Tough with opportunities

1 February 2017 Surveillance, Information Security

It is expected that cyber security breaches and crimes will dominate the headlines; especially with the fast-growing list of new, innovative threats, like fileless malware, dronejacking and the continued evolution of malware. The exploitation of IP cameras as a backdoor will also prove challenging, with ever more secure security policies being implemented. The alignment of internal security systems to IT processes will continue, stimulating IP sales.

However, the electronic security landscape will be sure to provide its own challenges that require smart, innovative use of technology to address security and business management concerns effectively. Integration will remain a key aspect, converging multiple subsystems into a converged powerhouse of intelligence and forensic data, most likely including SIoT (Security Internet of Things).

Marius Stoop, sales manager.
Marius Stoop, sales manager.

What will make an impact?

• The current product curve is peaking, with excellent products across many levels, allowing one to meet solution requirements and the price sensitivity of some markets. Big data and cloud storage should offer some storage alternatives in the near future. SIoT, the excitingly anticipated marriage between IoT and electronic security brings with it an expectation of virtually endless possibilities.

• The projects environment should be ready to embrace a more open platform architecture (less proprietary) driving compatibility, integration, cloud presence and convergence.

• While the mid to lower tiers will be more interested in (more proprietary) boxed solutions, many top camera manufacturers are now offering entry to mid-level head-end software and solutions, and vice versa for some head-end manufacturers.

What about the economy?

• Bleak forecasts, political turbulence, electricity and water supply constraints are seen in some crystal balls, one should protect against these by remaining steadfast in a strong business strategy and focus on the execution thereof.

• A slightly stronger version of 2016 could be expected. Growth has to be driven by offering the customer value to invest in outcomes-based solutions and good ROI with a suitable TCO.

2017 will undoubtedly be as challenging as any. With most companies undergoing consolidation of one kind or another, the product and service offering will be funnelled into a high concentration of a few strong contenders.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
Smarter investigations in Security Center SaaS
Genetec Surveillance
Genetec has announced new intelligent automation (IA)-powered investigation capabilities in Security Center SaaS to help operators quickly locate video evidence, understand the context surrounding an event, and close cases in minutes.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
ONVIF to end support for Profile S
News & Events Surveillance
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...
GenAI fraud forcing banks to shift from identity to intent
AI & Data Analytics Information Security Financial (Industry)
The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.