Tough with opportunities

1 February 2017 Surveillance, Information Security

It is expected that cyber security breaches and crimes will dominate the headlines; especially with the fast-growing list of new, innovative threats, like fileless malware, dronejacking and the continued evolution of malware. The exploitation of IP cameras as a backdoor will also prove challenging, with ever more secure security policies being implemented. The alignment of internal security systems to IT processes will continue, stimulating IP sales.

However, the electronic security landscape will be sure to provide its own challenges that require smart, innovative use of technology to address security and business management concerns effectively. Integration will remain a key aspect, converging multiple subsystems into a converged powerhouse of intelligence and forensic data, most likely including SIoT (Security Internet of Things).

Marius Stoop, sales manager.
Marius Stoop, sales manager.

What will make an impact?

• The current product curve is peaking, with excellent products across many levels, allowing one to meet solution requirements and the price sensitivity of some markets. Big data and cloud storage should offer some storage alternatives in the near future. SIoT, the excitingly anticipated marriage between IoT and electronic security brings with it an expectation of virtually endless possibilities.

• The projects environment should be ready to embrace a more open platform architecture (less proprietary) driving compatibility, integration, cloud presence and convergence.

• While the mid to lower tiers will be more interested in (more proprietary) boxed solutions, many top camera manufacturers are now offering entry to mid-level head-end software and solutions, and vice versa for some head-end manufacturers.

What about the economy?

• Bleak forecasts, political turbulence, electricity and water supply constraints are seen in some crystal balls, one should protect against these by remaining steadfast in a strong business strategy and focus on the execution thereof.

• A slightly stronger version of 2016 could be expected. Growth has to be driven by offering the customer value to invest in outcomes-based solutions and good ROI with a suitable TCO.

2017 will undoubtedly be as challenging as any. With most companies undergoing consolidation of one kind or another, the product and service offering will be funnelled into a high concentration of a few strong contenders.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Claude Mythos wake-up call
Technews Publishing AI & Data Analytics Information Security
AI has crossed a critical cybersecurity threshold and frontier models are accelerating attack lifecycles and will enable attackers to identify and exploit vulnerabilities at scale and speed, through novel methods that were previously the domain of advanced nation-state entities.

Read more...
If you cannot prove identity, you cannot claim security
Access Control & Identity Management Information Security
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity.

Read more...
When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
SWEAR integrates with Milestone
Milestone Systems Surveillance Products & Solutions
Security footage, legal evidence, and other critical surveillance assets face increasing risks of tampering, raising chain-of-custody questions, jeopardising admissibility, and undermining the timely operational decisions that depend on credible video.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Smarter surveillance in a connected world
Securex South Africa Surveillance IoT & Automation
The security sector is moving rapidly towards integrated, intelligence-led environments. Organisations want systems that communicate with each other, deliver meaningful insight, and support operational efficiency without compromising cybersecurity or privacy.

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
From surveillance to strategic business infrastructure
Axis Communications SA Surveillance
The Axis Perspectives Report 2026 describes how intelligent IP cameras are evolving beyond traditional surveillance to become an increasingly embedded component of operational infrastructure, supporting security, safety and broader business performance.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.