Security trends for 2013

January 2013 News & Events

What better way to kickoff the year than to look at what the industry expects to see happening in the coming 12 months? Hi-Tech Security Solutions asked a few people what they were expecting in 2013.

We break the answers down into categories below, looking at technology areas as well as security associations and system integrators. As always, we welcome any comments from our readers as to what you think will define the market in the coming year.

To make things a little more interesting, we asked our respondents to not only talk about their areas of speciality, but to offer one piece of advice they believe will be crucial to customers in the coming year.

CCTV, surveillance

Axis Communications

Roy Alves, country manager for Axis Communications says the surveillance market will see a continuation of what happened this year. He expects better WDR (wide dynamic range) and a focus on image quality in more complex lighting environments. “Another trend is low light providing colour information.” He adds that people are starting to ask about Ultra HD, x16 the resolution of 1080p (http://en.wikipedia.org/wiki/Ultra-high-definition_television). And he expects H.265 will be massive next year, assuming it does launch in 2013.

As far as buyers opting for one brand in their solutions or preferring devices from multiple vendors in a best-of-breed installation, Alves believes there will always be requirements for single branded solutions. “As Axis we will always want to offer that as a turnkey solution with one point of responsibility. However, looking ahead, third-party integration offers many advantages to the customer, allowing for best-of-breed manufactures on a single open platform.

When asked what one piece of advice he would offer customers, Alves says: “Select a focused vendor who has invested in their local regions (support, sales, RMAs and marketing). There is a lot to be said about international manufactures that have local offices in our region, it really is a long term relationship.”

Miro Distribution

Alex Bantjes, Miro’s brand manager for Vivotek believes 2013 will be an historic year for the surveillance industry, one in which we will see the tipping point in the IP vs. analogue debate.

“School’s out… IP is the way forward. This trend can be clearly seen throughout training sessions hosted by ourselves, there seems to be an ever-decreasing number of attendees that have not had some level of exposure or experience with IP surveillance products. I also believe that more IT professionals will be seen in our industry going forward.”

Miro’s MD, Bertus van Jaarsveld expects to see more high-resolution megapixel cameras being used as well as innovative camera formats such as the new fisheye cameras offering multiple views and post-event digital pan/tilt/zoom.

As to what technologies or technical implementations will stand out in the coming year, Bantjes expects new technologies such as scalable video codec (SVC) and video push technology, along with a drive towards edge-based mobile/independent recording solutions. “With new compression technologies such as SVC and increased SD card sizes, we can now get more data stored on edge than ever before.”

Van Jaarsveld says the market is finally starting to adopt wireless solutions for IP surveillance projects. “I believe we will see a marked increase in the number of large surveillance projects making use of fixed wireless networks as well as some interesting implementations with wireless mobility.”

As for good advice, Bantjes advises customers to do as much research as possible and thoroughly assess their demands.

Avigilon

Ryno van der Vyver, regional sales manager for Avigilon, Africa, also expects the “upgrade transition from analogue to high-definition surveillance systems will gain more momentum in 2013. With high-definition multi-megapixel surveillance you can cover larger areas and get amazing image detail. The systems are affordable and it is becoming much easier to effectively manage millions of pixels contained in video footage through powerful, feature rich and intuitive software that can accommodate both analogue and multi-megapixel cameras.”

He also expects the image detail available in high-definition surveillance will result in new business intelligence applications for surveillance appearing in addition to the traditional security, safety and risk mitigation applications.

Van Der Vyver also believes security systems that will stand out in the coming year will pull ideas from the gaming industry to help with ease of use. “When users interact with systems and feel engaged instead of frustrated it creates efficiencies and a positive response. I also think that the security industry will embrace discussion and the exchange of information through social media as it makes it easier for customers to rate their options.”

Van Der Vyver’s advice to customers is: “before you spend money on a large security system, request and check up on reference site installations from system integrators and manufacturers. Sales people often display the logo of all the major brands during the presentation, but establishing if they really do have a satisfied customer or one that is even aware of their claims is key to avoiding purchaser’s remorse.”

Access control and identity management

neaMetrics

Walter Rautenbach, MD of neaMetrics says, “Listening and speaking to guest speaker John Shi from A&S at the Suprema Global Partner Program a week ago only reaffirmed what we talk about every day. Distribution does not need to change, it is changing. Distributors not offering SI are dead in the water. ”

The solutions and technologies that will make a difference this year will be those that save end-users money by optimising operations. “We have seen a massive interest and growth in our biometric workforce management solutions, particularly in large outsourced environments such as guarding and cleaning services. Employers on the one hand want to minimise overtime and remain profitable, while large property investment companies, specifically in the retail environment, want to ensure they get the services that they pay for. Companies are coming to the realisation that the initial hurdles, such as capital expenditure, should not stand in the way of ongoing sustainability. Inevitably, those who can control cost will survive and those that defer the expense will find themselves losing business.”

Rautenbach supports the Software-as-a-Service (SaaS) concept that saves customers from forking out capital for software that no longer fulfils business requirements in a year’s time. “The SaaS approach, in conjunction with a licensed approach, allows us to offer our client more value. Offering hosting facilities and related services to our reseller network also puts more options in their hands to offer their end-users.”

As far as advice is concerned, Rautenbach says look at the total value of the solutions being presented. Also, always consider if the company you are deciding to buy from has the skills and capabilities to integrate and customise solutions to your requirements, and ensure that you and your suppliers’ definition of integration is the same.

HID Global

Robbie Truter, area sales manager for HID Global SA expects to see a converged credential in a single card, which could be an ID badge that enables the user to get into the building, log onto the network and gain secure access to the applications and other systems they need. They can also use the card to gain remote access to secure networks, replacing the need for a one-time password (OTP) token or key fob. “A converged credential is more convenient for users, negating the need to carry multiple devices or re-key one-time passwords. It also provides greatly improved security, by enabling strong authentication throughout the IT infrastructure on key systems and applications, rather than just at the perimeter.

“We also see the adoption of mobile access using NFC technology. This is the use of smartphones with NFC to open doors and other applications that would emulate the card environment, but with the convenience of a phone. People lose their cards and keys, but never leave their home without their phone.”

This requires rethinking the way physical access credentials are managed. Traditionally, the card and the credential have been inseparable. However, to accommodate the mobility of that credential, it must be decoupled from the container. In other words, it must be possible to manage the credential independently of the physical device on which it is stored. As a result, organisations needed to be able to manage their users’ access, and quickly add and remove users from the system, without having to physically control or touch the device.

What matters to customers, says Truter is that an holistic, coordinated approach makes sense, physical and virtual security have traditionally taken place in two different domains, with very little visibility into what the other is doing. The more these groups work together, the better they understand the role each plays and the better the overall access experience and security. Ultimately, the goal is to come together and deliver a single access solution, with strong authentication, that is convenient for end users and cost effective to deploy and manage.

Impro

Impro’s sales manager, Linda Glieman believes one of the biggest trends will be around ease of entry without compromising security, and more Web-based solutions. Also critical this year will be the ability to provide a product platform that has a strong integration ability to ensure that a company’s total security requirements are met. This extends to the ability for systems to integrate into a single monitoring platform/front-end which ties all aspects of access control together.

“The consistent adoption of the use of biometrics for access control will continue to stand out in 2013. As installers are gaining more experience in the field of networks, IP based solutions will become more demanding, eliminating the need for long cabling runs and reducing labour time to install.”

Glieman’s advice for 2013 is to carefully consider the installation best practice used by the installer. “Customers must ensure the installers are accredited to supply and install the required solution in order to gain the most effective ROI and ensure their ability to provide an excellent maintenance contract backed up by good local support and repair service from the manufacturer. Customers must also carefully consider what warranty is supplied locally by the manufacturer and the technical support infrastructure in place to support the solution.”

System integrators

Camsecure

Francois Malan, MD of Camsecure thinks open platforms are where it is at in 2013. “Integration will be a trend for the next five years. Business intelligence, information, asset registers and the like are becoming big news in the market. I do not believe that true cloud-based solutions, but rather hybrid solutions, will be a trend. I also do not believe that high megapixel cameras will be as big news as expected.

“I anticipate that we will see more intelligence in cameras, whereby they will be making the decisions in real-time. People want pre-filtered data, not to have to screen hours of recorded footage. They need immediate processing via cellphone, tablet or laptop. Video processing and analytics with edge storage will also reduce the pre-supposed acceleration and popularity of cloud-based storage.”

Good advice for customers, according to Malan is “Do not be bedazzled. Look at international standards and broadcast standards instead of only considering proprietary brands that do not match global trends. Do not buy into a closed solution. Adopt multiple innovations.”

Jasco Security Solutions

Marius Maré, CEO, Security Solutions, Jasco Industry Solutions says system integrators (SI) will face “more IT and network related challenges as we see a definite move towards IP-based integration. Customers are now opting for a more integrated system solution and not only for CCTV and access control solutions.”

He says the increases in the use of TCP/IP platforms (including wireless) are happening for the following reasons:

* Most buildings have an IP platform already and make use of a WAN.

* PoE – Power over Ethernet, doing away with more hardware.

* Maintenance more cost effective, and

* Fault finding faster and easier.

When looking at technologies that will stand out, Maré has four expectations:

* IP solutions will continue to grow in 2013.

* Bringing the security, BMS and energy management onto one platform and sharing data on the WAN or cloud technology.

* More integration will be seen of products into third-party solutions.

* We have experienced an increased demand for thermal detection and satellite detection systems.

Maré’s advice for users is to choose a supplier, consultant and SI that listen to your requirements and challenges.

UTM

Kelly McLintock, CEO of UTM says the shift from analogue to IP is going to be the trend in 2013 along with more business for thermal camera vendors. He also expects edge-based storage, compression and very high megapixel cameras to capture the headlines.

Additionally, he believes the economy will play a major role in the decisions around OEM or multi-brand implementation decisions, “but we have seen a major shift to single brand solutions”.

McLintock advises customers making decisions around security to spend more and not to try to cut corners. “It may save money immediately, but in the mid to long term it will cost you.”

Fire and safety

UTC Fire & Security

A UTC Fire & Security spokesperson says that while the economy has not stabilised fully yet, there is the possibility of an increase in government projects, but there will be continued pressure on integrators to decrease prices to remain competitive. The knock-on effect of this is that companies may be forced to downsize and some may even close. Despite this, there remains a serious technical skills shortage in South Africa.

With the proliferation of smartphones and tablets there will be a big move towards mobile applications in 2013. This will cover all sectors including intrusion, CCTV, access control and fire detection.

The company advises customers to take a long-term view, even though it is often difficult. Customers should focus on investing in quality products that have been certified by recognised authorities. The total cost of ownership will in most cases benefit from a higher initial investment.

Alarm and intrusion

Elvey Security technologies

Ingo Mutinelli, sales manager at Elvey sees some significant changes in this market. For one he sees more acceptance of wireless solutions as the technology has proven its stability and has a full feature set.

Visual verification through intruder products is another key area for Mutinelli. He expects to see many more panels offering visuals to accompany an alarm to allow the homeowner or response company to first identify the problem before dispatching a guard. This market will grow along with the increased use of the cloud, allowing home or business owners to receive real-time images of their premises via their tablets or cellphones.

As far as integration is concerned, Mutinelli says we are already seeing many previously independent security functions coming together. This includes video verification, as mentioned, but also other features such as alarm outputs on DVRS and so forth. He says customers want a single solution that does everything from one vendor. That way there can be no question of who gets the call when something goes wrong.

His advice for customers is to stick with reputable distributors and brands, there is a reason they have been around for so long. The bottom line is, “you get what you pay for”.

Tyco Security Products

Ernest Mallett, regional sales manager, sub-Saharan Africa for Tyco Security Products says a big influence in this space for next year will continue to be wireless alarms/intrusion systems as additional functionalities are added and the underlying technologies continually improve.

“With residential wireless, new introductions will continue to satisfy consumers’ growing desire for mobile accessibility to all the systems in their home. For example, bi-directional wireless technology allows consumers to be able to access their residential alarm panel from anywhere – their office computer or smart phone. Video verification will be the next evolution in this area.

“The commercial side of wireless intrusion is really coming into its own thanks to improved battery life, reliability and security of the system itself,” Mallet says. “Today’s systems have 128-bit AES encryption to prevent the wireless signal from being sniffed or hacked, so the signal cannot be overtaken through the air. New commercial systems also have increased range for longer distances between panel and sensor without the use of repeaters and better noise immunity from interference from other appliances or systems.

IP communications & network technology

Duxbury Networking

Andy Robb, chief technology officer at Duxbury Networking says virtualisation is and will continue to be the biggest technology influencer in 2013. “That said, virtualisation will evolve from what we have seen up to now, which has been data centre focused, to more innovative applications of virtualisation.

“Virtualisation of the desktop, for instance, will be used to increase productivity and bring down costs. Virtualisation technologies will also be applied in the video surveillance and security arena, with new apps being made available to allow, for example, the immediate capture and playback of video footage on handheld devices including smartphones and tablets.”

He adds that the most important technologies of 2013 will be those designed to make our every-day lives easier.

“We can also expect a proliferation of green technologies and the use of electronic devices to monitor, model and conserve the natural environment and resources. New technical implementations will be used to underpin sustainable energy generation technologies such as photovoltaic, wind turbines and bioreactors for natural gas production.”

Robb’s advice to customers is, “ensure that your computing requirements have been correctly specified by an appropriately qualified and experienced consultant and match them to a solution that is best suited to your application, now and in the future. Do not allow yourself to fall victim to an enthusiastic sales pitch that is without substance and foresight.”

Associations

ESIA

Anthony Rosenbaum, director of XtraVision and chairman of ESIA sees change happening for the security industry in 2013. “With the draft Amendment Bill about to be promulgated, I believe that the electronic industry is going to have to change, whether we like it or not. At present the electronic security industry is as fragmented as it has been for the past several years. With new legislation and perhaps a more concerted effort by the regulatory authority to control the industry, companies and individuals will have to start thinking seriously about becoming part of the industry.

Therefore, as the Electronic Security Industry Alliance (ESIA), which falls directly under the Security Industry Alliance (SIA), which already has a sound working relationship with government, a move to ESIA by the general electronic industry would give more credence to these companies and individuals in terms of becoming fully fledged members of the electronic security industry,” says Rosenbaum.

“Government will certainly become more involved in the electronic security industry over the course of 2013 and into the future. However, it is still premature to assume that their involvement will be in a positive way, as much as we would like it to be,” he continues.

“I would like to see far more co-operation between the various security associations; however, until personal agendas and other issues between individuals are ironed out, co-operation is going to be a hard nut to crack. I do, however, remain cautiously optimistic because when government and the regulatory authority start applying pressure, there will not be too many places to run to.”

SASA

Jenny Reid, MD of iFacts and president of SASA has a similar view on the Amendment Bill, noting that it is a serious concern for business. Most people in the industry thought it had been sent back for more work, but it is actually under consideration. The question of foreign ownership is confusing since most of the large guarding companies have some foreign ownership and there is no clear reason for the sudden turn against them.

Reid says PSIRA, the minister and industry need to work together to make the private security industry work. Arguing will not reduce South Africa’s high crime rate or create a better life for everybody.

SASA is determined to work more closely with PSIRA to find ways of more effectively dealing with non-compliant and unregistered companies. Reid says the move to compliance must come from within the industry as well as from consumers of security services who need to be educated as to the benefits of only hiring compliant suppliers.

Once again, Reid agrees with Rosenbaum in that the industry has personality clashes which often prevents it acting in concert. However, she says SASA is focused on supporting any company that is compliant with PSIRA regulations.

Information security

Holton and Associates

When it comes to trends in the information security market, Jonathan Holton of Holton and Associates, Bitdefender distributors, says the talking point will be using the cloud for antivirus, especially for the smaller SME customers. Cloud systems will perform the same functions as the traditional server/client security system. A benefit of this is that the installation and setup of cloud solutions can be done by lesser-qualified technicians, especially because SQL database systems are not required.

The jury is out on Windows 8 and Holton expects more installations on Android for Bitdefender.

For users looking at information security solutions, Holton advises to trial the top-rated products by AV-Test.org. “There are too many viruses hiding on data that is supposed to be protected and other antivirus systems can easily be checked to see if viruses have leaked through. One does not easily achieve the top spot without vigorous testing.”

Magix Security

Hedley Hurwitz, MD, Magix Security sees the biggest trend coming from online apps. “We are very rapidly moving away from installing anything on our workstations because it is a pain to have our functionality and data tied to a physical location, and because it is a pain and endless costs for corporations trying to administer and secure what sits on our workstations. And if you securely store your data in the cloud, you never have to worry about backups or rebuilding your workstation after a crash. More applications will be ported to the cloud to take advantage of these new technologies.”

Cloud and mobility will keep growing and eating up traditional revenue streams and all related security solutions and systems will become even more critical to business risk management in the coming year.

“Making sure you, or your employee, is the only one who can access approved content, puts more burden and emphasis on the authentication process. First there is a growing need to secure device access. Once the device is authenticated, we need to confirm the identity of the user. I believe the adoption of biometric identity management is set to grow rapidly because, at the moment, we do not authenticate, we approximate. Whether we use passwords, PIN codes or two-factor authentication, all of these only assist in approximating identity, not authenticating. Biometrics is the only reliable and viable option.

Hurwitz’s advice for 2013 is a recommendation that customers do not make big capital investments in hardware or software. “Technology is moving too fast for any of us to predict the value of an asset a year ahead. Rather find the products and services that let you pay, and measure value, as you go. Obviously, whatever path you choose you have to ensure that you invest in the most appropriate security solution. It is time that companies invested in a security environment that meets their risk profile and is not based on an IT budget.”



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
Linear heat detection (LHD) from Technoswitch
Technews Publishing Technoswitch Fire Detection & Suppression Products & Solutions Fire & Safety
SecuriHeat LHD by Securiton prevails where conventional fire detectors reach their physical limits. It copes well with extreme temperatures and constantly high atmospheric humidity, while precise measurements are also possible when corrosive gases and contaminated air are present.

Read more...
From the editor's desk: A burning issue
Technews Publishing News & Events
      Welcome to the first publication from SMART Security Solutions devoted to the fire industry. In the BMI report, sponsored by the Elvey Group, released earlier this year, fire was the smallest component ...

Read more...
Effective fire and smoke detection using cameras
Hikvision South Africa XtraVision SMART Security Solutions Technews Publishing Dahua Technology South Africa Fire & Safety
Video analytics, spurred on by advances in image processing, enhanced fire and smoke detection capabilities while significantly reducing false alarms in surveillance cameras. Today, AI has further improved accuracy and minimised false alarms.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Onyyx wireless alarm
Technews Publishing Editor's Choice Smart Home Automation
IDS has introduced Onyyx, a wireless alarm system engineered to provide complete system control via the Onyyx app or keyring, as well as seamless installation.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
From the editor's desk: Keeping them out, keeping you aware
News & Events
Alarm, intrusion, and perimeter protection have been part and parcel of South African society for years. Many years ago, a home alarm consisted of wires covering one’s windows, which caused an alarm ...

Read more...
Intrusion Selection Guide 2024
Technews Publishing Perimeter Security, Alarms & Intruder Detection
The Intrusion Selection Guide 2024 includes the latest products and solutions aimed at small, medium, and large operations that require reliable, easy-to-install, set-up, and use intruder detection technology that reduces false alarms but never misses an actual event.

Read more...