SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

What technology will impact security most in the rest of 2018?

25 Jul 2018

What technology will impact security most in the rest of 2018?
25 Jul 2018

Editor Introduction

Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?


Card image cap
Tim Palmquist Milestone Systems

Advances in artificial intelligence (AI) and machine learning are accelerating in 2018, and we should expect to see more practical examples coming to market in our industry throughout the rest of the year. Applications are getting smarter and more useful, and users will benefit tremendously from increased automation and capabilities that will augment human decision-making. More solutions will be coming out that deliver greater precision and efficiency in understanding environments and profiling a multitude of anomalies.

Card image cap
Daniel Gundry Vistacom

Not typically security, we'll see the definite advancement of machine learning and AI technology within security applications – especially in the centralised control room spaces that today's enterprise organisations employ to ensure safety for employees and visitors. This technology will play a special role across the visual plane, being implemented in video applications to help identify anomalies in a location, and offer officials a clear path for identification and response. Adding a layer of these intelligent solutions can help an organisation achieve greater levels of situational awareness and address threats as they arise.

Card image cap
Stuart Tucker AMAG Technology, Inc.

The hottest trend we are currently seeing in 2018 is the continued adoption of intelligent devices and automation into the security framework. We have embraced a model where our software and hardware components continually get smarter and easier for security and IT teams to manage and deploy. This reduces costs, but also increases operational efficiency. Once a panel or reader is installed, you don't have to go to it again – all updates, configurations, and monitoring are done remotely using secure protocols. For example, we have a line of readers that provide a migration path from Wiegand to OSDP over the same wiring, and without having to flash the readers. The readers intelligently see the panel is now compliant and switch to OSDP mode automatically. Smarter and more integrated systems offer trusted security with less cost and effort to manage.

Card image cap
Jim Nannini Johnson Controls, Inc.

When it comes to the impact that new technology developments in security can deliver, arguably more important than the security innovation itself is its connection to the digital building strategy that supports the defined outcomes for an organisation. Securely connected building systems can optimise safety, sustainability, efficiency, and financial performance while improving experiences and results for building occupants and owners. If new security developments can fit into a digital building initiative, their impact will be elevated far beyond simply improving various aspects of security – those technologies can lend themselves toward creating a truly safer, future-ready, and high-performing building.

Card image cap
Stuart Rawling Pelco, Inc

Looking ahead to the remainder of 2018, the main focus remains on analytics. Not only could deep learning analytics actually keep promises made 15 years ago (video content analytics creating increases in operational efficiencies), but we are looking at the convergence of technology – not just integrations. The success lies in the way the deep learning engine is “trained” in image recognition. Now cameras truly recognise a person for being a person and cannot be tricked by a waving branch in the background. If we couple this technology with intelligence in how the alerts and recognised items are processed holistically, we get a whole new way of approaching security. As our analytics get smarter, so does everything around us. No longer will complementary systems be sharing discrete sets of data to slightly improve the quality of the user experience in subtle ways. Instead, data convergence will be coupled with cloud technology.

Card image cap
Melissa Stenger

There are three core trends that are driving the physical security market forward – network-connected devices, access control as a service (ACaaS) and wireless lock sets. These developments create more functionality at the edge, cost reductions by leveraging the network infrastructure and more flexibility in how systems are managed. What these trends really point to is that consumer expectations are driving product features and development in the market. As technologies continue to become more user-friendly in the way they are available in the market, in how they are deployed and the day to day user interaction – they will have the biggest impact. The market is undergoing rapid change and the companies that are listening to their customers and can proactively address their needs will drive the industry forward and set customer expectations that others will strive to reach.

Card image cap
Steve Birkmeier Arteco Vision Systems (Arteco, Inc.)

In the second half of the year, we can expect to see advanced technologies such as AI and deep learning continue to permeate the security industry. Face and license plate recognition solutions that utilise these concepts will grow and expand, as security leaders take advantage of their ability to enable quick, effective decision-making based on the most relevant information at any given time. These systems will also play a role in the most impactful development to come in 2018: robust integrations. Enterprises will increasingly demand layered solutions that combine a number of elements, such as video, access control, license-plate recognition, data analytics and more, to ensure truly comprehensive security, achieve elevated levels of intelligence and streamline business operations.

Card image cap
Eric Widlitz Vanderbilt Industries

I would argue that the biggest development might not be in technology, but in how that technology is introduced into an organisation. We're seeing a lot of cloud-based applications right now getting attention, adding flexibility, scalability and the opportunity for end users to fully manage their security remotely, but the real development is how these are being brought to market. Manufacturers of these cloud-based products – particularly in access control – are working with integrators to create opportunities for recurring monthly revenue (RMR). This is a new frontier for many integrators that are used to single project installs, not the model that brings continued monitoring and revenue. The real shift will be in how this technology is introduced into the portfolio of integrator partners.


Editor Summary

Artificial intelligence and deep learning, more intelligent devices, better connectivity, data convergence and more dependence on cloud services are among the technology trends that will shape the second half of 2018, according to our Expert Panelists. In general, they see the continuation of a faster technology curve that will expand our capabilities while challenging our power to keep abreast of change.

  • Related links
  • ACT Access control software
  • AMAG CCTV software
  • AMAG Access control software
  • ISONAS Access control software
  • Milestone CCTV software
  • Pelco CCTV software
  • Pelco CCTV cameras
  • ACT Access control readers
  • AMAG Access control readers
  • ISONAS Access control readers
  • Johnson Controls Limited Access control readers
  • Pelco IP cameras
  • Related categories
  • CCTV cameras
  • CCTV software
  • Access control software
  • IP cameras
  • Access control readers
  • Electronic keypads
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Round table discussions
About this page

Explore top 10 technologies transforming security in 2018, including AI, drones, and GDPR, optimising safety and boosting industry growth.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec