Six technology trends affecting the security sector in 2021

Issue 1 2021 Editor's Choice

It is useful, when looking forward, to first look backward. Hindsight has a wonderful way of providing context for future-gazing activity. And when looking back over the last year, one insight could understandably be that attempting to predict the future is a futile activity.

While the COVID-19 pandemic had taken hold in Asia before the end of 2019, few would have predicted the enormous impact it would have across the world throughout 2020. Within a short space of time, our way of life, working practises and business operations were upended. Travel restrictions, social distancing rules, increased hygiene requirements and the pressure placed on health services all affected our business and the security sector.

In dealing with the impact on our own business and workforce – with employee health and safety at the forefront – we also saw new use cases emerge for our technology and solutions, in addition to new ways of working, that will continue in 2021 and beyond.

Technological advancement continues, however, and as we have seen in recent years, rather than heralding the emergence of completely new technologies, the trends we see for 2021 are shaped by how and why technologies are used, and the associated implications.

Trust remains at the top of the agenda

We’ve mentioned trust in previous trend posts, and it’s become even more critical. There are many factors which contribute to maintaining trust, and the technology sector is under more scrutiny now than ever before. Customers and end users are demanding transparency around how tech is used and how data is managed, especially with increased surveillance. This, together with the need to maintain privacy, will be a key challenge.

Renewed discussions around trust will directly impact how organisations in all sectors actively demonstrate why they are trustworthy. Due to its nature, the security sector will be under even more pressure to double down on its efforts in this area.

The world goes horizontal

Recent years have seen applications and services largely designed for specific environments, whether server-based, in the cloud or at the edge. Driven by a desire to achieve optimal performance, scalability and flexibility, along with the benefits of accessing and using data at any time and from anywhere, the next year will see momentum towards horizontal integration between environments.

Increasingly intelligent applications and services will be deployed across all three instances – server, cloud and edge – employing the best capabilities of each, improving solution performance and efficiency. For example, edge analytics in a surveillance camera will potentially message an operator with an alert, the operator then accessing the live video feed through a cloud-based application to verify and respond.

This shift to a ‘horizontal’ approach will increase the speed and accuracy of security and surveillance – moving from reactive to proactive, manual to automated – while also reducing bandwidth, energy and cost.

Cybersecurity: the continual trend

Such horizontal integration will only increase the focus on robust cybersecurity – a chain, after all, is only as strong as its weakest link – and the constant evolution of the threat landscape cements its relevance year after year. Due to the potential for high financial returns and disruption of critical infrastructure, new capabilities, tactics and threats will continue to emerge and require constant vigilance.

AI will be employed by cybercriminals as much as in any sector, strengthening their ability to find and exploit vulnerabilities. Deepfakes will become even more sophisticated and realistic, potentially calling into doubt video surveillance evidence. As a result, further developments in methods to verify content, devices and applications in order to maintain trust in their authenticity will be required.

Advancements in cybercrime will also extend to tried-and-true methods such as phishing lures which will become more difficult to spot. As a result, employees will be even more susceptible to these types of attacks and constant education and reminders of best practice in cybersecurity will, as ever, be needed.

Traditionally, cybersecurity has been based on a ‘perimeter’ model, where the network is protected by a single, hopefully impenetrable wall made up of firewalls, VPNs/VLANs, air-gaps, software-defined networks and other technologies. But as this model is challenged, a single breach can result in the entire network being compromised.

The move to zero trust networks will therefore accelerate, where the security profile for each device and application is independently evaluated. Trust will be delivered through device-to-device and/or application-to-application communication through signed firmware, software updates, secure boot, encrypted data/video, and secure identity. It may seem like an indictment of the age we live in, but the only way to trust the security of anything is to trust nothing.

AI: developing the good, addressing the bad and anticipating the ugly

We’ve been talking about AI for so long that some might question its validity as a trend. But with machine learning (ML) and deep learning (DL) now broadly available in surveillance technology, the implications of its use will be a factor in 2021.

We now have concrete examples of various use cases for AI in surveillance, but as we have seen in other sectors (e.g. autonomous vehicle crashes) the positive impact of AI can be outweighed by the attention given to specific failures. Narratives tend to focus on the errors of automation, and this will no doubt also be the case in the surveillance sector.

However, this shouldn’t act as a deterrent and we must not lose sight of the positive potential use cases of ML and DL in surveillance. For example, using these capabilities in edge devices can assist in identifying objects and reducing false positives. As a result, security experts can move to a proactive, event-based way of working, rather than continuous manual monitoring.

Low- and no-contact technologies come to the fore

Regulations, rules and consumer habits established last year will become commonplace in 2021. Technology will support how these are monitored and enforced, driven by hygiene concerns and social distancing. As a result, the implementation of low- or no-contact technologies, especially in areas such as access control, will increase. In addition, surveillance solutions with people-counting capabilities will become the norm, to ensure adherence to social distancing regulations.

Sustainability reimagined

One concern during the pandemic has been that the focus on the environment and sustainability has been reduced. Several major environmental incidents have brought these discussions to the forefront, and it is expected that in 2021 sustainability will regain its position as a primary area of concern.

The materials used in products and their length of life remain two of the most impactful areas upon which the surveillance sector can drive environmental benefits. While significant steps have been made in reducing the use of plastics and PVC in products, and in increasing the level that recycled and recyclable materials are used, more progress can be made.

Alongside the materials used in products, how long they last will be a critical decision-making factor for customers. Far better for the environment – and economy – to specify a high-quality product with a lengthy anticipated lifetime, than one which requires replacement after a few short years.

The only constant is change

It’s clear that predictions must be taken with a grain of salt, and the events of 2020 singlehandedly demonstrated the risks of trying to accurately predict upcoming events. However, the trends outlined above are, we believe, broad enough to apply even in the context of a turbulent environment. What will continue to be true is that periods of uncertainty underscore the need for agility and an open approach to problem solving, whatever the future holds.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Making drone security more accessible
Editor's Choice Integrated Solutions Residential Estate (Industry) AI & Data Analytics IoT & Automation
Michael Lever discusses advances in drone technology, focusing on cost reductions and the implementation of automated services, including beyond line of sight capabilities, for residential estates with SMART Security Solutions.

Read more...
Private fire services becoming the norm?
Technews Publishing SMART Security Solutions Editor's Choice
As the infrastructure and service delivery in many of South Africa’s major cities decline, with a few, limited exceptions, more of the work that should be done by the state has fallen to private companies.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
SMART Estate Security Conference KZN 2025
Arteco Global Africa OneSpace Technologies SMART Security Solutions Technews Publishing Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
May 2025 saw the SMART Security Solutions team heading off to Durban for our annual Estate Security Conference, once again hosted at the Mount Edgecombe Country Club.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.