SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Intrusion detection
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

What is an acceptable life cycle for a physical security system?

What is an acceptable life cycle for a physical security system?
11 Oct 2017

Editor Introduction

Companies in fast-moving industries tend to want half or more of their revenue to come from products released in the last three or so years. The logical extension of that philosophy is the demise of product "cash cows" that remain in a company's portfolio for many years. Where better to witness the shortening life cycles of technology products than in the smart phone market, where most of us buy into the hype of the "latest and greatest?" But does acceleration of new product introductions translate into shorter product life cycles in the field? We asked this week's Expert Panel Roundtable: What is an acceptable life cycle for a physical security system? Is there a trend toward systems being replaced more, or less, often?


Card image cap
John Davies TDSi

A decade ago, the rule of thumb was that the life span of access control and CCTV systems was around seven years. However, as technology is evolving more quickly than ever before, modern systems can easily become “long in the tooth” much sooner than that. Keeping up with these changes can be a real headache and a costly exercise for security operators. There is undoubtedly a pressure to ensure the best technology is used, otherwise the security operator will always be on the back foot with regards to intruders and threats. For many security operators, the smart move is to procure these systems as part of a “Security as a Service” contract. A regular fee is paid to a specialist provider who guarantees the latest hardware and software is always in place. This ensures that if you require it, you’re up to date at all times.

Card image cap
Michael Sherwood Milestone Systems

Ray Kurzweil’s Law of Accelerating Returns says the rate of change of evolutionary systems tends to increase exponentially. It is being proven daily in many industries, including physical security. Adoption of open platform software that enables integrations to leverage new innovations is a key concept in ensuring a longer system lifecycle and virtually zero requirement to replace an entire system. Of course, some of the surrounding hardware components will need to be upgraded over time but these each have their own differing lifecycles. It’s a far more beneficial approach for a security system to evolve through strategic additions and upgrades rather than being limited to a finite lifecycle for the entire system. This enables us to think differently about the system and how it is applied to fixing our business challenges: knowing that our current investments will not be lost but instead are paving the way for the future.

Card image cap
Robert Lydic ISONAS, Inc.

The answer to this question clearly depends on the seat you sit in. Manufacturers, integrators, distributors, consultants and engineers all have extremely different perspectives on this question. As a manufacturer, we design systems to have a lifecycle between 5 and 7 years. This does not mean that the product is going to stop working after that point; it does however mean that our development cycle and subsequent support for these products will change and in some cases end. In manufacturing, the demands of the market always call for more, better, easier, and often less expensive. As a result, this drives continued innovation and adoption of these technologies that take volumes and economies of scale from legacy products, in turn forcing changes. These changes can be uncomfortable for end users as the cycles often do not line up with budget cycles and upgrade schedules.

Card image cap
Bud Broomhead Viakoo

There is a trend toward automated verification of physical security systems, and to be more aware of cyber-hygiene in managing such systems. These capabilities will lead to systems being replaced when needed rather than on an arbitrary fixed timetable. With automated verification, there is no guessing or opinion about the root cause of problems, or about what has reached the end of its useful lifetime. Automated verification means knowing immediately when a problem happens, why it happened, and how to fix it, and will provide scientific fact on which maintenance decisions can be made. Likewise, cyber-hygiene policy provides control of your system by knowing what is there (e.g. current firmware revision), which will also help avoid unnecessary or pre-mature system replacement.

Card image cap
Rich Mitchell DITEK Surge Protection

An unprotected physical security system will most definitely have a shortened service life and require replacing more often. This includes power surges, which can be internally or externally caused, and can happen at any time without warning. Although surge protection is both inexpensive and easy to deploy, a common misconception that devices are only at risk during extreme weather keeps many organisations from recognising the seriousness of the risk. However, the truth is that power surges can be internally or externally caused, and they can happen at any time without warning. As security systems are damaged, they are replaced with the latest advances in electronic security and monitoring systems. These systems require the latest advances in surge protection. To lengthen the life of a physical security system, surge protection needs to be an integral element of the planning and design, not just an afterthought.


Editor Summary

Our Expert Panel Roundtable points to several factors that can impact the changing lifecycles of components and systems in the physical security market. They include development cycles of manufacturers, use of automated verification systems, surge protection and even open platforms. Manufacturers and customers may be at odds on the subject, as one panelist hints. But given the rapid rate of technology change, shouldn’t we expect an accelerating trend of systems becoming outdated long before they “wear out?”

  • Related links
  • ISONAS Access control systems & kits
  • TDSi Access control systems & kits
  • TDSi CCTV cameras
  • TDSi Intruder detectors
  • TDSi IP cameras
  • Related categories
  • CCTV cameras
  • Access control systems & kits
  • Intruder detectors
  • IP cameras
Related white papers
Precision and intelligence: LiDAR's role in modern security ecosystems

Precision and intelligence: LiDAR's role in modern security ecosystems

Download
The top 4 reasons to upgrade physical security with the Cloud

The top 4 reasons to upgrade physical security with the Cloud

Download
11 advantages of a combined system for access control and intrusion

11 advantages of a combined system for access control and intrusion

Download
Related articles
Securitas UK & Hays Travel mark 10 years partnership

Securitas UK & Hays Travel mark 10 years partnership

Ranger acquires Universal Fire & Security in South West

Ranger acquires Universal Fire & Security in South West

Detection Tech's DT2030 strategy: Enhance X-ray detector solutions

Detection Tech's DT2030 strategy: Enhance X-ray detector solutions

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Intrusion detection
  4. News
  5. Round table discussions
About this page

Discover optimum life-cycles for physical security systems, factors influencing longevity, and tips for timely upgrades to ensure robust security.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec