SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

Which technologies will disrupt the security industry in the second half of 2020?

23 Jun 2020

Which technologies will disrupt the security industry in the second half of 2020?
Larry Anderson
Larry Anderson
23 Jun 2020

Editor Introduction

The first half of 2020 has been full of surprises, to say the least, and many of them directly impacted the physical security market. The COVID-19 pandemic created endless new challenges, and the physical security market has done our part to meet those challenges by adapting technology solutions such as thermal cameras and access control systems. In the second half of 2020, we can all hope for a return to normalcy, even if it is a “new normal.” In any case, technology will continue to play a big role. We asked this week’s Expert Panel Roundtable: Which technologies have the greatest potential to disrupt the security industry in the second half of 2020?


Card image cap
Christian Morin Genetec, Inc.

The global pandemic has led to a rapid digital transformation of our industry as people are having to quickly embrace technology to ensure business continuity, and this trend will only accelerate during the rest of 2020. Only a few years ago, the “inevitable shift” to all things cloud was met with guarded optimism. But today, when remote working requires solutions that employees can access from anywhere, the shift is really happening. The flexibility of these easily accessible software solutions demonstrates their value immediately. We are also seeing customers making clever use of their existing technology to perform new functions to solve some of the challenges posed by the pandemic. Working hand in hand with developers, they are using, re-purposing and enhancing their security technology to monitor occupancy levels, keep track of people’s potential exposure to contagion or contaminants, controlling access to PPE equipment, monitoring patients at a distance, and more.

Card image cap
Kevin Waterhouse VCA Technology

Following recent unexpected events, this year the spotlight will not necessarily be on disruptive technologies, but on those that can add the greatest value. In my view, one of these is artificial intelligence, as I believe it’s starting to warrant the hype. A crucial barrier to AI adoption was the fact that no one knew what it was capable of, and used the term too broadly – using AI, machine learning and deep learning features interchangeably, confusing matters. But, in times when costs need to be contained and automation is vital, AI is the perfect solution when combined with video analytics. AI can be trained to alert security staff of suspicious activity, learning the difference between real threats and innocuous events, eliminating false alarms and turning a reactive, reviewing activity into a dynamic, proactive one; with personnel able to add value elsewhere – maximising efficiencies across teams.

Card image cap
John Davies TDSi

The second half of 2020 will undoubtedly be about security systems that help to deal with the issues and the aftermath of the COVID-19 pandemic. It is inevitable that some of the most prominent technology will be temperature-sensing systems (either using CCTV cameras and video management software or access control reader points) to track and trace the movement of potentially infectious individuals. Additionally, with the greater awareness of social distancing requirements and a strong desire to avoid further peaks in the infection rates, technology centred on counting persons within a facility will become increasingly in demand. In addition to video analytics for people counting, there will be sensing technology that accurately assesses the movement of people in and out of a specified area. As governments seek to limit the numbers of people in confined spaces, organisations will need both to monitor this, and also to prove numbers for auditing.

Card image cap
Danny Lim Seagate Technology

Customers increasingly are deploying surveillance solutions not only for security purposes, but also for business intelligence. AI-enabled, IoT-connected security ecosystems have become the new standard for smart applications for large enterprises. These data hungry applications have resulted in increased data stream speeds, real-time data analysis and extended archival times. These demanding environments have fundamentally disrupted the way customers approach storing data and have led to a greater need for scalable storage systems built for tomorrow. In the second half of 2020, we’ll continue to see greater adoption of robust storage solutions that increase performance, reduce latency and ensure high data availability. This includes storage solutions with an edge-to-cloud architecture, where AI-enabled network video recorders (NVRs) sit on the edge to deliver immediate insights and enterprise storage systems in the backend that hyperscale to petabytes of data for long-term video retention and deep learning.

Card image cap
Greg Schreiber Boon Edam

Without a doubt, COVID 19 has been the biggest disruptor to the security industry this year. Effective immediately, end-users want to move away from contact-based security and access control systems to a touchless, friction-free process to minimise the chances of spreading or catching the virus. Fortunately, there’s proximity and biometric technology available today that can verify a credential or identity and activate a security entrance to unlock or open its barriers – completely touchless. But, there’s something to watch out for – many buildings today have manual swinging doors on the exterior and throughout the building corridors, and facility managers will see a quick fix here: to install low-energy, automatic door operators to create “touchless” swinging entrances. Unfortunately, automatic operators were designed to move slowly for ADA-accessible entry. The door, in some cases, can remain open a total of 8 to 10 seconds, creating a greater risk of tailgating.

Card image cap
Alex Johnson Verint Systems

The cloud has the greatest potential to disrupt the security industry in the second half of 2020 due to the ways that end users are looking to deploy the solution. Though “disruptions” can be negative, we simply mean that solution providers will need to revisit their business models to provide a more specialised approach to system design. For example, organisations that are waiting for advancements in bandwidth and storage costs are still using the cloud, but on a limited scope. Rather than a complete on-premise or cloud solution, many organisations choose to use a hybrid of sorts, which allows them to use the cloud for what it does well: processing heavy functions like video analytics. To adapt to this change, companies will need to re-focus and see where they can leverage other technologies in conjunction with the cloud to provide proactive, as opposed to reactive, security measures.

Card image cap
Adam Wynne Azena

The second half of 2020 will see edge intelligence addressing the “new normal,” as we begin to reopen facilities and lift quarantine restrictions. The ability to run AI-enabled analytics directly on embedded devices to solve problems at the edge will enable the world to get back to work in a safe and secure manner. For example, innovative companies are quickly developing face mask detection, social distancing and other analytic apps for surveillance cameras, designed to monitor the changing social landscape so the economy can get back to work again.

Card image cap
Per Björkdahl ONVIF

As the situation stands right now, the security industry is leaning heavily towards customised applications dealing specifically with pandemic-related solutions. We are, of course, seeing an increase in different initiatives around body temperature scanners and other similar technologies. As such, video analytics are accelerating to promote and meet expectations of these, and other smart technologies designed to provide automated efficient assistance in various scenarios. This is leading to an increased investment in analytics, as people search for solutions and companies look to adapt to the new normal, reopen economies and get their infrastructure up and running again. The other side to this is, given the slow-moving reopening procedures, the tech innovation side of the industry could be impacted, as time goes on and the pandemic overshadows all else.

Card image cap
Daniel Gundlach FLIR Systems

As businesses implement new protocols in response to COVID-19, there has been unprecedented demand for thermal cameras for elevated skin temperature screening. FLIR alone sold $100 million worth of orders for thermal cameras for elevated skin temperature in the first quarter of 2020, and we have seen significant deployment of our thermal cameras at critical facilities in the second quarter such as at General Motors plants and the Pentagon Visitor Center. Thermal is the trending technology in the security industry right now. As more providers enter the thermal market, it will be imperative for customers to distinguish proven cameras from other options. Key camera differentiators for elevated skin temperature screening include those that are both registered with the U.S. Food and Drug Administration and are ONVIF-compliant. We anticipate greater adoption of thermal cameras both at the perimeter for intrusion detection and inside facilities for condition monitoring.


Editor Summary

There's nothing like a global pandemic to disrupt an industry such as physical security. However, amid all the disruption in the first half of 2020, there was plenty of opportunity for our industry's technologies to find new uses in a changing world. Changing needs beget changing technologies, although the current trends toward cloud computing, touchless access control systems, and AI-driven video analytics already seem particularly well suited – almost responsive – to the new set of challenges. Driven by technology, the physical security market has managed to survive the first half of 2020. In the second half of the year, we can thrive.

  • Related links
  • FLIR Systems CCTV software
  • Genetec Access control software
  • Genetec CCTV software
  • TDSi Access control software
  • TDSi CCTV cameras
  • TDSi CCTV software
  • TDSi Access control systems & kits
  • Verint CCTV software
  • TDSi Access control readers
  • Related categories
  • Access control systems & kits
  • Audio, video or keypad entry
  • Access control software
  • CCTV cameras
  • CCTV software
  • Access control readers
  • Video motion detectors
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Round table discussions
About this page

Discover top 2020 security technologies disrupting the industry, including AI, cloud-based services, drones, robotics, and access control innovations.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec