ISC West, sponsored by the Security Industry Association (SIA), is the largest converged security event of the year, constantly evolving to educate security professionals on the tools and skills needed to protect against today’s emerging cyber and physical security threats, and the anticipated ones of tomorrow.

Following SIA’s research to develop the Security Megatrends™ – an annual research project that reports on the top trends reshaping the security industry – SIA and ISC West worked together to make sure those themes would be addressed at the 2018 event, particularly as part of the SIA Education@ISC line-up. The trends range from the booming growth of the IoT to more efficient ways to manage Big Data.

A top priority is making education one of the most valuable, robust parts of ISC West,” said Don Erickson, CEO of SIA. “We identified these top 10 trends – what we call the Security Megatrends™ – and reviewed how they would pose significant impacts on 2018’s converged security landscape. Cross-industry devices, like those used in smart buildings (i.e., LED lighting and physical security systems) will drive spending in 2018

“We then used these insights to lay the groundwork for the 85+ educational sessions we’re offering at the ISC West show, making it possible for attendees to leave feeling confident and equipped to tackle the emerging security threats, as well as the business challenges and opportunities that inevitably come their way.”

What are the 2018 Security Megatrends?

Trend 1: booming growth of the IoT

Both enterprise and consumer-connected solutions are major focuses at ISC West and will be explored in-depth at the Connected Security Expo, and the Connected Home areas on the Show Floor.

According to Gartner, businesses are predicted to represent more than half of overall IoT spending in 2017 (57 percent). Going into 2018, cross-industry devices, like those used in smart buildings (i.e., LED lighting and physical security systems) will drive this spending trend.

The IoT is creating both challenges and capabilities for the physical security and risk management sectors. When implemented and properly secured, the IoT will provide predictive analytics, the ability to deliver a more personalised experience to users, and complete situational awareness from top to bottom.

Trend 2: cyber meets physical security

Integrators will only be able to deliver if they continue to evolve towards total convergence - otherwise it is empty promises As the cyber and physical security sectors continue to merge, manufacturers are dealing with increasingly hostile and complex environments. To take security to the next level, manufacturers and systems integrators need to offer more advanced cyber-safeguards to protect network-connected devices.

Security integrators are moving in the right direction and are beginning to offer cybersecurity as a service as they continue to grow their businesses from hardware-centric to solution-oriented models.

And customers rightfully expect service providers to be their trusted advisors – however, integrators will only be able to deliver if they continue to evolve towards total convergence.

Trend 3: accessing and analysing smart and Big Data

According to IDC, less than 0.5% of all data is ever analysed and used, which is alarming considering all the buried insights that exist but aren’t being leveraged.

security practitioners need to have a plan for the data they are collecting, as well as a realistic risk assessment of the exposure of this data
"Big data is life changing in how we operate buildings and determining our future role. Big data changes the way in which we service customers."

According to Lisa Roy, Vice President, Integration and Commercial Operations, Building Solutions-North America of Johnson Controls, “Big data is life changing in how we operate buildings and determining our future role. It’s all about how to pull that information out that benefits the customer. Big data changes the way in which we service customers.”

Augmented reality (AR), artificial intelligence (AI) and video analytics will continue to be important for acquiring insights, but physical security experts are already anticipating how Big Data will impact the industry beyond these technologies.

With so much information available, security practitioners need to have a plan for the data they are collecting, as well as a realistic risk assessment of the exposure of this data to their companies and clients. 

The Unmanned Security & Safety Expo @ ISC West will further explore risk management for unmanned aerial and ground vehicles

Trend 4: evolution of risk management

Traditionally, the organisational process in security has been a siloed, single-lane approach. However, the most successful management models include all corporate stakeholders and possible sources of information to circumvent loss and reduce the potential for insider risk threats.

We’re heading in the right direction as risk management and planning has broadened to be more holistic, and collaboration between all stakeholders, beyond just within technology/security roles, is becoming increasingly prominent. However, this needs to happen even more, to become the norm, not an exception.

As we look to innovative technologies that bring about new risks and considerations, such as drones, this coordinated approach becomes even more imperative. The Unmanned Security & Safety Expo @ ISC West will further explore risk management for unmanned aerial and ground vehicles (UAVs, UGVs).

Trend 5: transformation of the channel

There’s an ongoing, heightened transformation of the security installer and integrator business into everything as a service, with new models embracing interactive products, and the DIY and self-installation markets. Unusual suspects from the IT sector have entered the security business, and traditional security monitoring companies are now offering DIY or self-install systems.There’s an ongoing, heightened transformation of the security installer and integrator business into everything as a service

This transformation of the channel requires some changes. The traditional security provider must continue to change and focus on value-added services that heighten the customer experience, while delivering convenience and intelligence expected by their customers.

From the end user’s perspective, security executives are looking for security providers who can collaborate fully to address risks and assist not only with security and safety but contribute to business continuity and promote a tangible return on investment.

Trend 6: shakeup of the status quo: entrance of entrepreneurial buyers and outsiders

Strategic acquirers are merging with traditional security manufacturers and installation companies to focus on data analytics, convergence and IoT. According to Jay Darfler, SVP, Emerging Markets and Innovation of ADT Security Services, “Disruption and innovation can come at you from a hundred different angles. You have to divide what your strengths and your core innovation to focus on.

The industry’s biggest players are getting even bigger as new technologies and applications enter new markets, like residential, and even spill over into small-to-medium business markets. However, there are challenges, and the long-time recurring monthly revenue (RMR) centric model is changing from hardware and project-based to income from service, maintenance and remote monitoring from cloud and interactive services.

Mobile credentials are able to provide an integrated and higher value system for the user
Mobile technology is becoming synonymous with access identity and credentialing

And while service creates value, monetary values inevitably change. As this shift continues, norms that have been in place for decades are changing, too, including increased subscriber acquisition costs (SAC), decreased RMR margins, increased technology obsolescence, shorter product development cycles, no contracts, and interoperability.

Trend 7: mobile everything

Mobile technology is becoming synonymous with access identity and credentialing. Beyond the obvious consumer value, smartphones will be transformative within access control, enabling both cost reductions and end-user benefits.

By itself, mobile credentials in access control is a strong value proposition, but mobile credentials are also able to provide an integrated and higher value system for the user while it promotes new services and revenue streams.

Trend 8: control through Cloud: driving greater efficiencies and promoting managed services

The global Cloud-computing service market is expanding exponentially. Growing connectivity, convergence and integration with IoT, mobile technology, and a wide range of applications and services is driving the shift towards cloud-hosting – including public, private and hybrid.

The cloud is an enabling technology. It allows the user greater access to managing their premises and opens the door to new service options for solutions providers to offer. It gives them the opportunity to offer managed services and subsequent RMR that is highly attainable, providing inherent opportunities to add new revenue streams with the cloud’s “always on, always accessible” model.

The cloud is an enabling technology. It allows the user greater access to managing their premises and opens the door to new service options

With this, systems integrators can become total solutions providers that are reliably available 24/7, leading to greater confidence and customer satisfaction.

Trend 9: integrating with social media

In law enforcement and emergency communications/operations, social media has become critical in identifying active shooters, criminal activities or other potential threats or disasters in real-time.

As the IoT and other disciplines continue to converge, social media will be part of the transformation of critical information resources. The next step for social media is deeper integration with mass notification and emergency communications—with the ability to disseminate specification information to individuals who may need to be evacuated or take shelter.

Trend 10: emerging connected services: consumers want convenience at their fingertips

Sensors embedded in a wide range of smart home devices and appliances will deliver near real-time analytics on changes within home environments. The cloud is a key component of this, providing seamless access and visibility. Visibility is especially important for service and maintenance of remote sites, reducing expensive site visits and labour costs – resulting in a better customer experience.Security providers who can adapt with this changing landscape will prove invaluable to the commercial market

Security providers who can adapt with this changing landscape will prove invaluable to the commercial market, lowering their business costs in areas like energy management.

We’re laser-focused on providing attendees with all-inclusive education at ISC West, which is why we’re thrilled to have SIA as our trusted partner,” said Will Wise, Group Vice President of ISC Security Events. “These top 10 trends really hit on what’s to come at the show. These themes impact nearly every type of attendee in some way, from government/enterprise security decision-makers and end-users, to integrators, installers and dealers.

“This year’s show is designed to be the most educational and information-packed yet, and we’re looking forward to seeing the peer-to-peer mindshare that takes place.”

ISC West 2018 will take place April 11-13 at the Sands Expo in Las Vegas, NV. SIA Education@ISC will kick off a day prior to the exhibits, on April 10.

Download PDF version

In case you missed it

Where is it inappropriate to install video cameras?
Where is it inappropriate to install video cameras?

Video cameras are everywhere, and hundreds more are installed every day. Our society appears to be reaching a point of perpetual surveillance. It certainly feels as if we are always being watched even though it is not yet the case. But as cameras are becoming more common than ever, we are also entering a new era of privacy concerns and sensitivities, as evidenced by GDPR and other such initiatives. We presented this quandary to this week’s Expert Panel Roundtable: Surveillance cameras can go anywhere, right? Where is it “not OK?”

Development of integrated thermal imaging technology into evolving market verticals
Development of integrated thermal imaging technology into evolving market verticals

Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology overview and early adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations at critical infrastructure sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation and advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New market opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-sensor thermal solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so.  Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.

Highlighting the importance of security integrations and alliances
Highlighting the importance of security integrations and alliances

Most technology companies have one goal in mind: to provide customers with high-quality, affordable products that can efficiently help streamline operations. Whether it's surveillance cameras, video management software, access control technology or any other type of security device, today's leading organisations invest in expertise in these product segments and strive to produce the highest quality solutions. To effectively fulfill this task, technology providers are always searching for emerging components to make their products and services even stronger. Oftentimes, a key aspect necessary to build a comprehensively robust solution involves finding like-minded partners that share a common goal and are willing to work together to create an integration that increases insight and intelligence.The interoperability between systems, devices and different types of applications should be intuitive and fast Key factors for security integrations A basic factor in a partnership is openness. For an integration to perform seamlessly for the end user, the platform through which the technologies converge must follow standard protocols, easily operate with other platforms, allow freedom and customisation, and provide adaptability. The interoperability between systems, devices and different types of applications should be intuitive and fast, enabling more time to be spent on analysing critical data and responding to security events. The puzzle of a complete security solution contains many pieces, and it's often necessary to fuse together aspects from various providers to create a best-in-breed technology offering. When organisations collaborate, the end result is a simplified solution with an increased level of value. As threats become more severe and complex, customers demand solutions that combine different security and business elements into a single interface that can address a wide variety of risks. A unified security system requires a strong collaboration between technology providers and integrated solutions Interconnected security devices Users used to only look at specific security devices - such as cameras or door alarms - as each having a strong, autonomous purpose, but now, every device plays an important interconnected role. And the progression of the Internet of Things (IoT) has made this transition even easier, as maintaining a consistent and uniform communication and interconnectivity between devices has now become the norm. The IoT has also made it so that partnerships must not only exist between manufacturers, but also within the customer's organisational structure. Although exceptionally beneficial, the IoT brings with it an increased amount of cyber vulnerabilities. As security systems are networked to increase flexibility, the door is opened to a number of potential threats that could compromise the entire enterprise. This risk highlights the need for an internal partnership and knowledge sharing between a company's physical security professionals and its IT team. IT experts should be pulled into security decisions and positioned as collaborative partners to assist with software updates, data safety protocols and solving complex network challenges, ultimately leading to a more cyber secure solution.Partnerships are beneficial to both the companies involved and their customers Knowledge sharing and learning Aside from cybersecurity, the latest prominent security attacks and events have focused primarily on soft targets, such as schools, concerts or shopping malls. This has caused many technology providers to venture into different vertical markets, and strong partnerships streamline this crossover. Innovators can extend their geographic reach and purpose through integrations with other like-minded manufacturers or integrators to add new levels of functionalities. Of course, a partnership cannot operate properly and to the best of its ability without a core component: learning. In today's evolving business and risk environment, knowledge is critical. A shared knowledge base can open up new opportunities and lead to the strengthening of security across many levels. A truly powerful, unified security system requires a strong collaboration between technology providers and integrated solutions. Partnerships are beneficial to both the companies involved and their customers, and the results created through these alliances can reach far beyond a user's expectations, offering enhanced flexibility and extensive safety options.