SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

ISC West 2017: How will IT and consumer electronics influence the security industry?

ISC West 2017: How will IT and consumer electronics influence the security industry?
Fredrik Nilsson
Fredrik Nilsson
Contact company
Contact Axis Communications
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • ISC West 2017 highlights: big data, cyber security, Internet of Security Things.
  • Security industry influenced by IT and consumer electronics trends, like IoT devices.
  • Advanced analytics and IoT integration set to transform security systems.
Related Links
  • Legacy of cybersecurity apathy plays into Mirai botnet attack

More than a thousand companies will be showing off their latest and greatest technologies and services at this year’s ISC West in Las Vegas. With so much to look at and experience, will you be able to pinpoint the next big thing or things that will dominate the security market in 2017? A good way to predict those upcoming trends is to look at what’s happening in some larger, adjacent technology industries, such as IT and consumer electronics. Major trends on these fronts are the most likely to influence what new products will be launched in the electronic security industry.

Proof in point is H.264, an advanced compression technology ratified in 2003 and adopted as the new standard by the consumer industry a few years later. By 2009, it became the new compression standard for the video surveillance industry as well. The same thing happened with high resolution video cameras, first introduced into the consumer market and then gradually penetrating the video surveillance market a few years later. In fact, if you look at much of the product development in the sensor industry, it has been mainly driven by the consumer markets – think smart phone cameras and dashboard and rear-view cameras for the automotive industry.

So, what influencing trends from the IT and consumer electronics industries can we expect to see in the security industry at this year’s ISC West? I believe there will be three: big data, cyber security and the Internet of Things.

Security systems continually
generate massive amounts of
data and video surveillance
cameras are probably the
biggest culprits

Translating big data into business intelligence

We all know that security systems continually generate massive amounts of data and video surveillance cameras are probably the biggest culprits. The question is: What do we do with all that collected data? This is where video analytics and integrating different systems come into play, enabling users to cross reference data for more comprehensive insights. When analytics were first introduced into the security market a decade ago, performance was less than optimal. However, the technology has slowly matured and become a much more robust and reliable tool for translating big data into usable business intelligence. In the coming year, expect to see more analytics being built into cameras and video management systems and becoming part of video surveillance companies’ standard offerings.

The issue of dealing with ever more massive data collections will be compounded by the growing number of integrated security solutions that incorporate an exciting array of other sensor technologies in addition to the surveillance cameras. This will open the window of opportunity for big storage companies such as NetApp and DELL/EMC to capitalise on the big data trend and position themselves as strategic partners in the security industry.

The concept of IoT has gained renewed energy in recent years because of IoT trends in the consumer industry
In 2016 there were several high-profile incidents where networks were compromised through breaches in their physical security systems

Strengthening cyber security

Despite hearing about data breaches for many years – everything from credit card information stolen from retail giants to patient files siphoned from healthcare institutions – the issue was not a major topic of discussion among physical security professionals; however, last year something changed. In 2016 there were several high-profile incidents where networks were compromised through breaches in their physical security systems. One of the most recent was at the presidential inauguration in January where a number of IP cameras and NVRs were discovered being hacked. It served as a wake-up call to the security industry as to the severity of the situation and brought the topic to the forefront for manufacturers. While cyber security certainly relies on technology for protection, even more important are policies, tools and training for integrators and users. Because the IT industry has dealt with this issue for many years, their experience can serve as a model for implementing comparable technologies and protocols for physical security. While there will likely be a lot of marketing around cyber security at ISC West, it is important that people take the time to fully understand exactly what technologies and tools vendors are delivering to address it.

With all this new technology
coming onto the market, the
emphasis on education and
supporting services will
become more significant

Internet of Security Things

IoT is really nothing new. If you look back to the first network-based IP cameras introduced in 1996, they were, in fact, true IoT devices. However, the concept of IoT has gained renewed energy in recent years because of IoT trends in the consumer industry – smart homes, connected cars and mobility in general. So, how will this play out at ISC West? Expect to see more smart devices sharing the network. We have seen IP-based access control systems, IP-based intercoms and even IP-based intelligent audio systems hitting the market over the last few years. If you look around any school, hotel or airport you will quickly realise that there are more speakers installed in those environments than cameras. Also look at the latest network-based innovations in perimeter protection, especially those using thermal cameras to provide high system accuracy. In addition, there will be companies debuting totally new types of IoT devices at ISC West this year, making 2017 the year of the Internet of Security Things.

Security education, tools, and services

With all this new technology coming onto the market, the emphasis on education and supporting services will become all the more important. As you wander the aisles of ISC West this year, consider what new skills and tools you will need to reap the full benefit of mining big data, hardening your physical security systems and connecting smarter physical security devices to your network.

Which trend do you expect to have the biggest influence at ISC West this year?

32.4%

24.3%

43.2%

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Electronic security systems
  • Retail security systems
  • Physical security
  • Healthcare security
  • Video analytics
  • Security training
  • School security
  • IP security solutions
  • Perimeter protection
  • Cyber security
  • Video Management System
  • Internet of Things (IoT)
  • Data Security
  • Related links
  • ISC West 2017
  • Axis Communications Access control software
  • Axis Communications IP cameras
  • Axis Communications Network video recorders (NVRs)
  • Megapixel IP cameras
  • Thermal CCTV cameras
  • Articles by Fredrik Nilsson
  • Related categories
  • Access control software
  • CCTV cameras
  • IP cameras
  • Network video recorders (NVRs)
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Expert commentary
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec