Global security industry adopts servistisation models

Issue 1 2020 Integrated Solutions

An increasing need for niche security solutions, rapid advancements in technology, and budget pressures are driving the security industry to explore innovative ‘as-a-service’ business models. In the end-user space, new business models such as Screening-as-a-Service, Biometrics-as-a-Service, ISR-as-a-Service, and Infrastructure-as-a-Service are gaining traction.

“The ‘servistisation’ of the security market is paving the way for the network effect and hybrid business models, not necessarily based on cloud applications, but offering a mix of hardware scalability, limited cost of ownership and controls to clients, such as pay-as-you-grow,” said Aravind Srimoolanathan, research analyst, Security, Frost & Sullivan. “Incumbents providing solutions through conventional means will face competitive pressures from innovative substitutes, which will lead to merger and acquisition ventures and market consolidation.”

While end-user security strategies are evolving, suppliers are increasingly focused on providing solutions that unify and secure processes throughout various applications. However, given the complexity of the ecosystem and the number of processes involved, Srimoolanathan predicts customers are likely to continue using multiple vendors for different solutions.

To capitalise on further developments, players should focus on:

• High-interest end-user business models such as Security-as-a-Service, which solves long-pending issues like affordability, ease of operations, and significant after-sales maintenance costs.

• Developing niche AI cloud security solutions through hyper-configurable business models.

• Security data analytics, which is important among end users (private and government) to understand the return on investment of security investments.

• Niche technologies that are key growth areas, including Identity Management-as-a-Service, Video Analytics-as-a-Service, Electronic Surveillance-as-a-Service, and Cyber-as-a-Service.

“Although as-a-service solutions offer a more customer-centric approach to security, challenges still exist relating to measurement criteria and pricing,” noted Srimoolanathan.

Frost & Sullivan’s research, ‘Evolving Business Models in the Global Security Industry’, discusses the industry initiatives currently being pursued for security process efficiency, cost optimisation through new business models, the impact of digitalisation, and the overall impact on the value chain.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Cost-effective and reliable remote connectivity
Agriculture (Industry) Integrated Solutions Infrastructure
Companies that operate in hard-to-connect areas now have access to reliable connectivity due to a collaboration between MTN South Africa, Vox and Tarana technology.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
Using advanced surveillance technology as a smart city enabler
Duxbury Networking Integrated Solutions Surveillance
Smart cities are increasingly becoming a focus area for African governments and companies. However, the transition to these environments does not come without challenges, especially when it comes to security and resource management.

Read more...
SMART Estate Security returns to KZN
Nemtek Electric Fencing Products Technews Publishing Axis Communications SA OneSpace Technologies Editor's Choice News & Events Integrated Solutions IoT & Automation
The second SMART Estate Security Conference of 2024 was held in May in KwaZulu-Natal at the Mount Edgecombe Estate Conference Centre, which is located on the Estate’s pristine golf course.

Read more...
Dynamic Dashboard enhances security and operational efficiency
Suprema neaMetrics Products & Solutions Integrated Solutions Residential Estate (Industry)
In today’s data-driven world, security systems are overwhelmed by an unprecedented volume of data, from video surveillance and access control logs to intrusion alerts and a variety of IoT sensor data.

Read more...