SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Artificial intelligence (AI)
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Have security protocols and practices kept up with how people work?

28 May 2022

Have security protocols and practices kept up with how people work?
Larry Anderson
Larry Anderson
28 May 2022

Editor Introduction

It’s safe to say there has been more change in the workplace in the last two years than ever before. Driven by the pandemic, technology has both allowed greater flexibility for employees and enabled continuing prosperity for many companies that otherwise would have had to cease operation. But have security protocols and practices done enough to enable companies to keep pace with the changes? We asked this week’s Expert Panel Roundtable: Have security protocols and practices kept up with the changing ways people work?


Card image cap
Mathieu Chevalier Genetec, Inc.

As companies embrace different return-to-office practices based on more flexible hours, use of space, and digital transformation, they are looking at physical security systems differently. Organisations are increasingly using the data gathered by their physical security systems for more than controlling access and monitoring their spaces. To meet the changing needs of the hybrid workplace, they are also tapping into the data gathered by their security systems to come up with new standard operating procedures, optimise space, improve business efficiency, and comply with public health requirements. This fundamental change in the way people work also means that the traditional IT perimeter no longer exists. Organisations need to keep up with these changes, strengthen their security protocols and bolster their cyber-posture, or risk undermining the safety of their intellectual property, sensitive data, and personal information.

Card image cap
Hiroshi (Huey) Sekiguchi i-PRO

From a manufacturing and technology perspective, we think of protocols as a way to communicate information. It is hard for protocols to keep up with the rapid pace of technology innovation. In the video security market, we have ONVIF as an example of an open industry forum that promotes standardised interfaces between vendors. But we can’t expect ONVIF to communicate all the advanced metadata coming from an AI camera overnight. As such, manufacturers like i-PRO rely on APIs or SDKs to develop plugins for interoperability between partners. This enables us to get important AI metadata into a VMS such as Genetec Omnicast, which allows operators to search or set alarm triggers for specific characteristics. Of course, the data itself means nothing until we transform it into useful information. As protocols and practices evolve, it’s important to pick the right partners to guarantee interoperability as communication protocols and standards emerge.

Card image cap
John Davies TDSi

Security is always evolving, but not necessarily in a linear way. For example, touchless secure access control features have been embedded in security for some time but were not necessarily prominent for many operators until the pandemic struck. Suddenly we were all hyper-aware of the need to control infection vectors, and touchless systems went from a convenient feature to an essential one. The use of mobile device credentials for access control is a good example of another technology that has been “in the right place at the right time.” Whilst it has garnered considerable interest as a post-pandemic touchless technology, the primary driver was to boost security and flexibility whilst presenting security users with a solution that fits their expectations in using their mobile devices for multiple applications. Undoubtedly the pandemic has also accelerated the market’s interest in exploring and adopting the latest solution options. 

Card image cap
Osvaldo San Martin Johnson Controls, Inc.

Looking back on the two years since the COVID-19 pandemic began, it’s clear our day-to-day lives have transformed drastically as we adapted to remote/hybrid work environments. These changes have urged the implementation of stronger protocols for in-person working. A few ways this is happening are by businesses and organisations utilising touchless access control that delivers streamlined and healthy occupant experiences and updating existing video systems with AI-powered contact tracing and mask detection solutions. Additionally, security technology and practices are being updated with advancements that include AI-driven ransomware detection, cloud-based cybersecurity, two-factor authentication steps, and maintaining good cyber hygiene. 2021 was a year filled with cyberattacks, such as Logj4, Kaseya, and REvil, and security companies are doing everything they can to prevent this from happening in 2022. Today, more protocols are being put into place to help recognise threats and inform on how to cope with attacks should they happen. Hackers might be getting smarter but so are security practices. 

Card image cap
Will O'Donnell Vanderbilt Industries

As there has been a significant transition to remote work over the last two years, security practices have rapidly developed and adapted to combat threats and protect organisations while maintaining a level of convenience for individuals. Today’s innovation efforts like cloud-based access control, SaaS, biometrics, mobile credentials, and similar technologies create more secure ways to authenticate people and grant access ultra-convenient. With this being said, it’s still crucial to remember that each organisation requires a deployment that is specific to them and their access rights, which means that every security system needs flexibility, adaptability, and the ability to scale with a customer’s ongoing security requirements and demands. There are open and unified platforms readily available on the market today that help users configure their systems to match their unique security requirements. These modern solutions offer built-in tools and open architecture to quickly adjust to the changing environment.


Editor Summary

The workplace has undergone a drastic transformation in the last two years. For that matter, so has the security industry. The security industry has unveiled a wealth of well-timed technologies that have played a major role in helping companies adapt to recent changes, both those necessary during the pandemic and those that will continue long after the crisis is behind us. 

  • Related links
  • ACT Access control software
  • ACT Audio, video or keypad entry
  • Genetec CCTV software
  • Genetec Access control software
  • TDSi CCTV software
  • TDSi Access control software
  • TDSi Mechanical digital locks
  • ACT Access control readers
  • ACT Electronic locking devices
  • Johnson Controls Limited Access control readers
  • TDSi Access control readers
  • TDSi Electronic locking devices
  • ACT Access control cards/ tags/ fobs
  • Genetec Network video recorders (NVRs)
  • TDSi Network video recorders (NVRs)
  • TDSi Access control cards/ tags/ fobs
  • Related categories
  • CCTV software
  • Audio, video or keypad entry
  • Mechanical digital locks
  • Access control software
  • Access control readers
  • Electronic locking devices
  • Network video recorders (NVRs)
  • Access control cards/ tags/ fobs
  • Video signal devices & accessories
Related white papers
Elevating security through multi-sensing solutions and large-scale AI

Elevating security through multi-sensing solutions and large-scale AI

Download
The 4 pillars of AI in managing high-stakes critical events

The 4 pillars of AI in managing high-stakes critical events

Download
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Related articles
Suprema BioStation 3 sets global sales record

Suprema BioStation 3 sets global sales record

A landmark gathering shaping the future of real estate, investment, sustainability & design

A landmark gathering shaping the future of real estate, investment, sustainability & design

Leuze AI elevates optical sensor precision

Leuze AI elevates optical sensor precision

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Artificial intelligence (AI)
  4. News
  5. Round table discussions
About this page

Explore security protocols, practices, and people, crucial for seamless workplace integration and enhanced corporate safety. Unlock insights now!

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec