SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

Security market consolidation trending for 2015; cloud, IoT and home automation set to grow further in 2016

Security market consolidation trending for 2015; cloud, IoT and home automation set to grow further in 2016
Karl Erik Traberg
Karl Erik Traberg
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Security market saw record consolidations in 2015; cloud integration gaining traction.
  • Huge growth expected in consumer video surveillance, access control, and wearable security technology.
  • Chinese vendors dominate low-end camera market; smart home investments rising.

2015 was a year of consolidations: The spring of 2015 recorded the highest acquisition rate for a six-month period in 10 years. There were single-digit market growth rates reported in video surveillance due to price erosion affecting revenues. Video solution providers are expanding into access control, and both are slowly but steadily moving into the cloud. Users want the efficiency benefits of converging access control with video verification and unified operation. There are more cloud offerings. Commoditisation is occurring from strong price competition at the lower end of the market with Asian camera manufacturers leading the way, taking market shares from premium brands.

 

Consumer growth in security industry of video surveillance, access control and wearables

The main technologies currently seeing the highest compounded annual growth are consumer video surveillance, access control as a service, and wearables. Thermal imaging, edge recording and video surveillance as a service are among the technologies with the lowest growth compared to expectations. User interfaces on all platforms/devices are becoming the norm; devices are becoming more mobile (including drones!) and wearables are increasingly being adopted. Growing consumer use is requiring legislation. Remote diagnostics are coming into play in security; video analytics are more common.

Digitalisation & virtualisation

Digitalisation for consumers (social media, tech offerings from financial companies and wireless service providers) are helping to drive IP conversion in the security industry: the advantages people have at home are desired at work, too. Public and private entities are sharing access to video and security systems as standards are beginning to emerge making this possible (open platform VMS). Video imaging is being used for more than security: VMS is becoming a business enabling technology. The transition from legacy analogue equipment to IP video solutions is marching forward due to “total package” offerings including analytics; also higher virtualisation, edge and cloud based storage. The Internet of things (IoT) and home automation are combining huge numbers of devices to our online data; major players like Apple, Google/Nest, Amazon and Samsung are investing in the smart home.

Chinese vendor dominance in the security industry

Influences from the consumer environment will drive more ease-of-use in security applications. There will be continued vendor and channel consolidations. Chinese vendor dominance will continue for low-end cameras and simple installations.

Milestone launched all-new, free eLearning for Husky and XProtect Smart Client to quickly build up expertise for users
Chinese solutions are ripe to move into open platforms for better interoperability among other security components

Body worn camera technology has been proprietary, similar to traditional CCTV: These solutions are ripe for moving into the open platform paradigm for better interoperability among other security components. Police in the U.S. are moving away from expensive, custom-only PSIM solutions to smart wall command centres with geo-spatial representations (using GPS) and interactive mapping with weather, traffic flow displayed, and beacon alerts to dispatch officers.

Milestone Systems in 2015 – new product launches and community engagement

2015 has been a tough market for many with the Chinese price pressures. However, Milestone increased our growth rate and expanded our service offerings along with the number of employees. We launched all-new, free eLearning for the Milestone Husky and XProtect Smart Client to quickly build up expertise for our users. In 2016 we will have more frequent product releases and even more Milestone community engagement, including on-site beta testing with our solution partners’ integrations. New training and certification courses will be available, too: self-paced online, webinar and face-to-face – all role- and task-based for optimal performance on the job. More distributors and alliance partners are establishing their own brand offerings via OEM relationships.

There is a whole new world of opportunities ahead for Milestone and our partners. Video management software fits into a broad range of business management applications such as enterprise resource management, operations and supply chain management and also in customer relationship management. The adoption is speeding up as vendors and system integrators learn to include both security and business solutions in the offerings. The key opportunity for the Milestone partner network participants is to shift the conversation with customers from cost to business value and to generate interest in larger investments in new technology and solutions for an enhanced business purpose.

See the full coverage of 2015/2016 Review and Forecast articles here

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Security access systems
  • Video analytics
  • Wireless security
  • Security software
  • IP Surveillance
  • IP security solutions
  • Video Management System
  • Internet of Things (IoT)
  • Home automation
  • Cloud security
  • Body worn video cameras
  • Video surveillance
  • Related links
  • Hanwha Vision CCTV software
  • Hanwha Vision CCTV cameras
  • Milestone CCTV software
  • Hanwha Vision IP cameras
  • Articles by Karl Erik Traberg
  • 2015 security trends
  • Related categories
  • CCTV cameras
  • CCTV software
  • Access control systems & kits
  • IP cameras
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Expert commentary
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec