SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

How are edge devices transforming security?

27 Jun 2022

How are edge devices transforming security?
Larry Anderson
Larry Anderson
27 Jun 2022

Editor Introduction

The Internet of Things (IoT) is driving innovation in the security marketplace, just as it is in almost every other market. IoT devices, also known as ‘edge devices’, provide sensing, processing ability, software, and other technologies to connect and exchange data.

The most common edge devices in the world of IP security are video cameras, which are becoming more intelligent and capable of processing the data they collect. We asked this week’s Expert Panel Roundtable: How are edge devices transforming the security marketplace?


Card image cap
John Davies TDSi

Edge devices are getting smarter as the Internet of Things (IoT) really takes hold. The world is moving to a collection of sensors at the edge that gather data to be processed in Big Data analysis engines, which then derive further benefits from security systems, beyond just augmenting safety and security. Along with safety and protection, we are moving to a world where security data is regularly being used to reduce carbon footprints and improve the utility of the Built Environment. The wealth of information collected by security systems is perfect for this, giving a detailed view of how people and the facilities they use interact, enabling you to optimise their use and the resources you have. Organisations of all types are looking to get real value-add from their security systems purchases and expect to gain better insights into the running of their facilities, through the data they collect.

Card image cap
Peter Chen Anviz Global Inc.

Edge or not is one of the hottest topics in the security market recently. With the continuous upgrading of the central processing unit (CPU), an edge device will be able to accurately identify and classify hundreds of persons, vehicles, and objects in seconds. It can push real-time events, reports, etc. and achieve complete access control and attendance management for thousands of people. The interconnection of powerful edge devices will also accelerate the security ecosystem‘s development. Customers will centrally manage access control, CCTV, alarms, intercoms, broadcasts, and other security edge devices on one unified management platform. All these advantages will help the customer reduce overall investment. Obviously, for large projects and complex applications, edge devices still face many challenges, such as we have to rely on the existence of back-end management servers. But for the SMB and Residential Security markets, the edge will no longer be a topic, but a trend.

Card image cap
Hiroshi (Huey) Sekiguchi i-PRO

As we increase image processing power at the edge, network cameras can process advanced analytics locally and only send the lightweight results as metadata to the backend server. Without edge-based analytics processing, compressed video streams (H.264/265) must first be decompressed at the server, before server-side analytics can be run. This requires an investment in server architecture and an ability to predict peak demand. Adding more cameras or more analytics requires significantly more server resources until it becomes cost-prohibitive and eventually gates further expansion for many users. Edge-based analytics processing not only saves significant server infrastructure costs, but it also enables a system to scale effortlessly, either on-premise or in the cloud, as an organisation’s needs evolve. As AI-based edge devices become ubiquitous, the ability to proactively alert operators to threats, monitor operational compliance, and supply valuable business intelligence transforms the role of these devices and presents new opportunities for security.

Card image cap
Laurent Villeneuve Genetec, Inc.

Advances in edge computing have made possible many new applications of security technology. Security devices such as network cameras have become increasingly capable of processing and analysing video at the edge. We are also seeing a new breed of sensors able to analyse sounds, such as gunshots or glass breaks. Also, new industrial IoT devices (temperature, water sensors, etc.) are now connected to physical security systems to go beyond traditional security. With more processing power available on the edge, organisations can easily move towards cloud and hybrid solutions, while running an ecosystem of IoT devices, without burdening their infrastructure. With a non-rigid approach to processing power and a combination of server, cloud, and edge capabilities, organisations can make use of distributed intelligence and operations to increase their security and business efficiency. However, be aware that edge devices can also introduce cyber vulnerabilities, and a resilient cyber security framework has never been more important.

Card image cap
Will Kelso Interface Systems LLC

Powerful edge devices are transforming the security marketplace, by making it possible to harvest valuable data in real time. As more cameras are deployed, it’s clear that they can’t all be watched with the same level of focus by human eyes. The latest AI-enabled cameras provide an error-free, proactive, front-line response to threats that help security teams do their jobs more efficiently. By utilising more edge-based processing, we also reduce the need for expensive backend servers. Edge-based analytics can analyse patterns and behaviours that extend beyond security to inform operations and sales teams. This actionable business intelligence might include insights on store layout efficiency and dwell times around product areas. These results then validate assumptions and reveal areas that are not performing as designed. In this way, security cameras have evolved into smart IoT sensors that can share data across departments and contribute directly to bottom line growth.

Card image cap
Dan Berg Salient Systems

Edge devices, with respect to video surveillance, usually take the form of cameras with built-in storage for the video data and are managed in a cloud platform. There are some companies making inroads with this technology, but in the way it is currently sold, it is proprietary and expensive. They may claim that they can eliminate the cost of servers, but I believe that is offset by the high prices of the cameras themselves, the licensing costs, and the fact that the video data in effect no longer belongs to the end-user. If you don’t pay your license fee, your system stops working and you cannot access the existing video and, with some vendors, your cameras become bricks.


Editor Summary

Video cameras are the most familiar ‘edge devices’ to security professionals, but there are other components and sensors that are part of the ever-expanding Internet of Things. What edge devices have in common is the capability to broaden the power of systems tasked with providing security and management data to the enterprise.

  • Related links
  • Anviz Access control systems & kits
  • Anviz CCTV software
  • Genetec CCTV software
  • TDSi CCTV software
  • TDSi Intruder detectors
  • TDSi Access control systems & kits
  • Anviz IP cameras
  • Genetec IP cameras
  • i-PRO IP cameras
  • TDSi IP cameras
  • Anviz IP Dome cameras
  • TDSi IP Dome cameras
  • Indoor/Outdoor IP Dome cameras
  • Standalone / Networked Access control systems & kits
  • Proximity Access control systems & kits
  • Network IP cameras
  • IP Surveillance Software CCTV software
  • TCP / IP / GPRS Intruder alarm communicators
  • Monitoring Software CCTV software
  • Related categories
  • CCTV software
  • Access control systems & kits
  • Intruder detectors
  • Intruder alarm communicators
  • IP cameras
  • IP Dome cameras
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Round table discussions
About this page

Explore revolutionary edge devices transforming security, bolstering scalability, and ensuring data privacy in an increasingly connected world.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec