be the more immediate effect? We asked this week’s Expert Panel Roundtable: What new security technology is poised to have the greatest impact in the second half of 2017?

Reinier Tuinzing
Reinier Tuinzing,
Strategic Alliance Manager - Americas, Milestone Systems
06 Jun 2017:

New technology does not hit any market in a six-month period! Any new technology takes far longer to impact a market than technologists anticipate. With that said, key technologies are entering the market and getting a lot of attention. They include artificial intelligence (AI) and deep learning (also called machine learning, cognitive learning, and neural networks), which refer to analytics of video or business data. This combined with new pixel analysis tools from NVIDIA and Intel/Movidius will deliver a new generation of video analytics. Mobile devices such as bodyworn cameras, drones, and in-vehicle cameras are also big topics. Another is metadata, which refers to the information supported with a particular device. For example, a body-worn camera would take the video, and the associated metadata is the GPS location of the camera, perhaps the heart rate and respiratory rate of the wearer. When combined, metadata provides additional situation analysis.


Todd Piett
Todd Piett,
CEO, Rave Mobile Safety
06 Jun 2017:

According to Global Workplace Analytics, 20-25 percent of the US workforce works remotely at some frequency and at least 50 percent hold a job that is compatible with partial remote-working. With dispersed workforces becoming increasingly common, we’re seeing new features of existing technology having the most impact. Emergency communication is transforming essential tools for corporations of every size to meet the demands of a dangerous and unpredictable world. The reimagining of tools like geo-targeted notifications and two-way communication extend the reach of corporations to contact and help each member of the workforce in times of distress. Whether a specific employee needs to access immediate assistance or a group in a certain geographical area needs to evacuate, these technologies connect and protect this new, dispersed workforce. 


Richard Brent
Richard Brent,
CEO, Louroe Electronics
06 Jun 2017:

Artificial intelligence (AI) will continue to be one of the most important emerging technologies in the security industry for 2017. AI, which leverages deep learning and advanced algorithms, is reshaping the way we think about security. No longer does a security patrol need to be physically at a facility to monitor all perimeters and identify intruders. Now intelligent machines can get the job done and automatically send alerts to law enforcement. Regarding audio, AI devices can even recognise breaking glass or gunshots and notify authorised personnel. Although AI machines are highly effective, they shouldn’t be viewed as a replacement for security personnel. Instead, they should be seen as a force-multiplier for staff that oversees large campuses, remote areas or multiple sites that require a vast amount of monitoring. AI devices will increasingly play a prominent role in the design and deployment of security systems.


Steve Reinharz
Steve Reinharz,
Founder and CEO, Robotic Assistance Devices, LLC.
06 Jun 2017:

The newest security industry tools that will make a significant impact are security guard robots that have advanced abilities to apply artificial intelligence to perimeter intrusion detection. Perimeter security makes up a significant portion of today's solutions. For example, robots will have a place in the utility market, where hundreds of sites require perimeter control. Additionally, the robots can be tasked with production functions such as thermal imaging. This can be deployed to detect failing power lines, thereby automating otherwise dangerous jobs. Operational efficiencies can be significantly realised as more and more of these robots are introduced in the workplace to augment human abilities, reduce liability and provide remote monitoring. With so many opportunities on the horizon in the robotics realms – such as human detection analysis using machine vision – the possibilities are really endless. Robotics is the next frontier in securing the public, private and enterprise sectors.


Mitchell Kane
Mitchell Kane,
President, Vanderbilt Industries
06 Jun 2017:

Access control seems to move very slow as far as development and adoption, but this year, we're seeing more and more of these systems be pushed toward the cloud. Cloud-based access control that combines video management is poised to see significant growth in the second half of this year, providing clients with the ability to monitor their businesses remotely, seamlessly provide status updates on panels and sensors, and allow integrators to realise recurring monthly revenues (RMR). This seems to be an across-the-industry shift as network security comes to the forefront and more clients demand remote capabilities to manage their systems.


Jana Rankin
Jana Rankin,
Co-Founder & CEO, VuTeur
06 Jun 2017:

We are beginning to see the start of the use of mobile devices in day-to-day security operations through access control, but this year, we will really see a rise in the use of mobile devices for two-way communication within a specific location, such as a school, event space, transportation hub or government building. For example, security officials can deploy technology like real-time location system (RTLS) solutions that locate any mobile phone within reach of the facility's wi-fi signal and allow direct, real-time communication with an individual in the event of an emergency situation. This technology is only just beginning to take shape across multiple industries, and as we move forward this year, it's only going to see growth within all of these vertical market sectors.


Melissa Stenger
Melissa Stenger,
Director of Customer Experience, ISONAS, Inc.
06 Jun 2017:

Cloud-hosted access control is poised to have the biggest impact in the second half of 2017. Organisations are looking to decentralise IT management and eliminate the need for overhead costs in hardware infrastructure and ongoing maintenance costs. This decentralisation is driving them to migrate their day-to-day systems to the cloud, and access control is no exception. As the end users continue to drive demand for cloud platforms, integrators are looking for ways to provide this service and enter an RMR business model to give their customers options. The industry has recognised this trend and the number of new manufacturers with cloud-based software solutions grew exponentially with many launches taking place at ISC West in April. In the second half of 2017, this trend will pick up speed and grow dramatically as customers seek the operational and cost benefits of a hosted access control solution.


Andy Palmer
Andy Palmer,
Sales Manager, Enterprise and Surveillance Group, Seagate Technology
06 Jun 2017:

Video is one of the largest generators of data, captured by millions of cameras set up in cities, commercial buildings, hospitals, motorways and public transport. Currently people only monitor a fraction of the footage that’s taken, and the rest sits on hard drives for later review. However, thanks to dramatic advances in artificial intelligence and machine learning, this is all set to change. The use of AI in cameras, servers and video recorders to monitor video instantaneously can take advantage of non-traditional data analysis to turn anonymised video into a more real-time tool, delivering valuable insights that help to enhance safety and improve lives. Take retail for example: A vast amount of data is being created, and there is a real opportunity for retailers to analyse this information to better understand their customers – from gender, to age, to their behaviours and shopping habits.


Kevin Wine
Kevin Wine,
Vice President Marketing - Video and Situation Intelligence Solutions, Verint Systems
06 Jun 2017:

Solutions focused on enhancing personal safety are growing in use and demand. Increasingly, stakeholders require enhanced insight to ensure an employee’s or executive’s personal safety. Mobile applications, those readily available on an individual’s smart phone, offer a range of benefits to employees on or off-site. These tools allow employees to immediately alert security to potential issues via their mobile device – no matter their location. Location-based data and critical updates — text messages, photos and videos — can be transmitted to the security operations centre in real-time to enhance response and increase awareness. When combined with other situational awareness, dispatch and communication tools, operators can gain a comprehensive view of employees, their locations, and their current status. If the command center receives data regarding an incident near an individual’s known location, operators can send safety alerts directly to that employee’s device. Dispatchers can also establish bi-directional communication with an employee’s smart device.


Paul Bodell
Paul Bodell,
President and CEO, VIZpin Inc.
06 Jun 2017:

The smartphone is already having the largest impact on the security market as it replaces RFID cards as the credential of choice. People are already managing their homes from their smartphones, but when they go to the office, they are often faced with 30-year-old card reader technology. Not only are card reader systems expensive and inconvenient, most require a network connection that potentially exposes the customer’s data network.  


Steve Birkmeier
Steve Birkmeier,
Vice President of Sales, Arteco Vision Systems (Arteco, Inc.)
06 Jun 2017:

Video analytics will have considerable impact on video surveillance — both for security applications and for business and marketing intelligence. There will always be a need for basic video analysis capabilities, such as trip wires and object left behind, but there is a wide array of analytics that users have yet to leverage on a large-scale basis. Among these are advanced algorithms such as heat mapping, occupancy rate, smoke and fire detection, and slip-and-fall. There is also demand for analytics that reach beyond typical security applications. For example, marketing personnel can gain increased insight into transaction history, buying trends and conversion rates. Managers can analyse the number of people that entered the store against those that actually purchased an item. Retailers can monitor queue times to minimise lines and enhance customer satisfaction. This level of intelligence gathering can be leveraged at a single location or across hundreds of stores.


Brandon Reich
Brandon Reich,
Business Leader, Pivot3, Inc.
06 Jun 2017:

The adoption of enterprise IT solutions for use in the security operations centre is growing rapidly. Users seek out new ways to optimise operations, and manage the rapidly increasing challenge of capturing and utilising security and business data. Therefore, video storage has become a critical piece of the video surveillance infrastructure that cannot be overlooked. As an industry, we’ve learned a lot from the IT sector, and now we’re bridging the gap and bringing that knowledge base back to physical security. Today’s technology leaders are looking at innovations in storage and data management, such as hyperconverged infrastructure, and these types of solutions will prove beneficial to the rigorous demands of the video surveillance storage market. Beyond storage, deep learning and parallel processing will enable the rise of faster and more accurate video analytics, and cloud and hybrid-cloud platforms will emerge as viable enterprise video storage alternatives over coming months.


Joe Oliveri
Joe Oliveri,
Vice President and General Manager, Johnson Controls, Inc.
06 Jun 2017:

Biometric technology has been discussed for a while, but we expect this is the year it will become easier to incorporate into existing security technologies. Integrated with traditional physical security solutions, biometrics will help provide more accurate identification and authorisation of personnel for improved overall asset protection and occupant safety. For example, biometrics can accompany access control systems by offering remote and contactless sensing technology to authenticate users and monitor their status in a space. Iris identification improves upon previous technologies by introducing a no-touch system with very low false-alarm rates. Examples of innovation like this will make buildings smarter and more capable of meeting customers’ unique security needs.


Ian Lowe
Ian Lowe,
Director, Product Marketing, Enterprise Physical Access Control, HID Global
21 Jul 2017:

One of the hottest growth areas through 2017 and beyond, is location services that embed trusted identities more deeply into daily activities for workplace optimisation and operational efficiency. These services combine IoT technology and Bluetooth Low Energy (BLE) with other solution elements including a cloud service, portals, Bluetooth beacons in the form of smart cards and BLE/WiFi gateways. Workplace optimisation enable organisations to better understand how their workforce utilises their buildings, while also helping to quickly find people in emergency situations, and facilitating health and safety compliance. With item management capabilities, organisations can monitor the location and movement of their assets and use geo-fences to easily deploy policy-based alerts when an item’s location impacts workforce safety. Condition monitoring services give organisations predictive and actionable analytics for optimising equipment performance, determining its health, predicting failure, and providing alerts so organisations can take action to reduce downtime.


Our Expert Panelists provide abundant food for thought as they list a wide variety of technologies they say will have an impact in the second half of 2017, including artificial intelligence (AI) and deep learning, metadata, remote communications, robotics, cloud-based access control, smart phones, and video storage. As one panelist notes, six months isn’t long – and may not be enough time for a technology to truly have an impact; but given the accelerating pace of technology adoption, who knows how different our industry’s technology landscape will be by the year’s end?


See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition