Tough with opportunities

1 February 2017 Surveillance, Information Security

It is expected that cyber security breaches and crimes will dominate the headlines; especially with the fast-growing list of new, innovative threats, like fileless malware, dronejacking and the continued evolution of malware. The exploitation of IP cameras as a backdoor will also prove challenging, with ever more secure security policies being implemented. The alignment of internal security systems to IT processes will continue, stimulating IP sales.

However, the electronic security landscape will be sure to provide its own challenges that require smart, innovative use of technology to address security and business management concerns effectively. Integration will remain a key aspect, converging multiple subsystems into a converged powerhouse of intelligence and forensic data, most likely including SIoT (Security Internet of Things).

Marius Stoop, sales manager.
Marius Stoop, sales manager.

What will make an impact?

• The current product curve is peaking, with excellent products across many levels, allowing one to meet solution requirements and the price sensitivity of some markets. Big data and cloud storage should offer some storage alternatives in the near future. SIoT, the excitingly anticipated marriage between IoT and electronic security brings with it an expectation of virtually endless possibilities.

• The projects environment should be ready to embrace a more open platform architecture (less proprietary) driving compatibility, integration, cloud presence and convergence.

• While the mid to lower tiers will be more interested in (more proprietary) boxed solutions, many top camera manufacturers are now offering entry to mid-level head-end software and solutions, and vice versa for some head-end manufacturers.

What about the economy?

• Bleak forecasts, political turbulence, electricity and water supply constraints are seen in some crystal balls, one should protect against these by remaining steadfast in a strong business strategy and focus on the execution thereof.

• A slightly stronger version of 2016 could be expected. Growth has to be driven by offering the customer value to invest in outcomes-based solutions and good ROI with a suitable TCO.

2017 will undoubtedly be as challenging as any. With most companies undergoing consolidation of one kind or another, the product and service offering will be funnelled into a high concentration of a few strong contenders.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI human detection cameras vs outdoor detectors
Provision ISR SA Surveillance
The advancement of technology has revolutionised many aspects of security systems, notably in the transition from traditional outdoor alarm detectors to modern, AI-based, human-detection IP cameras, which offer many benefits.

Read more...
Safeguarding farmland with digital solutions
Axis Communications SA Surveillance
Marlenique Estate, located in the Western Cape, opted for an Axis end-to-end solution to protect its premises with access management, remote monitoring, and property and asset protection.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
Cutting costs and enhancing security
Secutel Technologies Surveillance
[Sponsored] Visual verification, powered by the Secutel Visual Verifier, detects and verifies intrusions and physical attacks and ensures comprehensive protection in areas where high-value losses are at risk.

Read more...
Supercharge surveillance with AXIS Camera Station Pro
Duxbury Networking Surveillance Products & Solutions
Designed to put efficient surveillance at users’ fingertips with an intuitive interface that is easy to operate, AXIS Camera Station Pro 6.2 provides a customisable video management and access control solution for companies of all sizes.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...
New tools for investigation and robust infrastructure security
News & Events Information Security
Cybereason continues to enhance its security platform, with recent updates introducing improvements in file search operations, investigation query results, and cloud workload protection, providing more granular data and faster key artefact identification.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...