What is on the Horizon?

What is on the Horizon?

The security industry has a long history of pushing the technology envelope. Whether taking quantum leaps or building incrementally on past achievements, we’re in constant forward motion. While no one can guarantee how that will play out in 2021, here are a few observations about where I think we are going.

MEETING NOVEL CHALLENGES WITH NOVEL SOLUTIONS

Technology continues to advance at an accelerated pace. Software and hardware are being integrated in novel ways to create smarter solutions. We are seeing more solutions being designed to serve multiple purposes from safety and security to business operations. What’s driving these trends? Some of the impetus is simply the natural evolution of technology and the fiexibility that networks offer. Another thing spurring innovation is the need to respond to crises. As the well-worn adage says, “Necessity is the mother of invention.” COVID-19 is no exception. During 2020, many IP devices— originally designed for security—have been integrated with other technologies and put into service in new ways.

For example, hospitals using IP cameras and networks to scale their ability to visually monitor patients remotely, ef- flciently manage resources and rapidly respond to emergencies. They are using audio and object detection analytics to recognize a patient in distress from a fall, injury or other difflculty, and expedite lifesaving response. They’re using in-room video cameras to monitor patient vital signs remotely through integrated telemetry systems. In today’s COVID world, this greatly decreases the frequency of inperson encounters between patients and medical staff thereby reducing exposure and the risk of transmitting the virus— and ultimately improving healthcare outcomes.

COVID-19 will continue to have a major impact on how the world operates in the coming year. To help their customers remain safe and protected in this new reality, security professionals will flnd themselves creatively adapting traditional surveillance and security devices to new roles and employing new technologies–offering solutions for touchless entry, social distancing and virtual interactions designed to contain the spread of the virus. With lessons- learned and resourcefulness in mind, technological advancement, integrated network solutions, and future challenges will increasingly create opportunity for IP solutions to add value.

OVERCOMING ERODING TRUST IN INSTITUTIONS AND TECHNOLOGY

It is no secret that trust in business, government, media and NGOs has been eroding for a while. Trust comes in many forms: being an honest and transparent partner, standing behind your products and following a consistent business model. Furthermore, it’s crucial to deliver products that can capture, process and store data responsibly and protect against cyberattacks. This starts with forward-thinking and best practices in the design, development and testing of products in order to minimize risks.

As security professionals, we need to embody a strong business ethic, one that resists corruption, demonstrates social responsibility, and personifles good global citizenship. We must manage that flne line between protecting individual privacy and providing sufflcient surveillance to make the community feel safe and secure in public and private environments. It is a dynamic landscape that that requires navigating changing attitudes and regulations both within the United States and across the globe.

DRIVING NEW APPROACHES TO CYBERSECURITY

As the technology ecosystem continues to expand, so, too, does the threat landscape. With an exponential growth in connected devices, the need for heightened cybersecurity measures is more important than ever. This has led to some important trends in the areas of zero trust networks, layered cybersecurity, lifecycle and device management and OEMs.

Zero trust networks. To counter the high risk of a permeable network, companies are adopting the philosophy of “never trust, always verify” everyone and everything trying to connect to their systems, before granting access. In zero trust networks, the identity of an entity is veri- fled multiple times in different ways, depending on its behavior and the sensitivity of speciflc data in the network being ac cessed. Network micro-segmentation lets businesses apply varying levels of security to specific parts of the network where more critical data resides. Granular network perimeter security – based on users and devices, their physical locations, and other identifying data – determines whether their credentials can be trusted to access the network.

Layered cybersecurity. Another trend gaining traction is hardening a device’s operating core where sensitive information such as end-user data, log-in credentials and network access certificates reside. In the coming year, I expect more manufacturers will be incorporating chipsets encoded with protective features like device identification to prevent port hijacking, secure boot and signed firmware checking to prevent unauthorized or malicious downloads. They’ll be implementing a more layered approach to cybersecurity so that each layer of hardware and software shields the layer below with additional security features. To further reduce cyber vulnerability, we’ll see more manufacturers automating procedures to ensure that customers implement changes, upgrades, and patches throughout their ecosystems in a timely manner.

Device management and lifecycle management. Two other aspects of cybersecurity coming to the forefront are individual device management and comprehensive lifecycle management of the entire surveillance solution. With cyberattacks becoming increasingly numerous and sophisticated, it’s becoming even more important for manufacturers, integrators and end users to work together to institute consistent hardware, software and user policies that conform to cybersecurity best practices and continue over the lifetime of the ecosystem and its individual components.

Fewer OEM relationships. OEM partnerships will become less common as it is difficult for the end-user to know the real manufacturer, which is a must for valid cybersecurity processes.

SHIFTING MORE COMPUTING TO THE EDGE

Billions of devices are already connected to the network and this number continues to increase exponentially. With all that potential computing power at the edge, there’s more momentum for manufacturers to harness that in-camera resource to help customers detect and identify threats, and make split-second decisions on how to mitigate them.

Driving the move to edge-based processing is the opportunity for customers to reduce system complexity and lower their operating costs. They can build faster and more scalable systems, and facilitate more complex, real-time analysis of events at the point at which they occur, which can lead to more timely response to incidents.

In the coming year we’ll likely see more powerful edge devices embedded with deep-learning processing units (DLPU). These devices will provide a perfect platform for third-party developers to create analytics based on AI and deep learning that can provide more granular object classification and more predictive behavior analysis. Furthermore, because these deep learning programs only transfer relevant video over the network, customers will be able to lower bandwidth consumption and reduce their storage needs. With the improvement in analytics accuracy, customer will also experience fewer false alarms which will lead to additional cost savings and more efficient use of human resources.

REACHING FOR MORE PREDICTIVE ANALYTICS

Inspired by the way the human brain processes information, manufacturers will continue the trend of building cameras embedded with deep learning processing units. Developers will be able to use these DLPUs to improve the reliability of their video analytics algorithms and enhance surveillance, security and business processes.

These deep learning tools correlate the massive amount of data collected by devices and sensors to train the analytics to better recognize patterns, classify information and make decisions by labeling and categorizing what the camera sees. While it will still take some discernment on the part of customers and integrators to separate hype from fact, the opportunities for deep learning solutions will rise as the technology matures. With continued investment in refining this learning process, I expect we’ll see dramatic increases in video analytics accuracy, and a demand for these solutions, in the coming years.

BRIDGING THE EDGE AND CLOUD COMPUTING DIVIDE

As we look towards 2021, with more processing power available in edge devices, hybrid computing solutions will become an emerging trend. Companies will be looking to implement smart architecture that directs processing tasks across the edge, core, and cloud to wherever it makes the most sense. These multi-tiered solutions will give customers the flexibility to deploy and manage their ecosystem more efficiently and more cost-effectively. The traditional client-server model alone presents limitations, inefficiencies and network performance issues due to centralized cloud servers that must respond to a multitude of device requests.

Leveraging a hybrid edge-cloud model—where central and edge computing resources are combined—can reduce cloud hosting costs, bandwidth and latency issues. With more powerful devices companies will be able to take better advantage of processing at the core, the cloud and now, the edge—essentially where another server can process significant amounts of data on the device.

As an added benefit, edge devices offer an unparalleled level of built-in cybersecurity features. Many of these devices can be managed with on-premise tools that allow users to perform device configuration, back up, firmware upgrades and manage cybersecurity controls—ensuring a greater level of security than cloud environments.

MITIGATING RISKS AND CAPITALIZING ON OPPORTUNITIES

As in past years, the security industry will have its hands full mitigating the risks of cyberattacks, navigating regulations on privacy, information collection and storage, and meeting customer demands for tools that can help them be more proactive in protecting their people, property, and electronic data. But with each challenge there comes new opportunity to devise new technologies and solutions to create a smarter, safer ecosystem that can better meet customers’ security and business needs.

This article originally appeared in the November / December 2020 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3