SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

What was the big news at ISC West 2019?

23 Apr 2019

What was the big news at ISC West 2019?
23 Apr 2019

Editor Introduction

ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?


Card image cap
Cameron Javdani AtlasIED

In the busiest ISC West in recent memory, what stood out most was the industry’s positive trend toward diversity and inclusivity. In organising this year’s show, I believe Reed and the Security Industry Association took important strides forward in scheduling education sessions, panel events, and guest speakers to highlight how the industry can be more successful by including different thought processes than those traditionally found in security. Hearing Juliette Kayyem speak at the Women in Security breakfast on Friday offered a comprehensive view of how end-users look to minimise risk and establish response procedures that make the most of new security technologies.

Card image cap
Joe Byron Shooter Detection Systems (SDS)

At this year’s ISC West we noticed the rise in data privacy and cybersecurity concerns take center stage. Many end-users are now looking for devices that can yield results outside of simple security measures, overflowing into the operations and business efficiency market. These IoT devices that perform advanced functions are more interconnected than ever before. From intelligent video solutions for retail insights, to thermal IoT solutions aiding in predictive maintenance for critical infrastructure, interconnectivity is a common theme. While there is no doubt about the benefits they provide, many are not considering the vulnerabilities they bring. Unfortunately, many tend to underestimate the importance of reliability in a physical security solution and often end up paying for it. As more integrators and end-users begin to familiarise themselves with these devices, they can no longer ignore the obvious cybersecurity flaws. These days nothing is reliable without the right end-to-end cyber-protection.

Card image cap
Jessica Burton Seagate Technology

A key theme at ISC West 2019 was leveraging artificial intelligence to improve business insights and operations. Facial recognition, object recognition and people-counting were some of the analytics showcased on the show floor. Smart City applications were a hot topic as well. At the Seagate booth, we highlighted this application with our Smart City replica and race car game. Attendees could race cars throughout the city and watch as cameras identified the moving objects in real time. The live-action display drew in substantial crowds and sparked great conversations about use cases in smart traffic management. The value of smart surveillance platforms in cities, powered by edge computing devices with specialise hard drives, is that they deliver information instantly so that decision makers can take immediate action to improve livelihoods. Demand for this kind of data is on the rise so solutions for Smart Cities will be a focus throughout 2019.

Card image cap
David Budzinski Johnson Controls, Inc.

As always, ISC West 2019 was well-attended, though the show floor felt even more abuzz than previous years. A main focus at the conference was around security technologies that are helping to create smarter, safer environments by leveraging artificial intelligence (AI), machine learning (ML) and analytics. In fact, for the first time in Johnson Controls booth, we showcased platforms from our Digital Solutions business that utilise all three of these abilities to help increase efficiencies and deliver new business value for customers. For instance, our False Alarm Reduction Service was one solution on display that uses AI and ML capabilities to analyse and identify alarm patterns to deliver actionable insights to reduce false alarms up to 72 percent as well as the associated costs. This software is one example of how more advanced technologies are helping to mitigate age-old security issues that have cost billions of dollars over the years.

Card image cap
Eddie Reynolds Iluminar Inc.

The big news we noticed at ISC West 2019 was the fact that the United States market is not quite sold on the use of Artificial Intelligence and other advanced analytics software. At this year’s show, we learned that many end users, and even integrators, feel uneasy about the widespread adoption of AI due to concerns about privacy and the collection of personally identifiable information. However, when adhering to proper regulations like GDPR, I see video solutions with analytics as powerful tools that deliver important information for crime prevention or anti-terror measures. Whether it’s a facial detection camera verifying the identity of a traveller at an airport or a number plate recognition camera tracking a stolen vehicle with a wanted person, video solutions with analytics are a force multiplier. Moving forward, education around best practices for deploying video with artificial intelligence and deep learning technologies will be needed.

Card image cap
Fredrik Wallberg FLIR

One of the trends we observed at ISC West was how security companies are emphasising total solutions more so than individual products. Whether by displaying new technology integrations with partners in their booths or by introducing end-to-end solutions, security suppliers are focused on providing comprehensive platforms. At the FLIR booth, we showcased our Smart Cities solutions portfolio, which includes our new FLIR TruWITNESS wearable sensor as well as our thermal handhelds, intelligent traffic systems and drones. Another point of interest at ISC West was the increased number of thermal offerings. As FLIR was the first to pioneer the technology in the security industry, we’re glad to see continual demand for thermal and that the imaging market is healthy. Big news for the FLIR team: Our Saros DH-390 Dome Camera – which features thermal, optical imagers and other technologies – won the SIA New Product Showcase Award in the outdoor perimeter protection category.

Card image cap
Fawzia Atcha Imron Corporation

One trend we noticed throughout this year's ISC West was the proliferation of cloud-based solutions and mobile identities. Smart phones are with us constantly, and end-users are looking for advanced mobile options for their security systems. We’ve noticed that the greater adoption of cloud technologies is driving this new opportunity for mobile applications. Whether it be for video surveillance systems, alarms, or access control the use of mobile-enabled technology was heavily represented at this year’s show. For end users this means enhanced flexibility and convenience for their solutions, allowing them to stay up to date even when they are away from the physical devices. Checking surveillance video feeds, locking and unlocking doors, and verifying visitor identify on a mobile device are important features. Mobile identities are also gaining in popularity with the rise of ‘mobile-only’ access-control systems, showcasing the benefits of integrating multiple applications into a single, user-friendly mobile experience.


Editor Summary

As our Expert Panel Roundtable points out, much of the news at ISC West is a continuation – and in some instances, acceleration – of recent trends in the industry. The emphasis on cybersecurity continues, as does the shift in approach from products to solutions. Technologies such as mobile and cloud systems continue to make a mark. And as we all look to leverage new capabilities of artificial intelligence and deep learning, our efforts are tempered by concerns about privacy and collection of personally identifiable information. There is even a welcomed trend toward greater inclusivity and diversity in the security marketplace.

  • Related links
  • ISC West 2019
  • Related categories
  • CCTV software
  • Access control software
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Round table discussions
About this page

Security experts from AtlasIED, Shooter Detection Systems (SDS), Seagate Technology, Johnson Controls, Inc., Iluminar Inc., , discuss "What was the big news at ISC West 2019?"

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec