SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Hikvision iDS-TCV907-BIR 9 MP ANPR All-Rounder Traffic Camera

    Hikvision iDS-TCV907-BIR 9 MP ANPR All-Rounder Traffic Camera

    Dahua Panoramic PTZ WizMind Network Camera

    Dahua Panoramic PTZ WizMind Network Camera

    Professional security business chooses Incedo™ Business to manage their own access control

    Professional security business chooses Incedo™ Business to manage their own access control

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Foxstream joins Hikvision’s HEOP program with embedded FoxIntruder application for thermal cameras
    • Milestone achieves positive results with a net revenue of DKK 1 billion in 2020
    • Security Industry Association to host Part 1 of the SIA GovSummit 2021 virtual event on April 28, 2021
    • 3xLOGIC announces dealer webinar to highlight the release of its latest technology solution, VIGIL CLOUD
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Security bytes
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2020
    • Year in Review 2019
    Featured
    • How has Brexit affected the security industry?
    • Hybrid working and the threat of desk data
    • Video intercoms for a smarter, safer workspace
    • How technology can elevate guest services and their security
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    IDEMIA installs biometric access control solution with MorphoWave Compact devices and Digicon dFlow speedgates at Paris HQ

    IDEMIA installs biometric access control solution with MorphoWave Compact devices and Digicon dFlow speedgates at Paris HQ

    Dahua Technology installs HD CCTV cameras with smart analytics using AI to secure iconic Battle of Britain Bunker

    Dahua Technology installs HD CCTV cameras with smart analytics using AI to secure iconic Battle of Britain Bunker

    Climax Technology launches GX-DT35B Smart Care Medical Alarm to keep seniors safe

    Climax Technology launches GX-DT35B Smart Care Medical Alarm to keep seniors safe

    Vanderbilt secures a hospital in Ireland with access control integrated solutions

    Vanderbilt secures a hospital in Ireland with access control integrated solutions

  • Virtual events
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Management Systems
    • Integrated Systems
    • Asset Management
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Capture new opportunities with computer vision and video analytics

    Capture new opportunities with computer vision and video analytics

    Shifting trends in operation centers and control rooms for 2021

    Shifting trends in operation centers and control rooms for 2021

    5 steps to building resilience in your 2021 physical security plan

    5 steps to building resilience in your 2021 physical security plan

    Critical event management: The digital transformation of safety and security

    Critical event management: The digital transformation of safety and security

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID Global
    • Nedap Security Management
    • Hanwha Techwin America
    • ASSA ABLOY
    • Security & Safety Things
    Other Resources
    • eMagazines
    • Videos
    Topics
    • Artificial intelligence (AI)
    • Counter Terror
    • Cyber security
    • Robotics
    • Thermal imaging
    • Intrusion detection
    Delivering a smart, secure and healthy workplace with cloud

    Delivering a smart, secure and healthy workplace with cloud

    Are your technology providers keeping you in the dark?

    Are your technology providers keeping you in the dark?

    Four areas to consider in frictionless access control

    Four areas to consider in frictionless access control

    The inevitability of The Cloud

    The inevitability of The Cloud

About us Advertise
  • Artificial intelligence (AI)
  • Counter Terror
  • Cyber security
  • Robotics
  • Thermal imaging
  • Intrusion detection
  • Body worn video cameras
  • ISC West
  • Video management software
  • Video analytics
  • COVID-19
  • View all
Counter Terror
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • White papers
Counter Terror

What should be the security industry’s ‘New Year’s resolution’?

5 Feb 2020

What should be the security industry’s ‘New Year’s resolution’?
Larry Anderson
Larry Anderson
5 Feb 2020
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook

Editor Introduction

The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?” 


Card image cap
Kyle Smith Razberi Technologies

I’m going to embrace the cliché and proclaim that 2020 should be the year of visual clarity and focus. Everyone should gaze across their responsibility landscape and look with impartial, clear focus at what is currently in operation with your People, Processes, and Programs. Assess your team. Are they happy, challenged, and motivated? Is everyone sitting in the right seat? Are they invested in the success of the operation? Group success is reliant on the overall “health” of the team. Review existing processes. Why are we performing them? Is it because that’s how it’s always been? Can they be improved or removed? Streamlining processes can free resources for big, new initiatives or improving existing ones. Look at your technology solutions. Are we using them to their fullest potential? Are we using the right tools? Technology moves fast, and someone may have built a better trap for your particular mouse.

Card image cap
Alan Stoddard Verint Systems

The New Year’s resolution that the security industry should implement – and actually stick to – can easily be summed up in one word: convergence. Convergence was a prominent 2019 buzzword, but adoption has been slow. Much like many new gym memberships, if you don’t follow through, you can’t be disappointed in the lack of results. For example, new ASIS Foundation research shows that only “24 percent of study respondents have converged their physical and cybersecurity functions”. This number needs to increase dramatically in 2020, as the consequences of not converging security operations will become more significant and apparent as threats evolve. The benefits of a converged strategy are numerous and obvious, including things like unified approaches that reduce cost, improve efficiency, simplify analysis and improve both the speed and effectiveness of responses. Today’s multi-layered and sophisticated security threats have a direct impact on an organization’s people, property, mission-critical processes and brand.

Card image cap
Jessica Burton Seagate Technology

Video surveillance plays a critical role in monitoring commercial facilities, traffic intersections, city squares and other areas of interest. As customers enhance their surveillance systems with artificial intelligence software for proactive crime detection and business intelligence purposes, video recording and integrity have never been so important. In 2020, as a New Year’s resolution, the security market should adopt tried-and-true strategies that preserve video and metadata as an industry standard. This includes upgrading DVRs and NVRs with surveillance-optimised drives designed for video and AI and that are specifically built to accommodate 24/7 workloads. Clients should deploy NVRs and video management systems with monitoring software where regular health checks can be conducted on surveillance solution components, including the hard drive, before issues occur. Users should also have a solid archive infrastructure in place, as video is no longer dormant in the backend, but actually used for deep learning analytics.

Card image cap
Bill Bozeman PSA Security Network

In 2020, an integrator’s New Year’s resolution should be adopting managed services. While it takes time to make the transition, it is critical that integrators begin adding recurring revenue into their business models for the future viability of their organisations. Diversifying their business, while the economy is good, gives integrators security in times when traditional business slows down, and we all know that it happens. It also allows for time to ramp up in a managed services model and fine-tune your offerings. Cybersecurity should be on the top of everyone’s minds in 2020 and beyond. No one is safe from cyber criminals as we are now seeing many small- to medium-sized businesses being targeted. Integrators must have the right plan, technology and people in place to safeguard both their organisations and their end-users against attacks and be prepared to remediate if one does happen.

Card image cap
John Davies TDSi

Entering a new decade often involves reflecting upon the past, but it’s also the perfect time to look to the future and ensure the security industry is in good shape for the next decade and beyond. A vital part of this is providing increased (and relevant) training and encouraging more apprentices into our industry. The security industry is rapidly evolving, with IoT offering almost infinite scope for integration, so security installers and integrators need the latest training and knowledge to fully understand and appreciate the technology and the repercussions/benefits for end users. Apprenticeships are also vital in bringing new lifeblood into our industry and offering a sensible and practical alternative to further/higher education (which isn’t for everyone). As well as providing the necessary technical skills, apprenticeships provide young professionals with sound business and practical experience, along with customer service skills, ensuring we have a well-rounded generation to follow us. 

Card image cap
Eric Bassier Quantum Corporation

As video surveillance storage requirements continue to grow, the security industry’s New Year’s resolution should be to adopt hyperconverged infrastructure (HCI). IHS predicts worldwide surveillance storage revenue will grow from $3.4 billion in 2019 to $4.2 billion in 2020, driven by increased demand for better security, smart city and public safety initiatives, and the desire for business intelligence. Whereas legacy systems require individual components to address compute, storage and networking, HCI for video surveillance integrates all three into a single platform, making it easier to install and manage appliances that don’t require specialised IT assistance. HCI appliances enable storage to scale so that when environments grow, the platform can grow too—a challenge amplified by increases in camera counts, camera resolutions, and video retention times. Hyper-converged infrastructure provides a solid underlying platform to deploy new capabilities, both today and tomorrow.

Card image cap
Hank Monaco Johnson Controls, Inc.

For many people in our industry, 2019 was – unfortunately – a landmark year for data breaches. As buildings become smarter through technology integrations, advanced sensors and automation systems, they simultaneously become more vulnerable to cyber-attacks. In 2020, the industry should prioritise cybersecurity challenges, establishing best practices and leveraging the latest strategies and technologies to protect data, assets and customers. Whether your company is investing in artificial intelligence software to protect cloud data, integrating your IT and OT security strategies, or hiring cybersecurity trained and certified individuals to manage your smart building, there are a variety of steps businesses can take to confront this problem and make our smart buildings cyber smart.

Card image cap
Scott Lindley Farpointe Data, Inc.

The ability to use mobile phones as access credentials will be one of the biggest trends in a market historically slow to adopt new technology. However, as companies are learning how to protect card-based systems, such as their access control solutions, along comes mobile access credentials and their companion readers which use smartphones instead of cards as the vehicle for carrying identification information. Many companies perceive that they are safer with a card and won't consider that mobile access can be a far more secure option, even though mobile has various more features to be leveraged. We need to understand that, like many recently introduced innovations, the problem isn't with the new technology; it's how the industry tries to retrofit the old system into the new. Bottom line – mobile system needs to be designed to be a mobile system, not just a hastily-produced option to the old card reader.

Card image cap
Mike Simon Connected Technologies

An important resolution is being prepared for an inevitable economic downturn. While it’s far from doom and gloom in the forecasts, the economy is cyclical, and a recession or slowdown could resurface at any time. The best way to stay profitable through good and bad times is by providing cloud-hosted managed services. Studies show that the more services you offer customers, the more likely they will stay with your company, keeping monthly income flowing. While the security industry has shown to be somewhat recession proof, those not building RMR and providing services that keep customers sticky could struggle in a slowdown if not prepared. Don’t mistake central station alarm monitoring as your only form of RMR as it is not as strong—or profitable on the books—as offering managed services. A complete bundled managed services package offered to every customer will get your business through slowdowns with revenues intact.

Card image cap
Maurice Singleton Vidsys

“Be better prepared…” to make smarter decisions in response to security threats; to respond faster by having access to better intelligence; and to reduce security risks by leveraging data analytics. Much of these attributes are tied to operational aspects of security operations centers, whether local, regional or global, and applicable to virtually all measures of an organisations standard operating procedures and best practices in response to safety and security.

Card image cap
Jeff Bransfield RS2 Technologies, LLC

Going into the new decade, the security industry should resolve to focus on consumer demands in addition to differentiators. As the years progress and technology becomes more easily accessible, the industry at large is moving toward a more open approach. This allows manufacturers to focus on the true value of their business by providing customers with unique, specialised solutions. Many companies, such as RS2, either have an open API or embrace industry-wide standards, but this is something that needs to increase across manufacturers in 2020. In order to continue toward forward progression, it is necessary for security professionals to collaborate when possible to ensure they are providing the best services and solutions to end users that cater to specific needs and are flexible enough to adapt to varying situations.

Card image cap
Greg Hamm Delta Scientific Corporation

With vehicles used as weapons becoming a popular terrorist strategy where there are a high number of targets, how can security management control traffic at public spaces such as a farmers’ market from an errant vehicle? Likewise, how about political events from car and truck bombers? Can we protect temporary proceedings, such as festivals, gatherings and sporting events, with certified crash equipment that can be simply towed away when the occasion is over? Today, that question can be answered simply – yes – with portable barriers as well as fixed post and removable bollards. Moveable self-contained barricades can be towed into position to control vehicle access within 15 minutes to answer the need of organisations that quickly require a temporary barricade system to address a specific threat or secure a facility during special events. Fixed post bollards are available to secure the sides of roadways with the same crash rating and appearance.

Card image cap
Simon Pearson Oncam

For camera manufacturers in particular, the first New Year's resolution that should be implemented is adopting a renewed focus on technology innovation. As the latest advancements, such as artificial intelligence and 5G, really take hold in 2020, manufacturers will have more tools than ever before to help end users achieve their business and security goals. Camera manufacturers should also take time in 2020 to get back to the roots of why we're in this business: the customer. The industry should pay close attention to the unique needs of the customer and determine the best way to enable them to develop their security strategies. This should include a strong focus on building relationships with trusted partners that share common goals in an effort to cohesively collaborate and create comprehensive solutions. These resilient partnerships allow manufacturers to differentiate themselves and leverage multiple brilliant minds to take innovation to the next level.

Card image cap
Yu Hao Lin Rasilient Systems, Inc.

As the market for artificial intelligence (AI) continues to grow, what must improve along with it are the quality standards for the video footage used in AI applications. The security industry should commit to raising these standards where customers solely deploy surveillance solutions that yield forensic-grade video quality—because a surveillance system is only as good as its ability to produce clear images that can be used for analytics, detection and evidentiary identification. The reality is low quality video can prove useless in court, if the subject of an image is pixelated or indistinguishable, if the image is grainy or blurred, or if there are recording gaps. It is crucial, then, that future video surveillance and storage solutions enable reliable, high-quality video recording, in order to guarantee that no frame is dropped and ensure the utmost data integrity.

Card image cap
Richard Brent Louroe Electronics

2020 should be the year the security industry makes a commitment to the national goal of reducing false alarm events by 85% as the industry strives to eliminate false positives. An Urban Institute report released just last year found more than 90% of alarms police respond to are false positives. This same study, however, found that alarm verification strategies, such as two-way audio devices, reduced false alarms by 95%, at a cost savings of hundreds of thousands of dollars to police departments each year. Audio devices have the potential to be integrated as an answer to this need, as they enhance existing security systems by sending live streaming audio or even recorded clips captured during the event to monitoring facilities to authenticate security threats. Not only are they a consistent and reliable technology; they also directly complement existing architecture. Audio adds an essential layer to data collection.

Card image cap
Nigel Waterton Arcules

I believe it’s not a New Year’s resolution for the industry but rather a New Decade resolution that should be for security professionals to become practitioners of risk-based outcomes. We must transform our mindset from simply physical security to solving risk-based problems. This can be done by truly understanding the risks to an organisation and identifying the areas that present concern rather than only looking at technology-based outcomes. By addressing the risk model for an organisation and its entire business, we can be sure that we’re using the right tool (technology) for the right job and ensure that the solutions we recommend and implement are built on the purpose of mitigating that risk. For example, we need to ask questions like “Why does a retailer lose product?” “Why do schools experience acts of violence or vandalism?” We have to understand the sociology of it first.

Card image cap
Mark Allen Identiv

The security industry should make it a priority to listen to end users and provide more flexible solutions at a reasonable price point. “As a service” subscriptions are gaining momentum because they reduce overall operating costs, and have 24/7 monitoring to ensure a client’s business, employees and assets are protected at all times. There's a definite shift toward the introduction of cloud-based access control, or access control-as-a-service (ACaaS), to respond to the growing demand for scalable, easy-to-use and more importantly, cost-effective solutions. ACaaS, in particular, allows end users to choose core features for basic access or advanced features, and also provides a way for small and large businesses alike to implement cutting edge solutions, without worrying about high, up-front capital expenditures. Choosing a New Year’s resolution that involves listening to end users and developing technology that directly responds to their wants will position security professionals as trustworthy partners.

Card image cap
Rebecca Wormleighton Zendelity

In 2020, we should make improving corporate visibility and accountability of safety and security a top priority. Without a real-time view of where you stand in regards to corporate compliance with regulations, insurance and brand standards, you expose your operation to increased risk. To do so, we need to think about safety and security across the entire enterprise. Each team must play its part to reduce corporate risk: The Facilities team to make sure the grounds are safe, the Maintenance team for on-site equipment, and the Security team to protect the people. All operating requirements and data are locked within each department in applications, logbooks and manuals. Consolidating that information is difficult and time-consuming, often outdated by the time you have it and difficult to verify. The time is right to digitally transform the physical operating requirements to improve visibility, accountability and ultimately to reduce operating risk.

Card image cap
Daniel Gundry Vistacom

In the new year, the security industry should continue to implement “as-a-service” solutions as they truly benefit every player in the market. End users that do not have the means to own and operate full-scale solutions are now able to leverage comprehensive security and monitoring services for a set monthly price. This reduces the total cost of ownership and ensures they are prepared for any vulnerability. On the other hand, businesses that have already invested in large-scale technology investments can be sure these investments are operating efficiently and securely. Whether a business is just starting to add security and AV functionality, or they are veterans to these services, the "as-a-service” model provides proactive solutions to ensure businesses are operating at optimum levels. From the dealer/integrator perspective, this business model provides recurring monthly revenue (RMR) and helps to create long-term client relationships. It’s a win/win situation for everyone involved.


Editor Summary

Our Expert Panel Roundtable’s list of New Year’s resolutions provides abundant food for thought as we look ahead and the new year unfolds. Our panel's range of resolutions touches on major product categories such as video and access control, new transformative technologies such as artificial intelligence and hyperconverged infrastructure, and ongoing challenges such as transitioning business models and changing workforce needs. Clearly, there are plenty of resolutions to consider (and only 11 more months left in 2020!)

Featured white papers
Access control & intelligent vehicle screening

Access control & intelligent vehicle screening

Download
Related articles
Physical and cyber security precautions when travelling

Physical and cyber security precautions when travelling

Mass security screening technology for large events

Mass security screening technology for large events

2018 FIFA World Cup Russia integrates safety, security and service

2018 FIFA World Cup Russia integrates safety, security and service

Follow us

Sections CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Virtual events Events White papers Videos February 2020 news RSS
Topics Artificial intelligence (AI) Counter Terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras ISC West Video management software
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
About this page

Security experts from Razberi Technologies, Verint Systems, Seagate Technology, , TDSi, Quantum Corporation, Johnson Controls, Inc., , , Vidsys, RS2 Technologies, LLC, Delta Scientific, Oncam, Rasilient Systems, Inc., Louroe Electronics, Arcules, Identiv, Zendelity, Vistacom discuss "What should be the security industry’s ‘New Year’s resolution’?"

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2021, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com

Subscribe to our Newsletter


SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download SourceSecurity.com product tech spec