Tough with opportunities

1 February 2017 Surveillance, Information Security

It is expected that cyber security breaches and crimes will dominate the headlines; especially with the fast-growing list of new, innovative threats, like fileless malware, dronejacking and the continued evolution of malware. The exploitation of IP cameras as a backdoor will also prove challenging, with ever more secure security policies being implemented. The alignment of internal security systems to IT processes will continue, stimulating IP sales.

However, the electronic security landscape will be sure to provide its own challenges that require smart, innovative use of technology to address security and business management concerns effectively. Integration will remain a key aspect, converging multiple subsystems into a converged powerhouse of intelligence and forensic data, most likely including SIoT (Security Internet of Things).

Marius Stoop, sales manager.
Marius Stoop, sales manager.

What will make an impact?

• The current product curve is peaking, with excellent products across many levels, allowing one to meet solution requirements and the price sensitivity of some markets. Big data and cloud storage should offer some storage alternatives in the near future. SIoT, the excitingly anticipated marriage between IoT and electronic security brings with it an expectation of virtually endless possibilities.

• The projects environment should be ready to embrace a more open platform architecture (less proprietary) driving compatibility, integration, cloud presence and convergence.

• While the mid to lower tiers will be more interested in (more proprietary) boxed solutions, many top camera manufacturers are now offering entry to mid-level head-end software and solutions, and vice versa for some head-end manufacturers.

What about the economy?

• Bleak forecasts, political turbulence, electricity and water supply constraints are seen in some crystal balls, one should protect against these by remaining steadfast in a strong business strategy and focus on the execution thereof.

• A slightly stronger version of 2016 could be expected. Growth has to be driven by offering the customer value to invest in outcomes-based solutions and good ROI with a suitable TCO.

2017 will undoubtedly be as challenging as any. With most companies undergoing consolidation of one kind or another, the product and service offering will be funnelled into a high concentration of a few strong contenders.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
The AI goldrush has a credibility problem
Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Transforming video surveillance into strategic intelligence
Secutel Technologies Products & Solutions Surveillance
In a world where risk moves faster, and operations are more interconnected than ever, you need more than footage — you need insight.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.