SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Thermal imaging
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

SourceSecurity.com 2015 Review and 2016 Forecast

SourceSecurity.com 2015 Review and 2016 Forecast
Larry Anderson
Larry Anderson
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Closer collaboration between security, police services to address international threats highlighted in 2015.
  • Interoperability emerges as 2016's major security trend, with open standards gaining traction.
  • Video sector leads security change, with demand for high-resolution surveillance growing.
Related Links
  • Security industry’s top 10 mergers & acquisitions of 2015

2015 has been an eventful year for the physical security industry. As 2016 looms, the pace of industry change shows no sign of decreasing.

 

Seeking insights into the state of the physical security market at year-end, SourceSecurity.com this month is publishing dozens of 2015 Review and 2016 Forecast articles submitted by manufacturers, integrators and other industry leaders. Taken together, the articles portray a mostly optimistic view of the industry’s present, and an even more hopeful view anticipating the year ahead. This article will provide a compilation of that variety of viewpoints with links to the individual articles. We appreciate all the contributions to our Review and Forecast initiative, and welcome any feedback.

Nobody could have predicted the significant number of international security and terrorism threats this year, says one contributor. Undoubtedly this will result in even closer ties among the security industry, police and security services moving forward, as everyone looks to further enhance public safety.

Combine physical and cyber security

The nature of risk has changed, and there is a blurring of lines between cyber, physical and online security. These changes are spurring organisational changes as well. Concern over cyber-attacks via physical security networks grew in 2015, as more and more networked devices interact with security systems.

The IT department continues to be a big buying influence as networked systems thrive. Developing IT-friendly solutions and communicating effectively to IT-focused buyers (whose needs can be slightly different than traditional security-focused buyers) is more important than ever.

Cybersecurity concerns are likely to see a broader focus beyond the servers, workstations and communications infrastructure that we are used to, growing to encompass appliances, vehicles, factories, utility infrastructure, medical devices, and myriad other devices that will eventually all be connected to the Internet – and therein lies the ongoing task.

Concern over cyber-attacks via physical security networks grew in 2015
There is a blurring of lines between cyber, physical and online security


Needs: Personnel, ROI and good integrators

Given the growing economy, one challenge is to find and retain top talent, especially in the North American business. One company pointed to the tight employment market that has made it difficult to fill several open positions needed because of growth. The tightening labour market has propelled to the forefront a pressing need for talent. There are fewer candidates for security officer openings – and openings in most industries. The competition for top talent is escalating.

End users are also seeing change. The economy and economics demand that end user organisations direct their decision-making based on two very well-known terms, return on investment (ROI) and total cost of ownership (TCO). One unexpected development integrators began to see in 2015 is that they no longer have to be the lowest bidder to win a project. Customers are starting to see value in working with a knowledgeable and reputable systems integrator. Integrators continue to bring new value to customers through new capabilities enabled by the Internet of Things. By utilising connected technology and sensors, security integrators are able to provide increased business intelligence across systems.

One manufacturer says security projects seem very attractive because they normally can bring up to 30% profit for a standard security system installation. IT and networking professionals can install IP-based security systems, and there is a wide variety of cost-effective high-tech products available for every need.

Interoperability will be the major trend of 2016 in the security industry. Initiatives like open standards and cooperation among suppliers are emerging to help companies react faster to changing security demands.

The competition for top talent is escalating
The tight employment market has resulted in fewer candidates to fill security officer openings

Video sector leading industry change

The video sector displayed perhaps the most change in the physical security market in 2015.

Perhaps there was some slim-down in scope and size of video projects this year, but one contributor certainly saw an upswing in new project installations. In 2015, the industry saw much more scrutiny placed on the quality of the video stream at display level. And new networked systems are meeting the demand. The end customer is expecting pristine, non-pixelated imagery. The affordable technology within the newest-generation of PCs and workstations from the CPU and graphics standpoint allow multiple views of high-definition camera activity.

Other contributors agreed that video surveillance technology continues to evolve at a strong pace with improvements in resolution, integration, intelligence and bandwidth utilisation – all of which contribute to better overall security and cost-efficiency. There is also a broader variety of vertical markets showing an increasing need for video surveillance; security vendors must be versatile in their product offering. The products themselves must be highly scalable and must provide high performance at a competitive price.

One-stop system or better integration?

The tension continued in the market in 2015 between the need for effective integration of “best of breed” systems from a variety of manufacturers and a preference for a one-stop total system from a single manufacturer. Our contributors made good arguments for each.

One company expects those with comprehensive solutions using embedded intelligence will dominate the business. This requires a dedicated focus on innovation in intelligent solutions rather than specific products, they say. “2016 will involve not only digitising the physical world, but also in understanding it with applications that go beyond the realm of security into business intelligence to generate actionable insights. This is the way of the future.”

Vicon claims that the surveillance industry is undergoing 'siliconisation'
The cost of megapixel cameras has dropped dramatically as this functionality is now available on chips

Another contributor sees a continuing and growing need to support heterogeneous systems that may include multiple brands of cameras and other devices, driven in part by the fast pace of new model introductions. Prediction: This trend will continue, and could even increase, through 2016.

The industry also experienced more price pressure on hardware than in previous years. The discussion of price versus value will be a common one in 2016. There can only be one player with the lowest cost, but there is a part of the market focused just on cost. However, many companies will keep building on value and quality.

The “siliconisation” of surveillance cameras has had a great impact on the security industry, especially this year. The cost of complex megapixel cameras has decreased dramatically as this functionality is now available on chips. The camera industry has gone from innovating on the camera’s performance and functionality to acting more like the PC OEM business, and this siliconisation is driving industry commoditisation.

Smarter systems coming fast

More intelligent systems offer plenty of opportunity for the market. The inclusion of high-quality analytics on board the camera, says one company, will be a continuing trend in 2016 and beyond. 2015 saw an accelerated adoption of thermal cameras with video analytics.

Several contributors predict that the adoption of video analytics will continue to grow. There will be more enterprise-level and mission-critical installations where analytics are specified into the system. The technology will also trickle down into everyday installations, like larger retail stores, schools and offices. Indeed, video analytics are experiencing a renaissance, with even more applications of analytics likely in 2016. Another contributor predicts that increasingly accurate camera- and server-based analytics applications, available in 2016, can provide valuable data and insights for business operations, management and more.

4K cameras will likely continue to dominate new offerings in 2016. However, one contributor points out that 4K surveillance faces diverse technical challenges. Every element in the video surveillance collection chain — lenses, sensors, image processors, local-site transport (LST), monitors, codecs, HDDs, and WAN interfaces — must be “ready for prime time” in order for the mainstream market to migrate to the higher resolution.

4K cameras will dominate offerings in 2016, but also face technical challenges
Every element in the video surveillance collection chain - from lenses to image processors - must be ready for the migration to 4K resolution   

However, analogue is still dominant in parts of the market with some still reluctant to make the move to HD and IP. However, 2016 will see a new generation of high-performance IP camera (4K) become established in the market.

Cyber-security is another concern in the video market, as well as the physical security market in general. More attention is being paid to IT security because of high-profile cyber-attacks and data theft incidents, accelerating the adoption of IT security standards by system manufacturers and integrators.

Wireless and other trends

Wireless connectivity is a coming trend. A cost-effective solution is to upgrade network connectivity with a novel breed of wireless technology, millimetre wave (mmWave), which is the next unlicensed band.

One participant attributes their success to not following trends. They favour an approach of questioning conventional wisdom and placing the greatest emphasis on customer benefits. They see themselves not as a manufacturer but as a provider of solutions that provides added value for the customer.

It seems that regardless of the economic gains or losses over any given period of time, video surveillance continues to grow at a good to great clip. The demand for surveillance is always there, and the request from the end users and channels are always the same – great technology at a fair total cost, that allows them to run their business more efficiently, effectively and safely.

Security will move to a much greater focus on the user experience
The appearance of numerous mobile credential offerings signals the "beginning of the end" for card-based identity   

Access control, biometrics, and beyond

News in the marketplace in 2015 included the rise in advanced biometrics, the development of more and more mobile applications for access control and important acquisitions that put smaller manufacturers on the map. 2016 will see an acceleration in the broad adoption of fingerprint solutions for corporate security applications. The market is maturing and producing reliable, effective and secure solutions that specifically address the issues that caused concern in previous years such as dirty fingers or spoofing attempts.

One contributor sees a growing awareness in the C-suite of the perils of unauthorised entry, often called “piggybacking” or “tailgating” in security vocabulary. Top executives are becoming more aware of the threat and the potential cost of such threats, and they’re motivating their organisations to take action.

How customers interface with solution providers is changing. One (cloud-based) company seeks to become “strategic partners” – to become “part of [the] customers’ overall planning and embedded in their organisation.” In effect, they are looking to add value every day.

Market research is showing that IP access control is gaining significant strength and growing at rates that the IP surveillance world experienced for the last 8 -10 years.

End user organisations continue to contain costs any way they can and have an interest in being as green as possible.

The changing world of credentialing

The world of credentialing in the access control market is changing rapidly. The appearance of numerous mobile credential offerings signals the “beginning of the end” of card-based identity. Mobile offerings are strengthening in general. In fact, “invisible” access credentials are coming into their own, thanks in large part to technologies that enable smartphones to be used as electronic keys for locking and unlocking doors.

Customers increasingly expect similar types of experiences where they live, learn and work, which is impacting how they interface with their company’s systems. The transition to electronic credentials is increasing as a result of more awareness of credential options and tangible improvements in operating efficiency. Security will move to a much greater focus on the user experience.

The rising drone threat is pushing the security industry to resolve the issue of safe and effective interception
The rising drone threat is pushing the development of low-cost radar and other solutions for detection and interception 

In contrast, the increase in school shootings and other emergency situations in 2015 has made ID badging top-of-mind for facilities throughout the country, says one contributor.

Instead of upgrading or replacing hardware, end users in many cases will be able to upgrade the software to have new features, even related to systems like key control.

In general, key control is gaining mindshare. Whereas previously key management systems and lockers for asset management were seen as a periphery issue, facilities and security managers are now starting to see them as a vital part of the overall security strategy.

There are other trends, too. The rising drone threat will bolster development of low-cost radar and other solutions. However, the industry will still need to resolve the issue of safe and effective interception. In fact, drones are only one of the futuristic trends likely to impact the market in 2015.

The Middle East is a particular hotbed for vehicle barriers and other increased security measures for explosive-laden vehicles. One company focuses on providing real-time information to security personnel and first responders to help them identify, respond and mitigate emergency situations.

Looking ahead to 2016

In the new year, look for predictive security to be a more prevalent theme as organisations are tasked with not only providing more data but making sense of the data for use in improving security operations.

Also, digitalisation for consumers (social media, tech offerings from financial companies and wireless service providers) are helping to drive IP conversion in the security industry: the advantages people have at home are desired at work, too.

We should expect that more of the large technology giants known outside of our industry will enter the professional security market, predicts another contributor, as the trend towards networking and more advanced integration continues to gain traction.

See the full coverage of 2015/2016 Review and Forecast articles here

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Physical security
  • Video analytics
  • Fingerprint recognition
  • Security training
  • Wireless security
  • Door access control
  • HD CCTV
  • Mobile surveillance
  • Thermal imaging
  • IP security solutions
  • Cyber security
  • Internet of Things (IoT)
  • Corporate Security
  • 4K
  • Related links
  • AMAG CCTV software
  • AMAG Access control controllers
  • AMAG Access control software
  • AV Costar CCTV software
  • Axis Communications Access control software
  • Axis Communications Access control controllers
  • Axis Communications CCTV software
  • Axis Communications Audio, video or keypad entry
  • Axis Communications Intruder detectors
  • Bosch CCTV software
  • Bosch Access control software
  • Bosch Intruder detectors
  • Bosch CCTV cameras
  • Bosch Access control systems & kits
  • Bosch Intruder alarm system control panels & accessories
  • Bosch Access control controllers
  • Brivo Systems Access control software
  • Brivo Systems Audio, video or keypad entry
  • Brivo Systems Access control controllers
  • Brivo Systems Access control systems & kits
  • IQeye Access control software
  • IQeye CCTV software
  • Milestone CCTV software
  • Oncam CCTV cameras
  • Oncam CCTV software
  • Senstar Intruder alarm system control panels & accessories
  • Senstar CCTV software
  • Senstar Intruder detectors
  • Senstar Access control software
  • TDSi Access control controllers
  • TDSi CCTV software
  • TDSi Access control systems & kits
  • TDSi Access control software
  • TDSi CCTV cameras
  • TDSi Intruder detectors
  • Vicon Access control controllers
  • Vicon Access control systems & kits
  • Vicon CCTV software
  • Vicon Access control software
  • Vicon CCTV cameras
  • AMAG Access control readers
  • AV Costar IP cameras
  • Axis Communications IP cameras
  • Axis Communications Access control readers
  • Bosch IP cameras
  • Bosch Access control readers
  • IQeye IP cameras
  • MicroPower Technologies IP cameras
  • Oncam IP cameras
  • TDSi Access control readers
  • TDSi IP cameras
  • Vicon Access control readers
  • Vicon IP cameras
  • AV Costar IP Dome cameras
  • Axis Communications IP Dome cameras
  • Bosch IP Dome cameras
  • Bosch Access control cards/ tags/ fobs
  • Bosch Security Systems Access control cards/ tags/ fobs
  • Brivo Systems Access control cards/ tags/ fobs
  • IQeye IP Dome cameras
  • Oncam IP Dome cameras
  • TDSi IP Dome cameras
  • TDSi Access control cards/ tags/ fobs
  • Vicon Access control cards/ tags/ fobs
  • Vicon IP Dome cameras
  • Axis Communications Storage
  • Bosch Storage
  • Thermal CCTV cameras
  • Wireless CCTV cameras
  • Thermal IP cameras
  • Articles by Larry Anderson
  • 2015 security trends
  • Related categories
  • Access control controllers
  • Access control systems & kits
  • Audio, video or keypad entry
  • Access control software
  • Intruder alarm system control panels & accessories
  • Intruder detectors
  • CCTV cameras
  • CCTV software
  • IP cameras
  • Access control readers
  • Access control cards/ tags/ fobs
  • IP Dome cameras
  • Barriers
  • Storage
Related white papers
How security systems ensure healthy workplaces during COVID and after

How security systems ensure healthy workplaces during COVID and after

Download
Delivering a smart, secure and healthy workplace with cloud

Delivering a smart, secure and healthy workplace with cloud

Download
Building a safe ecosystem for visitors post COVID-19

Building a safe ecosystem for visitors post COVID-19

Download
Related articles
Thermal cameras and smart cities: Preventing COVID-19 in public places

Thermal cameras and smart cities: Preventing COVID-19 in public places

Elevated temperature screening is paving the way to Britain’s reopening

Elevated temperature screening is paving the way to Britain’s reopening

What are some unusual applications of surveillance cameras you have seen recently?

What are some unusual applications of surveillance cameras you have seen recently?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Thermal imaging
  4. News
  5. Expert commentary
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec