SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

What will be the biggest security headlines in 2017?

What will be the biggest security headlines in 2017?
14 Dec 2016

Editor Introduction

The end of the year is a great time to reflect on what the security industry has accomplished and to look ahead. We invited our Expert Panel Roundtable to weigh in on what they expect looking forward to the new year. Most industry-watchers are familiar with the major trends, but how will those trends play out in 2017? Specifically, we asked this week’s Expert Panel Roundtable: What will be the biggest headlines for the security marketplace in 2017?


Card image cap
John Davies TDSi

Undoubtedly, open platform systems will be a highlight of the security industry in 2017, with flexible integration now essential to a market looking to mix and match the best combination of components for the job. We have moved from proprietary systems to a security world that changed completely when the Mercury controller came to market. Open controllers and the use of REST API and ONVIF Profile A will move access control along, taking us to the next level. Open platform is specifically designed to integrate with many other systems, including powerful software and hardware to make the most of these advances. With the Internet of Things, truly open platform systems have never been in more demand and will take centre stage. While security providers need to invest in this technology, the rewards will be substantial for businesses which embrace it fully and provide the best products for customer needs.

Card image cap
Scott Dunn Axis Communications

Moving into 2017, the big trends and headlines will continue to be about cybersecurity; who is doing it well and who isn’t? Threat assessment and vulnerabilities will also continue to grab headlines. Furthermore, smart sensors and Security Internet of Things (SIoT) will become buzzwords. As security devices are smarter and online, SIoT is starting to gain steam. Looking further ahead as smart security devices are cyber-secure and always connected, the management of those devices, collection of actionable data and reporting will lead the physical security world further into the IT trend of Cloud and Big Data. In a way, the “convergence” that was predicted years ago is really starting to happen as mobility, security and IT collide and converge. The dreams of rapid, instant (mobile) information for security and forensic long term intelligence will move ahead more quickly in the coming year.

Card image cap
Mitchell Kane Vanderbilt Industries

Data vulnerability and integrity have always been critical to the security space; however, as we go into 2017, they have become even more top-of-mind. With the exponential growth of IP cameras and other Internet of Things (IoT) devices, the challenges facing IT management have also grown. We have already seen IP cameras create "backdoor" vulnerability for corporate networks; whether intentionally or otherwise, easily accessible developer credentials are left in post-production products. This must absolutely be resolved. The situation places the burden on OEMs, integrators and end users both to maintain prudence in new system design and implementation and to revisit and confirm compliance of systems previously installed. Often, critical firmware upgrades are required. Compounding this concern is the ever-growing list of residential/consumer-based IoT devices making their way onto security system networks. Organisations must maintain vigilance to maintain responsible methods on policy compliance (i.e. security certificates, encrypted data storage/communication).

Card image cap
Kevin Wine Verint Systems

In 2017, we will continue to see Big Data analysis and IoT-powered devices allow for the collection of myriad data points across systems, services, and devices. This process will allow businesses to investigate threats in a more intelligent manner. The organisations that generate actionable intelligence from collected data points will be firmly positioned to achieve their strategic intelligence and business objectives in the coming year. Overall, the alignment of risk management, IT, and business continuity will continue as it allows leaders to realise a comprehensive security strategy that takes into account cyber, IT and physical security to recognise threats proactively.

Card image cap
Jumbi Edulbehram NVIDIA

There are a number of critical issues that the security marketplace faces as we move into 2017. Perhaps the most important is the rise in cybersecurity issues with security equipment. Earlier this year, hackers were able to access vulnerable IP cameras and penetrate networks. As these instances increase, manufacturers must be diligent in providing products that can be fully secured over a network and work with IT departments to strengthen security policies related to IoT devices. Next year the industry will continue to see a rise in consolidations, mergers and acquisitions, as we have seen this year. Cloud services will also be a large trend going into the new year, as manufacturers meet the demand that end users have to store data in the cloud for ease-of-access and more remote capabilities. Finally, we'll continue to see Chinese manufacturers cause prices to drop as they continue to grow in the market.

Card image cap
Brandon Reich Pivot3, Inc.

In 2017, we can expect to see increased scrutiny over very low-cost, private-label or white-box products that may not meet modern-data security requirements. Organisations will continue to align internal security departments and processes with IT to address evolving cyber and physical threats. New technologies, such as deep learning and GPU acceleration, will enable the rise of more reliable, accurate analytics and broader market adoption of these types of technologies. Additionally, we also expect to see the emergence of cloud and hybrid-cloud platforms as viable enterprise video storage alternatives.


Editor Summary

Our Expert Panellists suggest that 2017 will be the year of “more” -- more cloud, more IoT, more consolidation, more commoditisation. Cybersecurity raised its profile and got everyone’s attention in 2016 – many for the first time. Our panellists mention it several times as a theme that will continue to dominate our discussions – and headlines – into the new year. In some cases, trends that have been anticipated for years (but not yet realised) are among the predictions of our panellists (and other industry-watchers). 2017 will finally be the year, they say. We will see. And, no doubt, 2017 will also provide its share of surprises for our dynamic physical security marketplace.

  • Related links
  • ACT Access control controllers
  • ACT Access control systems & kits
  • Axis Communications Access control controllers
  • TDSi Access control controllers
  • TDSi Access control systems & kits
  • Axis Communications IP cameras
  • Oncam IP cameras
  • TDSi IP cameras
  • Verint IP cameras
  • Related categories
  • Access control systems & kits
  • Access control controllers
  • IP cameras
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Round table discussions
About this page

Top 2017 Security Headlines: Cyber-attacks, IoT challenges, drone regulation, AI, cloud-based security and robotic security guards.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec