Genetec’s top physical security trends

Issue 1 2022 Surveillance, Information Security, Integrated Solutions

Genetec has shared its top predictions for the physical security industry in 2022. A summary of its predictions is listed below.

Monitoring occupancy and space utilisation will remain a top priority

Within months of the pandemic, businesses were deploying different solutions to track occupancy in their buildings and control social distancing. Almost two years later, this trend is still growing because they’re seeing value from the data collected.

Beyond safety objectives, organisations will embrace the use of spatial analytics data to reduce wait times, optimise staff scheduling and enhance business operations. As businesses give employees the flexibility to split up their work time between the office and home, organisations will be looking for ways to best optimise their workplaces. By using space utilisation intelligence, they will be able to analyse employee office attendance, monitor meeting room demands and make informed floor plan changes such as adding more desk-sharing options.

Video analytics will become more viable for large-scale deployments

In recent years, demand for video analytics solutions has been strong. As AI techniques such as machine learning and deep learning continue to bolster the power of analytics, more organisations are eager to invest.

However, because complex video analytics still require very powerful servers for adequate data processing, deploying analytics at an enterprise level isn’t always practical. As we move into 2022, we believe video analytics applications will mature in ways that make them easier and more economical to deploy at scale. This evolution will be made possible by vendors who focus on hardware resource efficiency and offer more granular controls for running analytics at certain intervals or schedules, instead of continuously.

Cybercrime will continue to grow and inspire new strategies

A report by Cybersecurity Ventures predicts that global crime costs will reach US$ 10,5 trillion annually by 2025. With a growth rate of 15% per year, this cost is said to represent the greatest transfer of economic wealth in history.

As more devices come online and data processing becomes central to operations, businesses will need to remain agile and responsive to the evolving threat landscape. Their customers will also demand greater transparency about how they are keeping data secure and private. All of this will usher in an entirely new model for cybersecurity that relies on continuous verification rather than just hardening networks and systems.

Building layers of protection into a security ecosystem won’t be enough. Decision makers will need to implement more offensive cybersecurity strategies and choose partners who offer higher levels of automation to stay on top of potential threats.

Supply chain risks will gain more focus and attention

The supply chain issues that the world is currently experiencing will encourage businesses to be less dependent on single-source, proprietary solutions. Forward-thinking organisations will instead seek open architecture solutions that offer increased choice and flexibility based on requirements and current availability.

But there’s more to supply chain issues than the current shortage of goods and materials. As cybercriminals become more sophisticated, organisations are under greater pressure to scrutinise the cybersecurity measures, standards and certifications of their entire supply chain ecosystem.

In a world where organisations no longer have clearly defined network perimeters, we anticipate seeing more businesses and government agencies broadening the scope of their cybersecurity policies to establish baseline security standards for the solutions they purchase and the vendors they partner with.

Move to cloud and hybrid deployment

As more businesses take a step towards trialling cloud applications, they’ll quickly understand the benefits of hybrid cloud, which will produce even greater forward momentum in the adoption of cloud technologies in the new year.

This could include implementing a digital evidence management system to speed up video and data sharing between different departments during investigations, deploying a cloud video management system to secure a high-risk remote location, or installing a physical identity access management (PIAM) solution to better manage access rights for all employees.

Forward thinking security leaders and their organisations will think less about how a product capability is delivered and more about how and where they will employ this technology to improve and strengthen their security and data insights in 2022 and beyond.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Impro announces Primo update
News & Events Access Control & Identity Management Integrated Solutions
Impro Technologies recently held a launch event in which it introduced a series of new products, from new readers through to its updated Primo access management software.

Read more...
Five signs your storage is holding you back
Infrastructure Surveillance
In the drive for business growth, organisations across South Africa are investing heavily in talent, applications, and strategy. Yet the foundational technology that underpins every digital interaction - data storage - is often overlooked.

Read more...
Dahua expands wireless 4G security monitoring
Products & Solutions Surveillance Smart Home Automation
Dahua Technology has launched a new wireless 4G security camera under its WITHS series, designed to deliver simplified deployment, continuous monitoring, and dependable performance in remote and power-limited environments.

Read more...
IQSight SmartSuite integration with XProtect
Surveillance News & Events AI & Data Analytics
Milestone Systems and IQSight have strengthened their collaboration with the release of SmartSuite, a consolidated plug-in suite for Milestone XProtect video management software, to cut installation time for system integrators by 70%.

Read more...
Smart port monitoring and automated container tracking
LD Africa AI & Data Analytics Surveillance Logistics (Industry)
A leading shipping port set out to improve visibility, security, and operational efficiency across its site, turning to an advanced monitoring solution powered by Axxon PSIM.

Read more...
Claude Mythos wake-up call
Technews Publishing AI & Data Analytics Information Security
AI has crossed a critical cybersecurity threshold and frontier models are accelerating attack lifecycles and will enable attackers to identify and exploit vulnerabilities at scale and speed, through novel methods that were previously the domain of advanced nation-state entities.

Read more...
If you cannot prove identity, you cannot claim security
Access Control & Identity Management Information Security
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity.

Read more...
The security debt hidden in residential estates
Security Services & Risk Management Integrated Solutions Residential Estate (Industry)
Many residential estates undermine their own security not through a lack of technology, but through hidden weaknesses in gate design, fragmented systems, recurring software dependence, weak operational ownership, and insufficient estate management input.

Read more...
When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
SWEAR integrates with Milestone
Milestone Systems Surveillance Products & Solutions
Security footage, legal evidence, and other critical surveillance assets face increasing risks of tampering, raising chain-of-custody questions, jeopardising admissibility, and undermining the timely operational decisions that depend on credible video.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.