Security industry: what tech trends?

The pace of technological innovation is accelerating: the security industry is confronted with a plethora of very IT-heavy issues. Ten examples.

One trend example: deep learning applications will give new impetus to the video market, for example in video motion and facial recognition. (depositphotos, KrisCole)

 

For manufacturers of security products, the task is to identify those innovations that have the potential to create value for the company itself and its customers. Axis Communications has identified several technology trends that will continue to impact the security industry.

1) Edge processing

In recent years, two trends in particular have become established: Cloud computing and the Internet of Things (IoT). Both have brought benefits to businesses and consumers alike. But they also have consequences: These are, in particular, the huge increase in the amount of data transmitted from networked devices to the data center for processing and storage, and the bandwidth this requires. Edge computing can mitigate this problem. Processing data close to the data source at the edge of the network - "edge" - reduces bandwidth requirements.

As devices at the edge of the network - network cameras, audio devices and other sensors - become more complex and high-value, it will be essential to balance cloud computing and edge computing to deliver reliable and usable data.

2) Cloud-to-cloud

In addition, cloud computing, where data is processed and stored off-site, will increasingly shape IT infrastructures. The growing range of cloud services will rapidly make traditional on-premise solutions less important. One advantage of integration between cloud services is the significant potential for savings in internal IT services. Using rich service APIs, it is possible to leverage services from multiple cloud providers in a synchronized fashion, including data analytics, content management and storage, enabling faster time to market and rapid upscaling. Any company offering cloud services should explore opportunities to integrate appropriate services for customers and partners.

3) Deep Learning and Machine Learning

Sophisticated algorithms, massive amounts of data to be analyzed, and the corresponding computing power harness all the benefits of deep learning and machine learning, offering a personalized learning experience for each individual. The potential is huge and could ultimately lead to autonomous systems in the security industry: with image interpretation, speech recognition and decision support, to name just a few examples.

Deep learning applications can improve video motion and facial recognition, individual tracking, and false alarm suppression. This will simplify system design, configuration, optimization and device management. As applications evolve, there is also significant potential to use predictive analytics to prevent incidents: from terrorist attacks to workplace accidents, traffic problems to shoplifting.

4) Personalization versus data protection

Deep Learning enables highly personalized services, but there are privacy concerns. One example is a retail store: as soon as a customer enters, their face can be recognized and they receive offers on their mobile device based on their previous purchases, preferences, or even recent browsing history.

Legislation, such as the EU General Data Protection Regulation (GDPR), regulates data protection. Organizations and companies have to respond to increasing personalization by protecting the personal data of each individual.

5) Cybersecurity

It is impossible to imagine the list of trends without the topic of cybersecurity. Continuous improvement in cybersecurity is imperative, because well-resourced cybercriminals will never stop trying to exploit vulnerabilities in any new technology for their criminal purposes. Also, people are more connected than ever and therefore more vulnerable to cyberattacks. Due to the increasing threats, companies are also under more pressure to secure devices from illegal access. It is important to be proactive and have a systematic process to ensure that patches are implemented as soon as they become available.

It is of fundamental importance that the market recognizes that cybersecurity begins with the manufacturer, but does not end there. Installers and end customers also have a responsibility; if they do not keep their systems up to date with the latest firmware and software, all the manufacturers' efforts will be rendered absurd.

6) Leverage all the benefits of the IoT

The Internet of Things (IoT) requires a scalable architecture to collect and analyze data. The connected devices must be managed effectively. IoT platforms make it possible to use equipment from different suppliers simultaneously and form an intelligent system. Using an existing network infrastructure, the exchange of information is straightforward. International or de facto standards ensure even better interoperability.

7) The Blockchain: More than Bitcoin

The cryptocurrency Bitcoin is a global payment system based on blockchain. Like an open ledger that records transactions between two parties in a verifiable and permanent form, blockchain enables the authentication of anything of value. In the coming years, Blockchain will be tested in several applications across numerous industries.

In the security industry, because blockchain allows for authentication of arbitrary content, it could be used to verify video content from multiple sources (e.g., public cell phones and body-worn cameras) for forensically relevant investigations and thus law enforcement. The blockchain could be used not only for video data, but also to verify the authenticity of devices connected to the camera network.

8) Integration of data silos in the smart city

By 2050, 66 percent of all people are projected to live in cities. To create a sustainable and safe environment, sensors will be increasingly used throughout the urban environment. By sharing information and data between previously isolated urban areas, it becomes possible to effectively manage a city and address urban problems, from traffic congestion and aging infrastructure to natural disasters and terrorist attacks, and to manage a city's assets such as administrative agencies, transportation systems and hospitals.

A city can only truly be called "smart" if all data is accessible and usable by all services and facilities.

9) See with non-visual sensors

The use of non-visual sensors makes the view multi-dimensional. The abundance of data enables a quick and accurate assessment of situations and consequently a more effective response to actual alarms, which also results in fewer false alarms. Radar technology, for example, does not react to objects that would normally trigger false alarms, but provides details about the exact position of these and their direction of movement.

Thermal imaging is already relatively well established as a non-visual technology. Advances in the accuracy of capturing sounds such as clanging window panes or loud, aggressive voices are other useful information missing from a video-only solution.

10) Virtual assistants and augmented reality

Virtual assistants are already helping people in their everyday lives. This technology will undoubtedly make its way into the business environment, as customers expect the same form of support at work as they do at home. Augmented reality (AR), a technology widely used by the military and in aerospace, has equally great potential in business. It is already available on mobile devices and a range of wearables.

One of the obvious opportunities for using AR in the business world is in the installation and maintenance of technological solutions where visual instructions are overlaid on top of technicians' views of the real world to assist them. Similarly, in security, where non-visual sensors and analytics are increasingly being used to refine visual information and provide further perspective, video surveillance customers will use augmented reality to combine these data sources into a single view that allows for a faster and more appropriate response.

Conclusion

Undoubtedly, other unanticipated trends will emerge in the future. The impact of the trends described above will be stronger or weaker than predicted. What is certain is that the world is changing very rapidly in many respects - politically, culturally, economically and technically - and that all organizations must respond flexibly.

The security industry is facing a host of very IT-heavy issues, and it remains to be seen how it will react to them and what role the system houses and IT professionals will take on.

Source: Axis

 

(Visited 49 times, 1 visits today)

More articles on the topic

SECURITY NEWS

Bleiben Sie informiert über aktuelle Sicherheitsthemen – praxisnah und zuverlässig. Erhalten Sie exklusive Inhalte direkt in Ihren Posteingang. Verpassen Sie keine Updates.

Jetzt anmelden!
anmelden
You can unsubscribe at any time!
close-link