SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

What are the security challenges of the enterprise market?

17 Jan 2018

What are the security challenges of the enterprise market?
17 Jan 2018

Editor Introduction

Enterprise customers provide a large, and very lucrative, business opportunity for the physical security market. These customers include big global companies with plenty of revenue to spend and employees and facilities to protect. As a group, enterprise customers also tend to be a demanding lot, requiring systems that are large, scalable, that can operate across a wide geographic area, and that provide top-notch system performance. Enterprise customers set the standards of performance for the entire market, and they challenge manufacturers to up their game. We asked this week’s Expert Panel Roundtable to reflect on the industry’s biggest customers: What are the security challenges of the enterprise market?


Card image cap
Jumbi Edulbehram NVIDIA

I’ll address five major security challenges of the enterprise market. The first one is cybersecurity, both in terms of vulnerabilities in general and in particular, susceptibilities of physical security infrastructure. Second, enterprise customers often have multiple locations in different geographies, so seamless integration of security operations could be challenging. Third, designing and deploying an enterprise-class security infrastructure needs significant IT expertise, which could be difficult if physical security personnel don’t have the necessary expertise and/or the IT department doesn’t have resources to allocate to physical security. Fourth, more so than in other markets, enterprise customers often have many stakeholders that need to come together to execute a successful security strategy, which is often a significant challenge, especially in organisations where such interdepartmental collaboration is limited. And last but certainly not least, obtaining the necessary budgets for enterprise security infrastructure and personnel is always a challenge.

Card image cap
Mitchell Kane Vanderbilt Industries

The main security challenge that faces the enterprise market is the fact that individual locations, divisions and branches of large and/or global organisations each possess diverse needs when it comes to streamlining operations and overall safety. Enterprises demand elevated integration capabilities across multiple security, event management and human resources systems, and in the access control market, this requires manufacturers to provide systems that are easy to administer and manage to allow roles to be updated quickly and efficiently. Due to the elevation of cybersecurity threats, enterprises also need to ensure best practices for employees at all sites in keeping data safe, as one small mishap can lead to larger complications. Business continuity and risk management procedures must be maintained across the enterprise for day-to-day users of security technology and employees/visitors to ensure comprehensive preparation for a security incident or emergency.

Card image cap
Tom Echols Security 101

Security leaders at enterprise organisations are responsible for protecting critical resources including intellectual property, personnel and assets from natural or manmade emergencies through video, access control and other solutions. Organisations are consistently affected by mergers and acquisitions, regulatory compliance mandates and system lifecycle transitions. Additionally, emerging cybersecurity and active shooter threats have pinpointed vulnerabilities that highlight potential operational flaws such as traveling employees and vendor site visits. Often the biggest hurdle for enterprise end-users is understanding that physical security standards on a national or global scale is more than just technology and product, it’s a programme and a process. To achieve a holistic view of disparate systems on a vast scale, enterprises should utilise an experienced integrator to develop a layered approach with a transition and scalability plan that expertly addresses change management and business continuity.

Card image cap
Jody Ross AMAG Technology, Inc.

The challenges of the enterprise market haven’t really changed over the past several years. It is important for manufacturers to know and fully understand their customers. That is the only true way to be able to deliver a solution that works for the customer. It also provides valuable feedback that manufacturers can use to help improve and enhance their solutions.

Card image cap
John Davies TDSi

Although the security industry has already embraced the idea that cybersecurity and physical security are merging into one, it is taking some quarters of the enterprise sector longer to fully grasp the concept. Security is crucially important for enterprise businesses, and it’s vital that the sector is fully briefed by us security professionals. A recent statistic from Morgan Stanley suggests that just a 10 percent cut in enterprise security breaches could save these businesses an impressive $17 billion a year. Commercial espionage is big business for criminal elements, and the threat needs to be crushed. Interactive buildings and security systems can make the threat even more acute if they are not properly planned and operated with prevention in mind. The Internet of Things is bringing this to the fore, so it is essential that enterprise organisations look very closely at the risks and what they need to do.

Card image cap
Tom Galvin Evolon

Enterprises are increasingly challenged by the growing number of Internet of Things devices deployed across their locations, including IP surveillance cameras that are connected to the corporate network. There are three key issues with this. First, streaming surveillance back to centralised servers for recording can negatively impact the network and force tradeoffs in video quality. Second, hackers can use exposed cameras or other IoT devices to launch cyberattacks. Third is ensuring that IoT devices are operating 24x7x365. In 2018, enterprises should seek solutions that can optimise the network with smart architectures. To mitigate cybersecurity threats, they must automate cybersecurity firewall and “hardening” of devices in a scalable way. Lastly, to ensure reliability and uptime of IoT devices as well as the video surveillance system, enterprises require the ability to monitor and view data analytics. These are all addressable but need proactive attention by enterprise security and IT leaders.

Card image cap
Todd Piett Rave Mobile Safety

As office environments continue to change, location has quickly become a large obstacle for the enterprise market. For instance, the distance between employees, management and safety officials can delay essential communication during emergencies. Whether offices are spread out across different buildings, states or include remote workers, it’s critical to have immediate access to the location information of each employee in the event of an emergency. As remote workers and multi-office location expansions continue to increase in the enterprise market, executives must also increase their investment in both lone worker and onsite employee safety. Having multiple office locations can often hinder essential information from reaching employees simultaneously during an emergency, resulting in longer response times and expanding business downtime. Employee communication obstacles such as these can be mitigated through the use of modern technology. Tools like two-way communication devices help to manage ongoing incidents in real-time and increase the employee engagement.

Card image cap
Melissa Stenger

The security challenges of the enterprise market are vast and a separate set of challenges than typical customers in the market.  With large enterprises come more complexity and requirements for a security system; whether that be in the number of users, geographically disperse locations, or the management of high security products. In addition to the complexity and requirements, large enterprises are at a higher risk for breaches, hackers and other cyber and physical crimes. The combination of the complexity and higher risk require large systems that are fully integrated and can utilise the best and most reliable technology. As the market and technologies have expanded, the ability to manage and meet the needs of the enterprise market have become simpler and more cost effective. As the cloud, mobile and open technologies begin to take the security market to the next level, they have allowed the enterprise market to pick the best solutions and on a more reasonable budget.

Card image cap
Colin Leatherbarrow Grosvenor Technology Ltd

The lack of industry capability in relation to cybersecurity and GDPR are undoubtedly two of the biggest challenges. The enterprise market is transitioning from “on-premise” solutions to cloud SaaS, and security manufacturers continually innovate with increasingly sophisticated solutions designed to leverage these new technologies. This rapidly-evolving IT landscape goes to the heart of the challenge: expertise in the design of physical security solutions is no longer enough, becoming experts in cybersecurity, GDPR and cloud SaaS are now fundamental requirements, but it’s essentially a completely new language. The industry is beginning to respond but it needs to do much more before we see the norm of security professionals fluent in both physical and information security. Training and recruitment working in partnership with industry associations and standards bodies will undoubtedly play a major role, I hope ultimately driving to the codification of these skills.


Editor Summary

The enterprise market presents a long list of challenges to manufacturers and integrators in the physical security market, including cybersecurity, seamless integration across multiple locations and divisions, protection of critical assets, and a need for the most complex and effective systems. While meeting the needs of the enterprise market is an ongoing challenge, it also affords a lucrative opportunity for the security industry to deploy the best it has to offer.

  • Related links
  • ACT Access control systems & kits
  • ISONAS Access control systems & kits
  • TDSi Access control systems & kits
  • Oncam IP cameras
  • TDSi IP cameras
  • Related categories
  • Access control systems & kits
  • IP cameras
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Round table discussions
About this page

Explore top security challenges faced by enterprises, industry expert panel's advice, and innovative solutions to protect valuable assets.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec