Posts Tagged :


Six disruptive trends that will shape physical security in the next five years

960 640 Stuart O'Brien
Physical security is on the cusp of significant change, driven by a confluence of technological advancements and evolving threats. In the coming five years, several disruptive trends are poised to reshape how physical security is managed, offering both challenges and opportunities for businesses and security professionals. Here are the key trends and their potential impact on the UK’s physical security market, based on input from delegates at the Total Security Summit…

1. The Rise of Artificial Intelligence and Machine Learning

One of the most influential trends is the integration of Artificial Intelligence (AI) and Machine Learning (ML) into security systems. These technologies are transforming traditional security measures into more proactive, intelligent systems. AI and ML enable advanced analytics of surveillance footage, allowing for real-time threat detection and predictive analysis. The introduction of facial recognition technology, despite its regulatory and ethical debates, is set to enhance the capabilities of security operations, particularly in high-risk or densely populated areas. For more on this, see our Loss Prevention article here.

2. Internet of Things (IoT) and Smart Security Solutions

The proliferation of IoT devices is revolutionising the physical security industry. Smart security solutions, such as connected cameras, sensors, and access controls, are becoming more commonplace. These devices provide a wealth of data that can be analysed to enhance security measures, predict potential breaches, and automate responses. However, the increased connectivity also presents new vulnerabilities and underscores the need for robust cybersecurity measures in physical security systems.

3. The Advent of Autonomous Security Robots and Drones

Emerging technologies like security robots and drones are beginning to find their place in the physical security market. Over the next five years, these technologies are expected to become more sophisticated and widespread. Drones, for example, can offer aerial surveillance that is not feasible with stationary cameras, while autonomous robots can patrol areas, providing a physical deterrent to criminal activities.

4. Increased Focus on Integrated Security Solutions

There is a growing trend towards integrated security solutions that combine physical security with cybersecurity. With the increasing convergence of physical and digital threats, an integrated approach is becoming essential. This trend is driving the development of comprehensive security platforms that seamlessly combine surveillance, access control, cybersecurity, and other security components.

5. Sustainability in Security Practices

Sustainability is increasingly becoming a consideration in physical security solutions. The next five years will likely see a greater focus on energy-efficient security systems, sustainable practices in security operations, and eco-friendly technologies. This shift not only aligns with broader environmental objectives but also caters to the growing demand for green practices in business operations.

6. The Impact of Remote Working and Flexible Workspaces

The shift towards remote working and the growing popularity of flexible workspaces are changing the dynamics of physical security. With fewer employees on-premises, there is a need for adaptive security strategies that cater to fluctuating occupancy levels. This trend will likely influence the demand for scalable and flexible security solutions that can be adjusted based on real-time needs.

The physical security market in the UK is set to undergo significant transformations in the next five years. Driven by technological innovations and changing threat landscapes, these disruptive trends will redefine the ways in which physical security is approached. Businesses and security professionals must stay abreast of these developments to ensure effective, modern, and sustainable security solutions in the face of evolving challenges.

Photo by Tuesday Temptation on Unsplash

From AI to ESG: Key security-technology trends of 2023

960 640 Guest Blog

Johan Paulsson, Chief Technology Officer, Axis Communications, explores the six key technology trends that are set to impact the security sector in the coming year…

Technology is pervasive in every aspect of our personal and work lives. Every new technological development and every upgrade brings new benefits, makes the tools we rely on more effective, and creates stronger, more efficient services. But as technology’s integration into society deepens, awareness of its implications is becoming more heightened.

Ours is an industry making use of increasingly intelligent systems with technology inherently involved in collecting sensitive data. It is also an industry that is as impacted by geopolitical issues affecting international trade as any other sector. Security innovations will absolutely create a smarter, safer world, but in 2023 we will need to evolve to keep pace with these trends – all while moving fast to exploit new technological opportunities.

A move towards actionable insights

“From analytics to action” will become a mantra for 2023. AI and machine learning may have aided the development of advanced analytics in recent years, but the focus moving forward will be on exploiting the actionable insights they deliver.

