SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Artificial intelligence (AI)
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

What will be important technology developments in the second half of 2022?

15 Jul 2022

What will be important technology developments in the second half of 2022?
Larry Anderson
Larry Anderson
15 Jul 2022

Editor Introduction

Six months can go by in the blink of an eye. In 2022, it almost seems as if it has. Here we are already at mid-year after what has been an eventful six months for the security marketplace. There is still a lot ahead in 2022 for the industry, and our Expert Panel Roundtable has been considering what the coming months might hold in terms of technology change. We asked this week’s panelists: What will likely be the most important technology development in the security marketplace in the second half of 2022?


Card image cap
Manish Mehta Ontic Technologies

In an increasingly connected world, physical security is a major concern for American companies as a heightened threat environment prevails, spurred by geopolitical, economic and extremism. Businesses are facing more risks than ever before with security professionals receiving new information daily from Open Source Intelligence, social media, the Dark Web, weather feeds, technology systems, real-time news, HR systems, public event notifications and more. It’s crucial for businesses to have technology that enables them to detect, investigate and assess risks before they occur. In the second half of 2022, the most important development in the security marketplace will be a focus on actionability. Being able to keep track of changing situations in real-time and make quick decisions is the difference between simply knowing a threat is there and proactively acting on it. It’ll be imperative for organisations to mitigate threats proactively to preserve business continuity and build long-term organisational resilience.

Card image cap
Ken Francis Actuate

This is a timely question because 2022 is a turning point in the video surveillance industry. Users will be able to search for specific video the same way they search the web, replacing the need to scrub through hours of video in a storage closet. Cloud-based artificial intelligence is powering this new technology, and we expect to see significant investment across the industry. Similar to the evolution of the internet, the future standard for video surveillance will be a Google-like search platform that is easy to use and accessible to all.

Card image cap
John Davies TDSi

Generally, new security technology takes a while to mature and capture the attention of the market, so current trends (such as the use of Bluetooth security credentials via a smartphone) are likely to be at the forefront of demand during the second half of the year as well. Looking further ahead, IoT devices are having a big influence on security systems and how they are used, so expect to see more use of smart sensors that feed data back to the integrated security and IT network. As we have seen in the security industry already, greater integration puts more pressure on providers to use standardised platforms, so we are likely to see lots of conversations between security providers about shared protocols and networks. The other consideration with security and other IoT systems sharing a network will be the strain this puts on network bandwidth and resources.

Card image cap
Ryan Gregory Axis Communications

It’s tough to say any one technology will receive the notoriety of ‘most important,’ but there will certainly be key themes in the marketplace that are poised to play a large role in shaping the future of security technology. One will be the integration of Artificial Intelligence (AI) and analytics into every aspect of video surveillance and security technology to optimise and enhance all aspects of performance. Advancements in AI video analytics will further enable new use cases – beyond traditional security use cases – as the technology evolves across industries. Alongside this, it will also be important for the marketplace to focus on integrated solutions, such as access control and audio that communicates with surveillance technologies, to further provide comprehensive and robust security offerings that span business operation imperatives.

Card image cap
Michael Green Athena Security, Inc.

In my world it’s all about entryway security. Through that lens I see major developments in AI, drone uses, auto-locking technologies and immediate deployment of countermeasures. There’s also a movement to decrease the number of entryways along with an increased adoption of access control that includes prevention of prohibited items such as guns with a weapon screening program and known prohibited people. Technology that will safeguard your entryway will continue to be key and will require increased training and retraining along with major efforts to reduce workplace violence.

Card image cap
Peterson Chen Anviz Global Inc.

Touchless biometric technology will take big steps, especially facial recognition. The pandemic has been changing a lot worldwide, including the physical security industry, especially the booming demand for contactless biometric systems that prevent virus spread, lower infection risk, and eliminate unauthenticated access. Face recognition will be among the most widely implemented and accepted biometric solutions. According to a report of Mordor Intelligence, the global biometrics market was valued at USD 12.97 billion in 2022 and is projected to be worth USD 23.85 billion by 2026, registering a CAGR ([Compound Annual Growth Rate]) of 16.17%. According to Global Industry Analysts, the global facial recognition market will be valued at USD 15 billion, registering a CAGR of 18.2%. Face recognition brings users a safer environment, more efficiency, and less risk of physical contact with the biometric data protected. It will be in the pioneer position of biometric industry development in the second half of 2022.

Card image cap
Chris Garner Salient Systems

For the second half of 2022, I see three areas of development, each driven by the need to provide customers with an easier way to cover more of their environment, without requiring more operators, and continue to support a remote workforce. The first is that analytics availability and reliability have increased over the years and are now integrating with platforms such as video management systems (VMS). Customers are looking to use best-of-breed analytics in their deployments to help monitor situations around operational efficiency and life safety without having to replace their VMS platform. The second is the drive to provide reliable and secure remote access and management for systems. The cloud is one way to achieve remote access and management, but it does not have to be the only way. The third area of development is with system density. Camera resolutions continue to increase, and customers want to use the highest frame rate of cameras to get the most out of their video systems.

Card image cap
Simon Randall Pimloc Limited

In the second half of the year, it is likely that more firms will require services that enable the use of video analytics to extract operational value from visual data, while using AI-powered tools to protect privacy. Both public and private organisations are turning more towards video analytics as they can be useful in many different contexts. They can help in saving time for CCTV camera operators, help efficiency in monitoring places for crime, and can be integrated into other systems – i.e., counting footfall at different locations – as well as use for smart parking, automatic licence plate recognition, and facial recognition. 2022 will also bring further growth in consumers investing in personal video surveillance for their homes. With the pandemic having forced many to stay at home, home security has become more of a priority. Ring, which produces doorbell cameras, is increasingly popular: They are now the largest corporate-owned civilian-installed surveillance network in the U.S.


Editor Summary

Will the remainder of 2022 be a turning point for video surveillance? Will the next six months see the integration of AI and analytics into every aspect of video and security? Will we see big steps for touchless biometrics? These are just a few of the technologies our Expert Panel Roundtable mentions as likely to be dominant forces in the second half of the year. The observations of our panel suggest a need for continuing vigilance as security professionals strive to stay abreast of the latest fast-moving developments in technology.

  • Related links
  • Anviz CCTV software
  • Anviz Access control software
  • Axis Communications CCTV software
  • Axis Communications Access control software
  • Eagle Eye Networks CCTV software
  • Salient Systems CCTV software
  • TDSi Access control software
  • TDSi CCTV cameras
  • TDSi CCTV software
  • Anviz Access control readers
  • Axis Communications Access control readers
  • TDSi Access control readers
  • Infrared CCTV cameras
  • ANPR Software CCTV software
  • Bar Code Access control readers
  • Access Control Software Access control software
  • Biometric Access control readers
  • PC-based Access control readers
  • Card Access control software
  • Standalone Access control readers
  • Detection Software CCTV software
  • Mifare Access control software
  • Card Printer Access control software
  • Contact Access control readers
  • Wireless CCTV cameras
  • Proximity Access control software
  • IP Surveillance Software CCTV software
  • Magnetic Stripe Access control readers
  • Pinhole CCTV cameras
  • Central Monitoring Option Access control software
  • Management Software CCTV software
  • Centrally managed access solution Access control software
  • Monitoring Software CCTV software
  • Proximity Access control readers
  • Combined online/offline solution Access control software
  • RFID Access control readers
  • Surveillance Software CCTV software
  • Door Monitoring Option Access control software
  • Wiegand Access control readers
  • Face Recognition Software Access control software
  • High Level Interface Access control software
  • Keypad Commands/Intrusion Zones Access control software
  • Management Systems Upgrade Access control software
  • NetVue Interface to Nice Systems Access control software
  • Redundant System Software Access control software
  • Remote software for telecode door entry phone system Access control software
  • Server software for MSDE Access control software
  • Version Upgrade Access control software
  • Related categories
  • CCTV cameras
  • CCTV software
  • Access control software
  • Access control readers
Related white papers
Elevating security through multi-sensing solutions and large-scale AI

Elevating security through multi-sensing solutions and large-scale AI

Download
The 4 pillars of AI in managing high-stakes critical events

The 4 pillars of AI in managing high-stakes critical events

Download
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Related articles
Suprema BioStation 3 sets global sales record

Suprema BioStation 3 sets global sales record

A landmark gathering shaping the future of real estate, investment, sustainability & design

A landmark gathering shaping the future of real estate, investment, sustainability & design

Leuze AI elevates optical sensor precision

Leuze AI elevates optical sensor precision

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Artificial intelligence (AI)
  4. News
  5. Round table discussions
About this page

Discover 2022's crucial tech developments: AI-powered security, advanced analytics, 5G-driven solutions, and privacy protection, shaping industry trends.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec