Security technology trends to watch in 2014

Industry experts discuss what lies ahead for physical security devices and software


Powerful video encoder solutions today start at just $80 per channel. We expect that more and more end users will be prepared to work with their integrator partners to build these migration strategies that provide some of the benefits of IP today while preparing for when their analog cameras fail or they have the budget to upgrade to network cameras – and the vastly improved image quality, usability and intelligence they bring.

4. Moore’s Law lives on as vision gets even better. In the last two years, we’ve seen dramatic imaging improvements in IP cameras thanks to the predictable innovation curve known as Moore's Law. IP cameras can see color in near darkness without supplemental lighting and through both blinding light and into dark shadows thanks to improved Wide Dynamic Range technologies. They also continue to deliver entertainment-quality video (HDTV and better) across all different form factors – from PTZ domes to covert pinhole cameras. These imaging innovations that were first launched in high-end surveillance cameras will continue to move downstream in 2014 and become more affordable for all installations as the technologies have become more established. We have Moore’s Law to thank for that. 

5. Spotlight on cybersecurity as IT involvement continues to grow. Toward the end of 2013, Axis put the finishing touches on a research project that examined the involvement of IT professionals in their company’s video surveillance initiatives. The research, which was conducted by the Enterprise Strategy Group, showed that 91 percent of IT pros surveyed claimed they are involved in surveillance to some degree. It’s clear that their influence on surveillance projects is growing, specifically at mid- and enterprise-sized organizations, and common IT best practices like cloud storage replication and using data for business intelligence are impacting surveillance projects.

As IT becomes more involved, the topic of logical security will grow. With cyberattacks garnering more and more attention across the globe, integrators will be tasked to prove that their IP-based surveillance systems will meet IT’s security criteria, as well as their bandwidth, resiliency and quality parameters. In 2014, it will be important for integrators and physical security practitioners to understand IT’s concerns and help them overcome any hesitation through proper network optimization and cyber security measures. The good news is that today’s professional IP video devices can be optimized to limit bandwidth disruption and come with the same exact IT security protocols as any other node they would put on their network. 

Access Control    

Predictions from John Fenske, vice president of product marketing identity and access management, HID Global:       

1. Increase in demand for more secure, open and adaptable solutions. As the security landscape continues to evolve in new and complex ways, progressive organizations and thought leaders are adopting a new attitude about change, and viewing it as an opportunity for improvement and value rather than an interruption or distraction. 

Proactively making changes today will ensure that an organization’s access control solution can adapt to future threats and take advantage of opportunities and applications beyond access control.  Future high-value applications might range from cashless vending, time and attendance, and secure print management to secure network logon as part of a fully interoperable, multi-layered security solution across company systems and facilities.  By using solutions that are based on industry standards such as OSDP bidirectional communications, and incorporating dynamic rather than static technologies, security becomes independent of hardware and media, and the infrastructure can more easily evolve beyond current abilities with the adaptability to combat continuously changing threats.    

The industry is still evolving, however, as not everyone shares this attitude.  In a survey of integrators and users, HID Global found that less than 50 percent have upgraded their systems in the last year, and more than half have not upgraded in the past three years.  Respondents were given a list of top technology best practices, and while 75 percent felt they were important or very important, half felt they were not implementing them well or at all.  Similarly, 93 percent agreed that a list of top policy best practices were important or very important, but nearly 40 percent said they were not implementing them well or very well.  We expect these numbers to shift as strategies for change become better understood and the industry embraces the opportunities that change can bring.