SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on Cybersecurity

Read now!

Cybersecurity and mobile apps to see greater demand for improved security in 2016

Cybersecurity and mobile apps to see greater demand for improved security in 2016
Stephen Carney
Stephen Carney
Contact company
Contact Tyco Security Products
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Cybersecurity remains a major trend in 2016, boosting demand for improved security measures.
  • Mobile app demand soars, shifting customer focus towards customisation and mobile operations.
  • IoT integration enhances connectivity, leveraging data for better security and operational analytics.
Related Links
  • Cyber security resilience develops as Internet of Things bolsters connectivity across technologies and devices
  • SourceSecurity.com Technology Report - Meeting the Cybersecurity Challenge of IP Video Systems

The global economy presented some challenges to Tyco Security Products in several ways throughout 2015. Anyone in oil and gas or mining experienced an impact resulting from the market dynamics within those verticals. Also, the significant strength of the US dollar versus other currencies is impacting order value for companies with a global footprint. All in all, though, business remains strong and growing.

 

Measures to strengthen cybersecurity

Looking ahead to 2016, cybersecurity is and will continue to be one of the biggest trends in the security industry and beyond. Concern over cyber-attacks via physical security networks grew in 2015, as more and more networked devices interact with security systems. Cybersecurity measures have, of course, been a major initiative for Tyco Security Products this year. The pace and intensity of addressing cybersecurity is far beyond anything else the industry has previously encountered. Because of this, Tyco Security Products has formed internal teams of engineers who focus on performing security vulnerability assessments and ongoing monitoring, managing third-party penetration testing and improving the company’s overall response for threat management.

Rising demand for mobile apps

Mobility is also a trend that has evolved significantly over the last 12 months. That may sound obvious, but the shift in customer focus has been profound. A few years ago mobile apps were a check box. You had to have it, but there wasn’t a great deal of focus on how it impacted customer operations. In the last year or so customers have accelerated past the point where apps are important to where they are now redefining their operations around mobility and demanding that it flexes to their needs. We’ve seen this even in customers who have been slow to adopt technology in the past. The customisation of the mobile experience has been an interesting trend to watch unfold.
 

Even customers who have been slow to adopt technology in the past are embracing mobile technology
The importance of apps and mobility for customers has vastly accelerated over the past 12 months


IoT for improved connectivity

Integration and unification were major drivers in the market this year as well, as end users increasingly want the business intelligence and user-friendly interface that both can provide. In 2015, we strengthened the integrations between brands, with our engineers working together closely to develop integrations and solutions that are user-friendly and seamless. As a result, we have realigned our enterprise and SMB systems so that access, video and intrusion can be managed through a single interface. The influence of the consumer market over the physical security market will get even stronger in this regard.

The Internet of Things continues to be a point of focus for most markets, and the security industry is in a great position to supply large amounts of data that can be used for more than security purposes. Our approach to IoT is built around Tyco On, our Smart services platform that lets our customers manage diverse but related systems and devices, such as security, fire, HVAC and lighting. It also aggregates data and gives our customers access to powerful analytics that can improve their operations. You can connect any sensor, device or system or software that is digital using Tyco On, which is really at the heart of IoT – taking somewhat disparate systems with a common base, and bringing them together to gain new insights.

See the full coverage of 2015/2016 Review and Forecast articles here

Stay ahead of the trends on securing physical access control systems through layered cybersecurity practices.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Physical security
  • Security management
  • Security camera systems
  • Cyber security
  • Internet of Things (IoT)
  • Data Security
  • Related links
  • Articles by Stephen Carney
  • 2015 security trends
  • Related categories
  • CCTV cameras
  • Access control systems & kits
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Expert commentary
About this page

Explore rising cybersecurity mobile apps demand, ensuring data safety and privacy, along with improved connectivity and threat reduction.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec