Genetec’s top physical security trends

Issue 1 2022 Surveillance, Information Security, Integrated Solutions

Genetec has shared its top predictions for the physical security industry in 2022. A summary of its predictions is listed below.

Monitoring occupancy and space utilisation will remain a top priority

Within months of the pandemic, businesses were deploying different solutions to track occupancy in their buildings and control social distancing. Almost two years later, this trend is still growing because they’re seeing value from the data collected.

Beyond safety objectives, organisations will embrace the use of spatial analytics data to reduce wait times, optimise staff scheduling and enhance business operations. As businesses give employees the flexibility to split up their work time between the office and home, organisations will be looking for ways to best optimise their workplaces. By using space utilisation intelligence, they will be able to analyse employee office attendance, monitor meeting room demands and make informed floor plan changes such as adding more desk-sharing options.

Video analytics will become more viable for large-scale deployments

In recent years, demand for video analytics solutions has been strong. As AI techniques such as machine learning and deep learning continue to bolster the power of analytics, more organisations are eager to invest.

However, because complex video analytics still require very powerful servers for adequate data processing, deploying analytics at an enterprise level isn’t always practical. As we move into 2022, we believe video analytics applications will mature in ways that make them easier and more economical to deploy at scale. This evolution will be made possible by vendors who focus on hardware resource efficiency and offer more granular controls for running analytics at certain intervals or schedules, instead of continuously.

Cybercrime will continue to grow and inspire new strategies

A report by Cybersecurity Ventures predicts that global crime costs will reach US$ 10,5 trillion annually by 2025. With a growth rate of 15% per year, this cost is said to represent the greatest transfer of economic wealth in history.

As more devices come online and data processing becomes central to operations, businesses will need to remain agile and responsive to the evolving threat landscape. Their customers will also demand greater transparency about how they are keeping data secure and private. All of this will usher in an entirely new model for cybersecurity that relies on continuous verification rather than just hardening networks and systems.

Building layers of protection into a security ecosystem won’t be enough. Decision makers will need to implement more offensive cybersecurity strategies and choose partners who offer higher levels of automation to stay on top of potential threats.

Supply chain risks will gain more focus and attention

The supply chain issues that the world is currently experiencing will encourage businesses to be less dependent on single-source, proprietary solutions. Forward-thinking organisations will instead seek open architecture solutions that offer increased choice and flexibility based on requirements and current availability.

But there’s more to supply chain issues than the current shortage of goods and materials. As cybercriminals become more sophisticated, organisations are under greater pressure to scrutinise the cybersecurity measures, standards and certifications of their entire supply chain ecosystem.

In a world where organisations no longer have clearly defined network perimeters, we anticipate seeing more businesses and government agencies broadening the scope of their cybersecurity policies to establish baseline security standards for the solutions they purchase and the vendors they partner with.

Move to cloud and hybrid deployment

As more businesses take a step towards trialling cloud applications, they’ll quickly understand the benefits of hybrid cloud, which will produce even greater forward momentum in the adoption of cloud technologies in the new year.

This could include implementing a digital evidence management system to speed up video and data sharing between different departments during investigations, deploying a cloud video management system to secure a high-risk remote location, or installing a physical identity access management (PIAM) solution to better manage access rights for all employees.

Forward thinking security leaders and their organisations will think less about how a product capability is delivered and more about how and where they will employ this technology to improve and strengthen their security and data insights in 2022 and beyond.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

ONVIF to end support for Profile S
News & Events Surveillance
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...
GenAI fraud forcing banks to shift from identity to intent
AI & Data Analytics Information Security Financial (Industry)
The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net.

Read more...
New Edge AI Plus PTZ cameras with analytics
Products & Solutions Surveillance
IDIS has unveiled two new PTZ cameras that are NDAA-compliant, delivering AI auto-tracking, rapid 40x zoom, EIS image stabilisation, and advanced automated AI functionality.

Read more...
Cyber attack surface expanding
Asset Management Information Security Logistics (Industry)
Despite the increasing number of attacks, analysis of Allianz Commercial cyber claims shows that severity is down by 50% and large-claim frequency by 30% in H1 2025, driven by larger companies’ enhanced detection and response capabilities.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...
Smarter security for real-world challenges
Secutel Technologies Surveillance
SecuVue connects existing CCTV cameras directly to the cloud, delivering exception-based alerts instead of endless footage. Visual Messenger ensures every alert and event reaches the control room securely and instantly.

Read more...
ArxTech: Over 30 years of evolving security solutions for South Africa’s toughest challenges
Security Services & Risk Management Integrated Solutions
[Sponsored] For over 30 years, a Centurion-based company has helped shape how security technology is designed, deployed, and supported in South Africa. Originally known as CellSecure, it now operates as ArxTech.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.