The huge increase in data being generated by surveillance cameras and sensors is a key driver for this transition. It is impossible for human operators to interpret the nuances of large data sets and act quickly enough, but analytics and AI functionality can now recommend, prompt, and even start to automatically take real-time actions which support safety, security, and operational efficiency in every key vertical.

Analytics can support new methods of post-incident forensic analysis using, for example, assisted search to automatically find desired video among massive silos of camera data. New techniques will also be used to predict outcomes, using sensors to propose preventative maintenance actions to minimise potential industrial outages before failure occurs.

The rise of case-defined hybrid architectures

Advanced analytics can run directly within surveillance cameras on the edge of the network. After-the-fact analysis, though, is a job for on-site servers or the cloud. Building the ultimate data analysis solution demands a hybrid computing architecture – and one which meets a customer’s requirements precisely.

There is no perfect off-the-shelf configuration. Each business must assess its specific use case and define the hybrid solution that will meet its needs. This process is complicated by localised requirements around data privacy and retention, which can force the use of on-premises storage over the convenience of the cloud, but architecture refinements are an essential part of any 2023 technology strategy. Businesses must maintain the flexibility to create the hybrid architecture best suited to their specific needs – architecture which can change as demand and future trends dictate.

Exploiting functions beyond security

Security hardware can present an opportunity to do more. Cameras themselves are powerful sensors capturing both quality video information and, thanks to advanced analytics, metadata which makes them useful in new and novel ways.

Camera metadata can be combined with input from other sensors – monitoring temperature, noise, air and water quality, vibration, weather, and more – to create an advanced sensory network and enable data-driven decisions. While we’re beginning to see this kind of multi-sensor monitoring appearing in industrial and data centre environments, the eventual use cases are limited only by our imaginations – and platform-agnostic data streams enable bespoke applications for any use.

The emergence of cybersecurity sub-trends

In the video surveillance sector, ensuring the authenticity and privacy of every data stream as it moves from camera to cloud to server is essential to maintain trust in its value. Cybersecurity is as vital today as it has always been, but 2023 will see a more proactive approach by technology vendors in identifying vulnerabilities, with bug bounty programs becoming even more commonplace to incentivise external parties to take a white hat approach.

Customers will also increasingly expect transparency regarding the cybersecurity of security solutions, with a Software Bill of Materials (SBOM) becoming standard in assessing software security and risk management.

Sustainability always, climate change at the forefront

Aside from cybersecurity, the requirement for organisations to measure and improve their environmental, societal, and business governance practices remains essential – and all of these aspects will come under increasing scrutiny from customers of security and safety solutions.

Given the extreme conditions of the past year, expect a more acute focus specifically on addressing climate change in 2023. While organisations might make great efforts to reduce emissions from their own operations, these can be undermined if their upstream and downstream value chains are not aligned with the same targets.

Tech companies will also be expected to demonstrate more clearly the ways their products and services support the sustainability goals of their own customers, creating novel and intelligent efficiencies that also help those organisations reduce emissions.

An increased regulatory focus

The compliance goalposts move regularly, and often with great speed. Each new regulation ratified brings a different aspect of software or hardware into focus. The European Commission’s proposed AI Act[1], for example, aims to assign specific risk categories to uses of AI, and will no doubt be the subject of much debate before it becomes law.

But whether in relation to AI, demands surrounding cybersecurity, data privacy, the influence of ‘big tech’, or tech sovereignty, it’s clear that technology companies in the security sector will increasingly need to adhere to more stringent regulations.

Key targets for 2023

2023 is not a year of great upheaval – it’s one of realignment. Our sector’s greatest opportunity continues to come from focusing on commercial success in tandem with our responsibility to address the critical issues facing the planet and its population. By working together towards a common goal, the combination of human inventiveness, advances in technology, and ethical business practices can be combined to make the world a better place.

Learn more about Axis’ trends for 2023.

About The Author
Johan Paulsson is an old hand in the Swedish tech scene, having been COO and head of R&D at Ericsson Mobile, and COO at Anoto. He joined Axis in 2008 and as CTO has overall responsibility for not just its current crop of products, but thinking about what the future might hold, too. Johan got his start with a Masters Degree in Electrical Engineering from the University of Lund in Sweden – and loves the city so much that he never left. He is also a member of the board at poLight, a Norwegian company working to replicate the human eye lens.


5 Minutes With… Hanwha Techwin’s Billy Hopkins

960 640 Stuart O'Brien

In the latest instalment of our security industry executive interview series we spoke to Billy Hopkins (pictured, right), National Account Manager at Hanwha Techwin, about the company, the ongoing challenges of COVID-19 for the security sector, cyber security in video surveillance, the impact of AI and more…

Tell us about your company, products and services.

Hanwha Techwin are a global leader in the video surveillance industry, offering complete security solutions which encompass network and analogue cameras, recording solutions, video management software and compression technology. With a vision to deliver a safer world through our cooperate philosophy of trust and loyalty.

What have been the biggest challenges the Security industry has faced over the past 12 months?

COVID has undoubtedly been one of biggest challenges and with it, we have had to find new ways of working whilst maintaining a safe environment.

And what have been the biggest opportunities?

One of the biggest opportunities has been the ability to release free of charge applications for our products that help with public safety, such as occupancy monitoring applications and facemask detection applications.

What is the biggest priority for the Security industry in 2020?

The biggest priority should be around cyber security and ensuring new products released are meeting the highest standards such as Secure by default and UL Cap independent testing.

What are the main trends you are expecting to see in the market in 2022?

A key trend will be in the new product ranges where video will help to innovate, such as utilising AI for parking management systems and increasing the accuracy on analytics for retail focused applications.

What technology is going to have the biggest impact on the market this coming year?

AI technology is at the forefront of the current technological advancements, with cost effective edge based AI functions becoming a reality of today. The ability to be able to deploy advanced AI tech to any system size, not just enterprise solutions, will benefit many.

In 2025 we’ll all be talking about…?

Cloud solutions or SaaS will play are bigger role and I expect 2025 will see an increase in the variety of solutions on offer.

Which person in, or associated with, the Security industry would you most like to meet?

Fraser Sampson, the Surveillance Camera Commissioner – I believe Fraser has an important role in shaping the future of CCTV in the UK and beyond ensuring current and emerging technology is used responsibly.

You go to the bar at the Total Security Summit – what’s your tipple of choice?

I’m not much of a drinker but if pushed a good whisky!

What’s the most exciting thing about your job?

I really enjoy the seeing the result of our technology making a difference. Following a request from system design through to seeing it in action makes it worthwhile.

And what’s the most challenging?

Making sure the solutions we put together solve the problem for those at the end of the chain.

What’s the best piece of advice you’ve ever been given?

Luck comes from hard work.

Succession or Stranger Things?

Stranger Things!

F24 and The BCI present the new Emergency Communications Report 2021

960 642 Guest Blog

The pandemic has driven organisations to adopt collaboration software in 2020 and this trend is expected to continue for 2021.

Previous reports have highlighted an overreliance on tools from the private environment for communication during emergency situations (e.g. WhatsApp). Organisations are moving away from tools from such as WhatsApp and using more collaborative tools such as Microsoft Teams, which is also being used in incident situations. Many organisations, who have been using collaborative tools/software for the first time in 2020, are now seeking to extend investment into specialist emergency communications technology solutions.

“2020 was a testing year for all organisations, but one which has transformed the way businesses communicate. This year’s report shows how organisations have been switching physical meetings to virtual settings, with most exploiting collaborative technology such as Microsoft Teams or Zoom more than ever before. The success in using such collaboration tools has driven many organisations to consider investing in more specialist tools for emergency communications for the first time: 49% of respondents who do not currently have tools are already actively trialling new tools or are considering it.”, summarizes Rachael Elliott, Head of Thought Leadership at the BCI.

As Europe’s leading provider for incident and crisis management, emergency notification, as well as business messaging, F24 is proud to exclusively present the BCI Emergency Communications Report and results of this year’s survey. This annual publication provides insight into how organisations communicate in an emergency, the key communication challenges organisations face, and how technology is helping to assist in communications processes.

Download your free copy directly from the F24 website.

Five top technology trends set to impact the security sector in 2020

960 640 Guest Blog

As existing technologies reach maturity and innovations make the leap from consumer applications to business (and vice versa), it’s imperative that we constantly seek to find those that have the potential to add value to our own business and those of our customers. As we look ahead to 2020, Johan Paulsson, CTO, Axis Communications has identified five trends that will have an impact on the physical security industry…

  1. The world on the edge
    We are seeing a growing momentum towards computing at the ‘edge’ of the network[1]. More of the devices that are connected to the network require or would benefit from the ability to analyse received data, make a decision and take appropriate action. Autonomous vehicles are an obvious example. Whether in relation to communications with the external environment or through sensors detecting risks, decisions must be processed in a split second. It is the same with video surveillance. If we are to move towards the proactive rather than reactive, more processing of data and analysis needs to take place within the camera itself.
  2. Processing power in dedicated devices
    Dedicated and optimised hardware and software, designed for the specific application, is essential with the move towards greater levels of edge computing. Connected devices will need increased computing power, and be designed for purpose from the ground up with a security first mindset. The concept of embedded AI in the form of machine and deep learning computation will also be more prevalent moving forwards.
  3. Towards the trusted edge
    Issues around personal privacy will continue to be debated around the world. While technologies such as dynamic anonymization and masking[2] can be used on the edge to protect privacy, attitudes and regulation are inconsistent across regions and countries. The need to navigate the international legal framework will be ongoing for companies in the surveillance sector. Many organizations are still failing to undertake even the most basic firmware upgrades, yet with more processing and analysis of data taking place in the device itself, cybersecurity will become ever more critical.
  4. Regulation: use cases vs technology
    Attitudes towards appropriate use technology cases and the regulations around them differ around the world. Facial recognition might be seen as harmless and even desirable. However, when used for monitoring citizens and social credit systems it is regarded as much more sinister and unwanted. The technology is exactly the same but the case is vastly different. Regulations are struggling to keep pace with advances in technology. It’s a dynamic landscape that the industry will need to navigate, and where business ethics[3]will continue to come under intense scrutiny. 
  5. Network diversity
    As a direct result of some of the regulatory complexities, privacy and cybersecurityconcerns, we’re seeing a move away from the open internet of the past two decades. While public cloud services will remain part of how we transfer, analyse and store data, hybrid and private clouds are growing in use. Openness and data sharing was regarded as being essential for AI and machine learning, yet pre-trained network models can now be tailored for specific applications with a relatively small amount of data. For instance, we’ve been involved in a recent project where a traffic monitoring model trained with only 1,000 photo examples reduced false alarms in accident detection by 95%.





Industry Spotlight: Gallagher releases latest mobile security technology to international market

631 488 Jack Wynn

Gallagher has released its latest state-of-the-art mobile security solution: Gallagher Mobile Connect.

Mobile Connect transforms a mobile phone in to an access device, using FIDO certified authentication to deliver exceptionally safe and secure credentials – empowering businesses to use mobile technology in place of traditional access cards.

Delivering more than just peace-of-mind, Gallagher’s new mobile solution significantly reduces costs and simplifies administration through a range of exclusive features.

In addition to eliminating the costs of supplying and replacing access cards, Mobile Connect customers will enjoy a unique subscription model, which allows for credentials to be transferred between users and reissued to devices.


Apple delays app transport security deadline

680 400 Jack Wynn

Apple has backtracked on its plan to enforce a year-end deadline for 2016 that would have required developers to move apps to an HTTPS-only model in an effort to thwart eavesdropping on insecure, plaintext HTTP connections.

In a short statement at the end of last month, Apple said that a requirement for developers to adopt App Transport Security would be extended. It did not set a new deadline.

The statement on Apple’s website read: “App Transport Security (ATS), introduced in iOS 9 and OS X v10.11, improves user security and privacy by requiring apps to use secure network connections over HTTPS. At WWDC 2016 we announced that apps submitted to the App Store will be required to support ATS at the end of the year.

To give you additional time to prepare, this deadline has been extended and we will provide another update when a new deadline is confirmed. Learn more about ATS.”

Gallagher launches new mobile security app to international market…

800 450 Jack Wynn

Gallagher has announced the release of its Mobile Connect app which promises to transform a mobile phone into an access device – empowering businesses to use mobile technology in place of traditional access cards.

The security division of the Gallagher Group partnered with the FIDO (Fast IDentity Online) Alliance and Nok Nok Labs to create the app, which uses two-step remote provisioning to deliver secure enrolment by sending an email invitation with SMS code to verify the user and the mobile device. 

Steve Bell, chief technology officer at Gallagher said: “Mobile Connect really brings the best of both worlds to the market. It makes access simpler and easier for users while operating on highly-secure, cutting-edge FIDO protocols that give businesses supreme confidence in their security.”

In addition, Mobile Connect claims to significantly reduce costs and simplifies administration through a range of exclusive features. Users can also enjoy a unique subscription model, allowing credentials to be transferred between users and reissued to devices.

Bell adds: “We’re thrilled with this latest release in our mobile technology development programme and the simplicity it brings to our customers. Our goal is always to develop simple solutions underpinned by the strongest security, and that’s what we’ve achieved here.” 

Optional two-factor authentication, either PIN or biometric, is also available to provide added security and flexibility for sites using Mobile Connect.

Find out more information here  

Industry Spotlight: Global ‘megatrends’ pose security and defense challenges, warns PwC…

150 150 Jack Wynn

A new PricewaterhouseCoopers (PwC) report has determined the five global ‘megatrends’ set to have a profound and disruptive effect on defense and security environments.

The shift in global economic power, accelerating urbanisation, demographic shifts, the rise of technology, and climate change and resource scarcity are the five key megatrends widely believed to be shaping the future, with the impact posing a need for more accountability and agility from governments; in addition to greater collaboration to combat risk. 

Entitled ‘Five Megatrends and their implications for Global Defense and Security’, analysts found:

The shift in global economic power – will create more powerful national economies in different regions with greater resources to protect, and greater resources available to invest in defence and security. The shift could also decrease the dependence of some nations on the traditional power projectors, such as the US for protection, as well as increase burden-sharing to ensure economic trade routes and free navigation are protected from hostile actors. Extensive and complex supply chains will become increasingly vulnerable to disruption from cyber criminals engaged in industrial espionage, theft, or terror-based disruptive activities.

Accelerating urbanisation – could mean that the combined power of growing ‘megacities’ will rival that of national governments due to the sheer size of their constituencies. The explosion in urbanisation will present tremendous challenges for law enforcement, intelligence and internal security agencies, in addition to traditional defense organisations. Providing adequate police and security for these areas will prove costly and will require a higher level of interagency information-sharing and collaboration.

Demographic changes – indicates that demand for social services and healthcare in the West will place severe pressure on budget priorities that could compete with, or even crowd out, defense and security expenditures. In contrast, the growth in the youth populations among emerging markets could potentially create increased radicalisation and civil unrest, and a greater likelihood for disruptive transnational movements to take hold in these societies. 

The rise of technology – offers exciting advances that promotes even greater analytics, communications and automation. However, it also creates new vulnerabilities that will challenge law enforcement, security, and defense organisations like never before. The combination of mobile devices, data analytics, the internet, artificial intelligence, and cloud computing will provide defense and security organisations step-function increases in capabilities to address and respond to threats that will be using the same, commercially available tools to do harm. The challenge for will be to adapt and adapt these tools at the speed of business—not the traditional speed of government. 

Climate change and resource scarcity – will increase tensions between nations over access to natural resources. As the global population continues to grow, these disputes will become more acute and critical to national survival, particularly when it comes to very basic resources such as food, water, and energy sources. PwC predicts this will lead to regional and potentially global confrontations over water, oil, wind, fishing, hunting, and other mineral rights.

Tom Modly, global government sectors leader at PwC, said: “The depth and complexity of the security challenges posed by the global megatrends will demand ‘whole of society’ solutions. And these solutions must leverage the technological, collaborative and commercial benefits that the megatrends themselves will enable.

“But we must not fear the megatrends or their resultant defense and security challenges. Rather, we should anticipate these changes, take them seriously, and apply creativity and resources to stay ahead of the critical issues they will present.” 

Guest Blog, Pascal Geenens: The rise in students hacking school databases…

800 450 Jack Wynn

You might be surprised at who is behind the most recent cases of cyber-attacks on schools. Would you guess that in many instances, it’s the students themselves? There are many reasons why students would want to launch an attack against their own school, and it’s actually becoming a larger problem across the globe with cases reported in the US, Japan, Australia and India.

Here are some of the top reasons why students have been launching attacks on schools:

It’s fun

Who wouldn’t be intrigued by the idea of trying to hack into their school, with all its records at their disposal? With many schools now electing to have students submit assignments digitally and take exams online, some would find it fun to shut down the system so they and their classmates won’t have to submit their work or take a test. Others may just want to play a joke by defacing the school website.


In some cases, the reason for hacking is as simple as wanting to get back at the school for bestowing punishment upon the student. Disrupting normal operations, thinking they won’t get caught, holds an allure.

Changing grades

For those who are struggling with coursework or may have flunked an important exam or submitted a hastily put together dissertation, the temptation to hack lies in the ability to change their grades to more favourable ones. Not wanting to bring home a poor report is a key motivation in younger students. Students of all ages will see a hack as a way to avoid this.

To change attendance

For the truants out there, hacking provides a way for them to change their attendance records and erase the fact they did not attend school.

As a dare

We all like having bragging rights. For students, responding to a dare is often the way to do it. If they don’t, they face bullying and teasing from classmates over not succeeding.

So how do they do it? Most educational facilities have migrated to digital platforms, and these online portals are prime targets for attacks.

Technology is great and streamlines workflow, but presents a larger issue if knocked offline. If these portals go down, they prevent students from being able to perform many actions, like submitting their work. This is a huge issue with schools going digital. Schools are quick to incorporate the newest technology but often do not consider the risks.

One of the biggest security risks that school network face is from their students and the devices they bring with them. Students bring a considerably large amount of devices, ranging from personal computers and tablets to mobile phones and gaming consoles.

These devices often connect to the school’s network and open a huge range of vulnerabilities. The activities that some students engage in, such as online gaming, can also bring a risk of malware or even denial of service attacks.

Part of the issue is the ease in which students can now access the Darknet, and the increasingly low costs to hire someone to hack the system for them. Digital marketplace vendors on the Darknet offer cyber services such as grade changes and distributed denial of service (DDos) attacks for very little money.

This makes it increasingly easy for non-hackers to carry out an attack or cause damage to a school’s resources. In addition to these services, a potential attacker can rent other attacks such as botnets or stresser services for Bitcoin.

It’s scary stuff, but there are steps that schools can take to protect themselves. They key is a hybrid security solution that combines on-premise detection and mitigation with cloud-based protection, so attack traffic can be identified and blocked before it causes downtime. A trusted security specialist will be able to advise further on the best way to ensure service availability.

It may seem extreme, but students have come a long way from slingshots and peashooters, with many choosing cyber attacks as their weapon of choice. It’s up to schools to make sure they are just as innovative with their defences.


As a security evangelist for Radware, Pascal helps execute the company’s thought leadership on today’s security threat landscape. Pascal brings over two decades of experience in many aspects of information technology and holds a degree in Civil Engineering from the Free University of Brussels.

  • 1
  • 2