ISC West, sponsored by the Security Industry Association (SIA), is the largest converged security event of the year, constantly evolving to educate security professionals on the tools and skills needed to protect against today’s emerging cyber and physical security threats, and the anticipated ones of tomorrow.

Following SIA’s research to develop the Security Megatrends™ – an annual research project that reports on the top trends reshaping the security industry – SIA and ISC West worked together to make sure those themes would be addressed at the 2018 event, particularly as part of the SIA Education@ISC line-up. The trends range from the booming growth of the IoT to more efficient ways to manage Big Data.

A top priority is making education one of the most valuable, robust parts of ISC West,” said Don Erickson, CEO of SIA. “We identified these top 10 trends – what we call the Security Megatrends™ – and reviewed how they would pose significant impacts on 2018’s converged security landscape. Cross-industry devices, like those used in smart buildings (i.e., LED lighting and physical security systems) will drive spending in 2018

“We then used these insights to lay the groundwork for the 85+ educational sessions we’re offering at the ISC West show, making it possible for attendees to leave feeling confident and equipped to tackle the emerging security threats, as well as the business challenges and opportunities that inevitably come their way.”

What are the 2018 Security Megatrends?

Trend 1: booming growth of the IoT

Both enterprise and consumer-connected solutions are major focuses at ISC West and will be explored in-depth at the Connected Security Expo, and the Connected Home areas on the Show Floor.

According to Gartner, businesses are predicted to represent more than half of overall IoT spending in 2017 (57 percent). Going into 2018, cross-industry devices, like those used in smart buildings (i.e., LED lighting and physical security systems) will drive this spending trend.

The IoT is creating both challenges and capabilities for the physical security and risk management sectors. When implemented and properly secured, the IoT will provide predictive analytics, the ability to deliver a more personalised experience to users, and complete situational awareness from top to bottom.

Trend 2: cyber meets physical security

Integrators will only be able to deliver if they continue to evolve towards total convergence - otherwise it is empty promises As the cyber and physical security sectors continue to merge, manufacturers are dealing with increasingly hostile and complex environments. To take security to the next level, manufacturers and systems integrators need to offer more advanced cyber-safeguards to protect network-connected devices.

Security integrators are moving in the right direction and are beginning to offer cybersecurity as a service as they continue to grow their businesses from hardware-centric to solution-oriented models.

And customers rightfully expect service providers to be their trusted advisors – however, integrators will only be able to deliver if they continue to evolve towards total convergence.

Trend 3: accessing and analysing smart and Big Data

According to IDC, less than 0.5% of all data is ever analysed and used, which is alarming considering all the buried insights that exist but aren’t being leveraged.

security practitioners need to have a plan for the data they are collecting, as well as a realistic risk assessment of the exposure of this data
"Big data is life changing in how we operate buildings and determining our future role. Big data changes the way in which we service customers."

According to Lisa Roy, Vice President, Integration and Commercial Operations, Building Solutions-North America of Johnson Controls, “Big data is life changing in how we operate buildings and determining our future role. It’s all about how to pull that information out that benefits the customer. Big data changes the way in which we service customers.”

Augmented reality (AR), artificial intelligence (AI) and video analytics will continue to be important for acquiring insights, but physical security experts are already anticipating how Big Data will impact the industry beyond these technologies.

With so much information available, security practitioners need to have a plan for the data they are collecting, as well as a realistic risk assessment of the exposure of this data to their companies and clients. 

The Unmanned Security & Safety Expo @ ISC West will further explore risk management for unmanned aerial and ground vehicles

Trend 4: evolution of risk management

Traditionally, the organisational process in security has been a siloed, single-lane approach. However, the most successful management models include all corporate stakeholders and possible sources of information to circumvent loss and reduce the potential for insider risk threats.

We’re heading in the right direction as risk management and planning has broadened to be more holistic, and collaboration between all stakeholders, beyond just within technology/security roles, is becoming increasingly prominent. However, this needs to happen even more, to become the norm, not an exception.

As we look to innovative technologies that bring about new risks and considerations, such as drones, this coordinated approach becomes even more imperative. The Unmanned Security & Safety Expo @ ISC West will further explore risk management for unmanned aerial and ground vehicles (UAVs, UGVs).

Trend 5: transformation of the channel

There’s an ongoing, heightened transformation of the security installer and integrator business into everything as a service, with new models embracing interactive products, and the DIY and self-installation markets. Unusual suspects from the IT sector have entered the security business, and traditional security monitoring companies are now offering DIY or self-install systems.There’s an ongoing, heightened transformation of the security installer and integrator business into everything as a service

This transformation of the channel requires some changes. The traditional security provider must continue to change and focus on value-added services that heighten the customer experience, while delivering convenience and intelligence expected by their customers.

From the end user’s perspective, security executives are looking for security providers who can collaborate fully to address risks and assist not only with security and safety but contribute to business continuity and promote a tangible return on investment.

Trend 6: shakeup of the status quo: entrance of entrepreneurial buyers and outsiders

Strategic acquirers are merging with traditional security manufacturers and installation companies to focus on data analytics, convergence and IoT. According to Jay Darfler, SVP, Emerging Markets and Innovation of ADT Security Services, “Disruption and innovation can come at you from a hundred different angles. You have to divide what your strengths and your core innovation to focus on.

The industry’s biggest players are getting even bigger as new technologies and applications enter new markets, like residential, and even spill over into small-to-medium business markets. However, there are challenges, and the long-time recurring monthly revenue (RMR) centric model is changing from hardware and project-based to income from service, maintenance and remote monitoring from cloud and interactive services.

Mobile credentials are able to provide an integrated and higher value system for the user
Mobile technology is becoming synonymous with access identity and credentialing

And while service creates value, monetary values inevitably change. As this shift continues, norms that have been in place for decades are changing, too, including increased subscriber acquisition costs (SAC), decreased RMR margins, increased technology obsolescence, shorter product development cycles, no contracts, and interoperability.

Trend 7: mobile everything

Mobile technology is becoming synonymous with access identity and credentialing. Beyond the obvious consumer value, smartphones will be transformative within access control, enabling both cost reductions and end-user benefits.

By itself, mobile credentials in access control is a strong value proposition, but mobile credentials are also able to provide an integrated and higher value system for the user while it promotes new services and revenue streams.

Trend 8: control through Cloud: driving greater efficiencies and promoting managed services

The global Cloud-computing service market is expanding exponentially. Growing connectivity, convergence and integration with IoT, mobile technology, and a wide range of applications and services is driving the shift towards cloud-hosting – including public, private and hybrid.

The cloud is an enabling technology. It allows the user greater access to managing their premises and opens the door to new service options for solutions providers to offer. It gives them the opportunity to offer managed services and subsequent RMR that is highly attainable, providing inherent opportunities to add new revenue streams with the cloud’s “always on, always accessible” model.

The cloud is an enabling technology. It allows the user greater access to managing their premises and opens the door to new service options

With this, systems integrators can become total solutions providers that are reliably available 24/7, leading to greater confidence and customer satisfaction.

Trend 9: integrating with social media

In law enforcement and emergency communications/operations, social media has become critical in identifying active shooters, criminal activities or other potential threats or disasters in real-time.

As the IoT and other disciplines continue to converge, social media will be part of the transformation of critical information resources. The next step for social media is deeper integration with mass notification and emergency communications—with the ability to disseminate specification information to individuals who may need to be evacuated or take shelter.

Trend 10: emerging connected services: consumers want convenience at their fingertips

Sensors embedded in a wide range of smart home devices and appliances will deliver near real-time analytics on changes within home environments. The cloud is a key component of this, providing seamless access and visibility. Visibility is especially important for service and maintenance of remote sites, reducing expensive site visits and labour costs – resulting in a better customer experience.Security providers who can adapt with this changing landscape will prove invaluable to the commercial market

Security providers who can adapt with this changing landscape will prove invaluable to the commercial market, lowering their business costs in areas like energy management.

We’re laser-focused on providing attendees with all-inclusive education at ISC West, which is why we’re thrilled to have SIA as our trusted partner,” said Will Wise, Group Vice President of ISC Security Events. “These top 10 trends really hit on what’s to come at the show. These themes impact nearly every type of attendee in some way, from government/enterprise security decision-makers and end-users, to integrators, installers and dealers.

“This year’s show is designed to be the most educational and information-packed yet, and we’re looking forward to seeing the peer-to-peer mindshare that takes place.”

ISC West 2018 will take place April 11-13 at the Sands Expo in Las Vegas, NV. SIA Education@ISC will kick off a day prior to the exhibits, on April 10.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

In case you missed it

COVID-19 worries boost prospects of touchless biometric systems
COVID-19 worries boost prospects of touchless biometric systems

Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favour are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. Touchless biometric systems in demand The trend has translated into a sharp decline in purchase of touch modality and a sharp increase in the demand for touchless systems, says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Biometrics solutions are being affected unequally, depending on whether they involve touch sensing, he says. Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads “Users do not want to touch anything anymore,” says Zarrabi. “From our company’s experience, we see it as a huge catalyst for touchless suppliers. We have projects being accelerated for touchless demand and have closed a number of large contracts very fast. I’m sure it’s true for anyone who is supplying touchless solutions.” Biometric systems are also seeing the addition of thermal sensors to measure body temperature in addition to the other sensors driving the system. Fingerscans and hybrid face systems TBS offers 2D and 3D systems, including both fingerscans and hybrid face/iris systems to provide touchless identification at access control points. Contactless and hygienic, the 2D Eye system is a hybrid system that combines the convenience of facial technology with the higher security of iris recognition. The system recognises the face and then detects the iris from the face image and zeros in to scan the iris. The user experiences the system as any other face recognition system. The facial aspect quickens the process, and the iris scan heightens accuracy. TBS also offers the 2D Eye Thermo system that combines face, iris and temperature measurement using a thermal sensor module. TBS's 2D Eye Thermo system combines face, iris and temperature measurement using a thermal sensor module Another TBS system is a 3D Touchless Fingerscan system that provides accuracy and tolerance, anti-spoofing, and is resilient to water, oil, dust and dirt. The 2D+ Multispectral for fingerprints combines 2D sensing with “multispectral” subsurface identification, which is resilient to contaminants and can read fingerprints that are oily, wet, dry or damaged – or even through a latex glove. In addition, the 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue. The system fills the market gap for consent-based true on-the-fly systems, says Zarrabi. The system captures properties of the hand and has applications in the COVID environment, he says. The higher accuracy and security ratings are suitable for critical infrastructure applications, and there is no contact; the system is fully hygienic. Integration with access control systems Integration of TBS biometrics with a variety of third-party access control systems is easy. A “middleware” subsystem is connected to the network. Readers are connected to the subsystem and also to the corporate access control system. An interface with the TBS subsystem coordinates with the access control system. For example, a thermal camera used as part of the biometric reader can override the green light of the access control system if a high temperature (suggesting COVID-19 infection, for example) is detected. The enrollment process is convenient and flexible and can occur at an enrollment station or at an administration desk. Remote enrollment can also be accomplished using images from a CCTV camera. All templates are encrypted. Remotely enrolled employees can have access to any location they need within minutes. The 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue Although there are other touchless technologies available, they cannot effectively replace biometrics, says Zarrabi. For example, a centrally managed system that uses a Bluetooth signal from a smart phone could provide convenience, is “touchless,” and could suffice for some sites. However, the system only confirms the presence and “identity” of a smart phone – not the person who should be carrying it. “There has been a lot of curiosity about touchless, but this change is strong, and there is fear of a possible second wave of COVID-19 or a return in two or three years,” says Zarrabi. “We really are seeing customers seriously shifting to touchless.”

How to maximise your body temperature detection systems
How to maximise your body temperature detection systems

There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system.  The first thing you should ask is “does my firm have a certified thermographer?”. If not, the firm are at risk of getting a low quality system that is being resold to make quick cash. Businesses that are doing this do not know how to operate it properly. Asking the right questions Secondly, you should ask whether the system is NDAA compliant. NDAA compliance means that your temperature detection equipment is protected by U.S. law. Does your system have a HSRP device (blackbody)? HSRP (Heat Source Reference Point) is a device that will allow the camera to detect the correct temperature a distance. Even if the room temperature does change throughout the day, treat it as a reference point for the camera to know the temperature at that distance. Can your system scan mutliple people at once? Can your system scan mutliple people at once? This is a bad question but often asked since most systems will say yes. For ease, everyone wants to scan many people at once, but the best practice according to FDA and CDC guidelines is to run one person at a time for best accuracy. Why? The HSRP (blackbody) device tells the camera what the correct temperature is at a given distance away from the camera. Every foot you are away from the HSRP device will be off by 0.1 degrees roughly. If you are in a room full of people, let's say 6, in view of the camera, every person that is not next to the HSRP device (5) will be given an inaccurate reading. Hence why it is so important to run the system correctly with just one person at a time. You will also need to follow the 6 feet rule. If you take that into consideration, one at a time at 6 feet apart, the device should tell you how you need to run the system. Sensitivity of thermal imaging Is your system’s sensor accurate enough? The FDA recommends an error of ±0.5°C or better. When looking for a system, make sure it is better than what they recommend. I would recommend ±0.3°C or better. Do not purchase a system over ±-.5°C degrees as you are doing yourself and your customers or employees an injustice.  Another thing to look at is how many pixels it can determine the temperature from. Some cameras can only tell the temperature of 6 points on the screen, whilst others can take a temperature reading from each pixel. Take a 384x288 camera, for example, which would be over 110,000 points of temperature taking on a single image.      Thermal cameras are very sensitive, so there are a lot of do’s and don’ts. For example, the system cannot see through glasses or hats. On the below image you can see a person with the visual camera on the right, whilst on the left side is through a thermal camera.  Both are pointing at the same area. It is clear the person on the left side is “invisible” to the thermal imaging camera. Demonstrating the sensitivity of thermal imaging If you are a company who wants to detect the temperature of customers or employees though the front door, window or a car window, the answer would be no. You need a clear line of sight without any interference to scan for temperatures. Other things you need to look out for is wind and distance away from the HSRP (blackbody) device. Air and distance away from the HSRP device will make the system less and less accurate the more space between the device. Air and distance away from the HSRP device will make the system less and less accurate Thermal imaging and COVID-19 If you have a clear line of sight, is there anything I need to know? The answer is yes. Reflective materials such as metal can interfere with your temperature readings. Reflective materials are easily picked up from the thermal side so pointing at a medal, glass or anything reflective can cause inaccuracies within the system. In the age of COVID-19, temperature detection systems are more important than ever. Organisations must get a system in place to help scan for high temperatures in order to reduce the spread of the virus.

What are the security challenges of the oil and gas market?
What are the security challenges of the oil and gas market?

Protecting the oil and gas market is key to a thriving economy. The list of security challenges for oil and gas requires the best technology solutions our industry has to offer, from physical barriers to video systems to cybersecurity. We asked this week’s Expert Panel Roundtable: what are the security challenges of the oil and gas market?