SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

What current technology is a game changer for security?

11 Dec 2023

What current technology is a game changer for security?
Larry Anderson
Larry Anderson
11 Dec 2023

Editor Introduction

Ideally, every new product or technology serves a need in the market, but not all new products are created equal. The impact of some new technologies is so profound that they make us rethink our preconceptions and may create a total transition in the broader market. These are the technologies we call “game changers” because they prompt a significant shift in the current manner of doing or thinking about security. We asked this week’s Expert Panel Roundtable: What current technology is a “game changer” for physical security?


Card image cap
Rohan Ramesh Entrust Inc.

First-rate security technology considers the importance of a unified approach that combines the convenience of digital with the physical world's needs. With tools such as PKI-based (public-key infrastructure) mobile smart credentials that enable derived PIV credentials on mobile devices while also allowing users to authenticate into workstations, organisations can turn smartphones into high-assurance mobile authentication devices. This technology provides secure access to doors or workstations based on the proximity of authorised and verified users. Digital certificates establish a trusted signature, encryption, and identity between people, systems, and entities. These solutions go beyond just doors. They provide security for cabinets, machinery, vaults, labs, parking structures, document storage areas, and various types of equipment. In addition, they also provide secure phishing-resistant access to digital resources. The wide range of applications for this technology makes it essential for organisations looking to enhance enterprise security posture across both physical and digital resources. 

Card image cap
Jordan Hill HiveWatch

Of the biggest advancements that I have seen is the functionality of local computing embedded in physical security systems, such as GPUs on cameras that allow local processing of computer vision analytics. One of the key benefits of this is that there doesn’t need to be complicated technical scoping to determine the network architecture that brings machine learning solutions to a security programme. Additionally, there’s less latency to create new security alarms from either computer vision, PACS noise reduction, or other ML-powered anomaly detection. Taken together, this means more seamless deployment of ML applications, eliminating the complexity of networking and security conversations to get started in your environment. It’s a game changer for innovative companies wanting to leverage ML-driven technology across their organisations. 

Card image cap
Maureen Carlson System Surveyor

One technology that’s changing the game for physical security professionals is collaborative system design software. These intuitive platforms not only equip their users to design, install, and manage physical security systems, but they also streamline everything from the initial site survey to long-term device management. While endpoint devices at the forefront of integrated systems tend to get all the credit—or take all the blame—the real trick to building dependable physical security systems comes down to efficient site surveys at the front end and effective collaboration between key stakeholders throughout the life cycle of a system. This is only possible with tested and trusted collaborative system design software.  

Card image cap
Andrew Scothern Gallagher Security

Cloud solutions are reshaping the security industry by delivering agile, scalable, and highly effective protections that maximise users’ security investments and transform how businesses operate. Their ability to gather and rapidly collate rich data sets will give organisations the ability to identify trends, predict behaviours, and make more informed decisions. The cloud is also emerging as a game changer in cybersecurity. Automatic software updates and enhancements deployed in real-time keep these systems up to date effortlessly, removing the burden of system maintenance and freeing up businesses to focus on other important tasks. The result is a safer digital landscape where security is no longer a luxury but an achievable foundation for businesses of all sizes and budgets.  

Card image cap
Richard Winstanley BFT Automation UK Ltd

When the Protect Duty Bill becomes law, public venues such as arenas, casinos, and hotels, will be legally required to devise and provide specific security plans for a terror attack. It will be important to look at Hostile Vehicle Mitigation (HVM) as part of a protective security strategy, as hostile vehicles have unfortunately become increasingly relied on by those seeking to launch an attack. This is where solutions such as anti-terror bollards come into play. Either fixed or retractable, certified HVM bollards are not only designed and tested to withstand impact from vehicles of various sizes and designs but also at different speed ranges, for example, 30 mph or 50 mph. Offering protection without impeding on the movement of pedestrians and cyclists, automated bollards can be integrated into a building management system, where a security team could control them in the same way they would a CCTV system and an alarm network.   

Card image cap
Dan Berg Salient Systems

Artificial Intelligence (AI) is going to be the game changer – and disruptor - in physical security as it is with almost every other industry. AI will have the ability to truly assess threats to the facilities and staff that physical security is there to protect. By combining all available data points – from perimeter detection to intrusion detection to fire system sensors to video analytics and computer vision – AI-powered physical security systems will be able to detect, assess, and respond faster and with greater accuracy than any human operator ever could. Of course, this raises the question as to who, or what, is ultimately in control of access to a facility, asset, or even intellectual property that is being protected. As AI is rapidly evolving at a breakneck pace, that and other questions about AI’s role in our civilisation will need to be answered. 

Card image cap
Hiroshi (Huey) Sekiguchi i-PRO

AI continues to be a game changer in our industry by simplifying security processes and procedures while requiring less human intervention. In the video security market, AI-based cameras have enabled new levels of analytics that can detect and search through captured data faster than ever. These cameras’ ability to detect people and vehicles reliably has enabled analytics at the edge (that analyse what those objects are doing) to be nearly error-free. What’s most exciting though is the continual evolution of AI. While it’s useful to know when a person enters a restricted area, the same technology is now being used to detect when anomalies take place. This “scene change detection” can alert operators when a door has been left ajar longer than normal, or when a car is left in a no-parking zone beyond x minutes. It can even alert when stock on a shelf is below a minimum threshold.

Card image cap
Daniel Reichman Ai-RGUS

Cloud-connected cameras offer a new opportunity for camera system deployments. It adds a layer of managed cybersecurity for the camera systems and makes it easier for third parties such as AI software companies to integrate their solutions with the camera system. This adds more value to the installation. Like this, camera system deployments of all sizes can benefit from the same automation and enterprise-tier features that were always useful but may have previously only been accessible to the largest systems. 

 

Card image cap
Jack Li Anviz Global Inc.

In security systems, AI-integrated devices are mainly access control devices and surveillance equipment. In access control devices, the most common face recognition machines use liveness detection and face recognition algorithms based on neural processing units (NPU), allowing for better compatibility with various ethnicities and enhanced anti-hacking capabilities. In surveillance cameras, the application of AI algorithms such as human shape recognition, posture recognition, behavior analysis, face recognition, and licence plate recognition not only significantly improves the accuracy of events and alarms, but also effectively reduces unnecessary network bandwidth usage. Performing basic recognition and analysis at the front end and then uploading data as needed to the platform system can effectively reduce platform computational power requirements, allowing the platform to focus computational power on core businesses. For conventional security needs, cloud-based platform systems can effectively reduce hardware investments. Cloud-based storage is easier to expand and does not require dedicated maintenance. 

 

Card image cap
Greg Ayres iDter

The combination of cloud computing and storage technology with intelligent AI cameras, commonly referred to as VSaaS (Video Surveillance as a Service), has created a breakthrough in physical security performance and results. Smart cameras have evolved to active sensors, equipped with automated controls and AI algorithms that accurately detect intruders within seconds, leading to the execution of immediate deterrence actions without the inherent delays of human interaction. Cloud hosting and AI-based image characterisation have elevated the effectiveness of video monitoring by focusing human operators on real threats and safety concerns that require intervention and possibly 911 dispatch. Cloud hosting of video-verified events is immediately sent as push notifications to stakeholders on mobile devices, thus allowing transparency to the effectiveness of the security solution. The result of this technological evolution? Dramatically improved security results and lower costs for both the service provider and property owner – driving higher market adoption and declines in burglary. 

Card image cap
Sean Foley Interface Systems LLC

The amount of petty theft and organised retail crime (ORC) attacks continues to rise for retailers. Internal shrink is also of great concern. AI-based security technologies are proving to be instrumental in helping organisations keep a watchful eye without incurring excessive additional expenditures. Automated voice-down messages can be a powerful deterrent that lets bad actors know they are being watched for example. Remote video monitoring services like virtual guard services offer an alternative and safe way to engage with offenders and keep employees safe from confrontations. Point-of-sale exception reporting tied to video helps to further reduce shrink. The evolution of AI-based analytics is a game changer as it helps the industry offer more protection while requiring fewer resources. While AI is helping asset prevention specialists work smarter and reduce losses, it is also helping the industry shift from reacting to past events to a more proactive and preventative posture. 

Card image cap
Manish Mehta Ontic Technologies

As threats continue to multiply, corporate security teams need modern methods to move beyond the antiquated challenge of utilising a multitude of disconnected systems just to locate essential information about a threat. Platforms that collect and connect multiple sources of information for investigators and intelligence analysts solve these challenges and are a game-changer in providing security teams with the essential information they need to protect their businesses from threats. By providing a unified ecosystem that connects critical data to better manage the threat lifecycle, a robust security technology platform allows teams to not only be proactive when taking action when threats arise but also provides the necessary information needed to separate imminent threats from misinformation and disinformation. Overall, the security technology that emphasises connected intelligence and centralised data will provide security teams with the tools to navigate the growing threat landscape to better respond to incidents, conduct investigations, and maintain one source of truth. 


Editor Summary

When it comes to identifying game changers in the physical security world, the most obvious candidates are artificial intelligence (AI) and cloud systems, including all their various applications. Not surprisingly, several of our Expert Panelists named those technologies as factors significantly impacting the security market. Other technologies named by our panelists include mobile smart credentials, embedded computing, collaborative design software, anti-terror bollards, and unified security management platforms. Considering all the suggestions together, it is very clear that the game is, indeed, changing.

  • Related links
  • Anviz Access control software
  • Anviz CCTV software
  • Salient Systems CCTV software
  • Anviz IP cameras
  • Anviz Access control readers
  • Anviz Electronic locking devices
  • i-PRO IP cameras
  • Anviz Network video recorders (NVRs)
  • Salient Systems Network video recorders (NVRs)
  • Infrared CCTV cameras
  • Bar Code Access control readers
  • Card Access control cards/ tags/ fobs
  • Access Control Software Access control software
  • Biometric Access control software
  • ANPR Software CCTV software
  • Infrared IP cameras
  • Self Contained - External Intruder warning devices
  • Event Network video recorders (NVRs)
  • Networkable Access control readers
  • Magnetic Stripe Access control cards/ tags/ fobs
  • Megapixel IP cameras
  • Real Time Network video recorders (NVRs)
  • Self Contained - Internal Intruder warning devices
  • PC-based Access control readers
  • Biometric Access control readers
  • Control Software CCTV software
  • Card Swipe Access control readers
  • Internal Intruder warning devices
  • Proximity Access control cards/ tags/ fobs
  • Detection Software CCTV software
  • PCB CCTV cameras
  • Standalone Access control readers
  • Contact Access control software
  • Network IP cameras
  • PTZ IP cameras
  • Thermal CCTV cameras
  • Real Time / Timelapse Network video recorders (NVRs)
  • Tag Access control cards/ tags/ fobs
  • Smart Card Access control cards/ tags/ fobs
  • Proximity Access control software
  • IP Surveillance Software CCTV software
  • Wireless CCTV cameras
  • Pinhole CCTV cameras
  • Timelapse Network video recorders (NVRs)
  • Management Software CCTV software
  • Magnetic Stripe Access control readers
  • Central Monitoring Option Access control software
  • Smart Card Access control software
  • Recording Software CCTV software
  • Centrally managed access solution Access control software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • RFID Access control readers
  • Smart Card Access control readers
  • Face Recognition Software Access control software
  • License Access control software
  • Video Detector Video signal devices & accessories
  • Warning Sign Video signal devices & accessories
  • Warning Sticker Video signal devices & accessories
  • Related categories
  • CCTV cameras
  • Digital video recorders (DVRs)
  • CCTV software
  • Access control software
  • Intruder warning devices
  • IP cameras
  • Access control readers
  • Electronic locking devices
  • Network video recorders (NVRs)
  • Access control cards/ tags/ fobs
  • Video signal devices & accessories
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Modernizing access control

Modernizing access control

Download
Enhancing physical access control using a self-service model

Enhancing physical access control using a self-service model

Download
Related articles
HiveWatch boosts board with James Segil appointment

HiveWatch boosts board with James Segil appointment

Securitas Technology acquires Sonitrol Ft. Lauderdale

Securitas Technology acquires Sonitrol Ft. Lauderdale

Kindoo expands reseller program in North America

Kindoo expands reseller program in North America

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Round table discussions
About this page

"Uncover the technology that's reshaping the physical security industry. Learn from industry experts about the current game-changing tech that's transforming security standards. A must-read for decision makers."

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec