The dawn of intelligent security

CCTV Handbook 2015 News & Events

Welcome to the CCTV Handbook 2015. We’ve collected a host of interesting and useful bits of information about the surveillance industry in this handbook in an attempt to provide our readers with an overview of the surveillance market. Naturally we can’t cover everything there is to cover due to space restrictions, but we’ve tried to make it a comprehensive overview that’s also an enjoyable and educational read.

One of the issues you will notice in this year’s handbook is the trend to intelligence. We’re not referring to intelligence gathered by video analytics alone, but what the IT-inclined refer to as business intelligence.

To be sure, video analytics have improved dramatically and can now deliver real value to a surveillance operation. Avigilon’s recent spending spree clearly shows how important video analytics is becoming and we will still see amazing things happening over the next few years. The trend I’m referring to is to use your surveillance footage for non-security purposes.

Hi-Tech Security Solutions first noticed this trend in the breakfast sessions we held over the last year or two, where presenters started talking to marketers, operations and HR managers along with the usual security and risk managers. The idea is that, having a surveillance system that does what you want in terms of security, why not use that footage as a means to improve productivity or ensure adherence to standard operating processes, among other things.

The retail industry is the prime example everyone uses as it provides the easiest target for adding value to surveillance. In the course of the coming year, I expect we are going to see more examples of this type of intelligence being used in other industries with great success.

This year’s handbook also includes a round-table consisting solely of end users responsible for the security of their companies. It was an interesting exercise as we all too often find ourselves influenced by vendors. Our round-table shows clearly that, while surveillance is important in the real world, it is only a part of a comprehensive security solution. The reality is that the more you can offer in terms of integration and value – that is, usable value (or intelligence) – the better you will do when approaching these guys. Selling a camera and a DVR is just not going to work.

As usual, we also include our annual Camera Selection Guide to offer you a range of different cameras to evaluate in your buying decisions, as well as our DVR/NVR Round-Up. If you’re in the market for new cameras or storage systems, this should be your first stop to gain a quick overview of what’s out there and what the products offer.

I would like to thank everyone who contributed to the handbook – people took time out to speak to us and share their knowledge and we appreciate the efforts they made. We hope you enjoy the handbook and find value in it. If you have any comments or criticisms, or think there is something we need to include in the next one, please feel free to let me know on [email protected]. Your input is always valued.

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From the Editor's desk: Apathy is a cybercriminal
Technews Publishing News & Events
      Welcome to SMART Security Solutions’ first print publication of the year, the SMART Access & Identity Handbook 2025. This year’s print issue is smaller than usual, so we include some articles in the ...

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Balancing security and ease-of-use
Technews Publishing SMART Security Solutions Access Control & Identity Management Security Services & Risk Management
Fraud incidents have financial repercussions and erode consumer trust, leading businesses to become more aware, though this awareness does not necessarily translate into confidence in their identity authentication processes.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
Integration and IoT made easy
Technews Publishing SMART Security Solutions Access Control & Identity Management
The security industry is built on silos, be it surveillance, access control, alarms and others, but integration has become a critical issue in recent years. SMART Security Solutions speaks to Integr8 Systems about its local hardware and software.

Read more...
Mobile credentials taking off
Technews Publishing SMART Security Solutions Paxton Secutel Technologies Access Control & Identity Management
Mobile smartphone access is becoming more common, with use cases ranging from Bluetooth, NFC (Near-Field Communication), or QR codes to manage secure access to commercial and personal locations.

Read more...
SMARTpod talks to Armata’s Richard Frost
Technews Publishing SMART Security Solutions Videos
SMARTpod, the podcast by SMART Security Solutions, recently spoke to Richard Frost from Armata about the company's new 'all-in-one' cybersecurity bundle designed to relieve cyber stress in the SMB market.

Read more...
From QR code to compromise
Information Security News & Events
A new attack vector involves threat actors using fraudulent QR codes emailed in PDF attachments to bypass companies' phishing security measures by requiring users to scan the code with their mobile phones.

Read more...