SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

What are the new developments in networking and connectivity for security?

11 Nov 2022

What are the new developments in networking and connectivity for security?
Larry Anderson
Larry Anderson
11 Nov 2022

Editor Introduction

Connectivity is literally the difference between products operating individually and those combined into a more powerful system. Many of the devices that connect today’s security products reflect mature technologies that have been proven over time. However, innovation is also driving the need for new approaches to connectivity and networking. We asked this week’s Expert Panel Roundtable: What are the new developments in networking and connectivity for security?


Card image cap
Fredrik Nilsson Axis Communications

The World Bank predicts that by 2050, the current urban population will double in size. As cities grapple with the corresponding increase in foot traffic, motor vehicles, and cyclists, authorities will have to work harder to keep the uptick of pedestrians safe and transportation systems efficient. In large urban areas, network video surveillance technology and high-quality analytics not only provide valuable evidence in forensic investigations but can also help to improve mobility throughout cities city by providing both immediate and long-term insights to ensure comfortable and safe movement for people and vehicles. Network camera solutions can also detect accidents in real-time, identifying traffic incidents quickly and improving situational awareness for emergency responders. Regulators estimate that reducing 911 response times by just one minute could save as many as 10,000 lives each year, which means this technology provides real, tangible results in the community.

Card image cap
Leo Levit ONVIF

The growing prevalence of 5G will be one of the biggest development drivers for security in terms of connectivity for years to come. Many manufacturers are already developing solar panel-powered 5G devices, which can be rapidly deployed in a remote location with a simple 5G connection. This will be a game changer for security for remote sites or where hardwired connectivity is problematic due to 5G’s network capability, which provides broader bandwidth for video streaming. This removes much of the traditional barriers such as cabling and bandwidth constraints.

Card image cap
Paul Leudtke Aiphone

Security systems have evolved to be more connected than ever before. Different technologies integrate together seamlessly and effectively. Customers are looking for a layered security solution through a single point of interoperability. Security manufacturers can ensure that their product opens the door to integration opportunities with other industry leaders. For example, intercom systems that integrate with Session Initiation Platforms (SIP) allow end users to receive audio or video calls from any desk phone, mobile phone, or computer. Intercoms also integrate with video management systems and can be reviewed similarly to IP cameras. Overall, these integrations provide a better user experience through simplicity, readiness, and speed. The ability to easily adapt is the key, when addressing security issues promptly, and having a multi-layered approach makes that easier.

Card image cap
Jaroslav Barton HID

In the access control market, we are seeing a migration away from Wiegand and other proprietary communications protocols to OSDP developed by SIA. Wiegand has been around for decades, but it doesn’t meet today’s requirements. OSDP, which became an international standard in 2021, is much more secure and supports high-end AES-128 encryption. OSDP constantly monitors wiring to protect against attack threats and is bi-directional, meaning that readers and controllers communicate both ways to not only authorise access, but allow configuration and remote management to be carried out efficiently. In addition, total cost of ownership (TCO) is lower – you need less wires for OSDP communication. As a result, OSDP is being adopted quickly in many markets, particularly the United Kingdom (UK), Germany and the United States of America (USA). From an HID Global perspective, the good news is that our two main reader families – Signo and iCLASS SE – both support OSDP. Launched two years ago, Signo has OSDP built-in, with iCLASS SE technology easily upgradable using an additional module.

Card image cap
Sarah Bowden Ava Security

The cloud has been a game-changing development for security in the networking and connectivity space. The world of physical security is a great example here; with industry finally coming to the realisation that an ‘isolated’ patched network cannot adequately compare to a cloud-connected solution. Super flexibility, scalability, and ease of use alongside lighter weight and IoT networking technologies are going to drive adoption. We will see the functional breadth of cloud offerings increase leading to unified security platforms and category collapse in the industry. This is great for customers who are all looking for greater value from the systems they purchase.

Card image cap
Kayne McGladrey Hyperproof

The growing acceptance of Zero Trust as a legitimate security architecture is a significant improvement in the past decade for modern cyber security. Although initially maligned as a marketing buzzword, and still unfortunately misused in product announcements, zero trust now reflects table stakes to support the needs of hybrid and fully remote workforces. Network connections should no longer be implicitly trusted because of a user’s location behind a corporate firewall or the use of a company’s VPN. Rather, each transaction and connection from a user and their associated device should be inspected and validated to confirm that the access is appropriate. The ability of networking solutions to provide both real-time telemetry and controls, so that an automated and external policy engine can take enforcement actions is also a recent improvement, as networking equipment vendors historically tried to place their products and subscriptions at the centre of cyber security strategies. Today’s effective networking solutions integrate well with other solutions to provide one part of a holistic cyber security strategy.


Editor Summary

New developments in connectivity include 5G mobile networks, SIPs for intercoms, OSDP for access control, and even the cloud. As physical security continues to rely on multiple products and systems working together to achieve broader goals, secure and effective communication and networking will continue to be at the forefront of maximising innovation.

  • Related links
  • Aiphone Access control software
  • Aiphone Access control systems & kits
  • HID Access control software
  • Ava IP cameras
  • Ava IP Dome cameras
  • Access Control Software Access control software
  • Proximity Access control systems & kits
  • Indoor/Outdoor IP Dome cameras
  • Standalone / Networked Access control systems & kits
  • Network IP cameras
  • Proximity Access control software
  • Centrally managed access solution Access control software
  • High Level Interface Access control software
  • Management Systems Upgrade Access control software
  • Related categories
  • Access control systems & kits
  • Access control software
  • IP cameras
  • IP Dome cameras
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
IDIS launches new AI PTZ cameras for enhanced security

IDIS launches new AI PTZ cameras for enhanced security

Everon & Alarm.com unify commercial security solutions

Everon & Alarm.com unify commercial security solutions

Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Round table discussions
About this page

Discover latest developments in networking, connectivity and security, enhancing surveillance solutions and data storage for better safety.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec