Top five security trends to look out for in 2019

March 2019 Surveillance, Information Security

2018 was a year in which many countries focused on implementing and embracing new technologies. In tandem, many nations also witnessed cyber and physical security challenges such as back to back cyberattacks.

According to Emirates News Agency (WAM), 274 cyberattacks targeted the UAE alone for the first seven months of 2018, out of which 39 were extremely detrimental. That said, as we move forward to 2019, we clearly notice the continuation of several important trends and the development of some new ones. These trends will have an important role to play in the security sector.

From the continued focus on cybersecurity to the acquisition of global players, we have highlighted the top five security related trends to look forward to in 2019.

Continued focus on cybersecurity

The first trend we see is a continued focus on cybersecurity. There continues to be a growing number of high-profile breaches in our industry. Along with governmental regulations designed to strengthen security, privacy, and mitigate the damage caused by these increasing cyberattacks, we have to be more vigilant than ever. Cybercrime and criminal cyber activity are not only costly, but they can cause tremendous damage to an organisation’s reputation.

Recently, Facebook lost another 50 million users when its data was breached. While the financial cost may not represent a lot in terms of Facebook’s bottom line, the loss of trust and damage to their brand is significant.

Another important part of concerns around cybersecurity is the increasing awareness of untrustworthy devices. It has become clear that this lack of trust is not a function of engineering, but more often malicious intent that can come from any number of sources. For our part, we have developed countermeasures that can help isolate untrustworthy devices on the network. Our systems are customised to keep these untrustworthy devices from sending sensitive or private information to unauthorised recipients. It also protects other systems, including command and control systems, from being accessed.

All of us have a responsibility to protect our security platforms and networks, and all the systems they connect to through vigilance and transparency. As technology providers, we must ensure that we are not only good data stewards, but also upstanding global citizens.

Greater attention to risk assessment

Despite the fact that some businesses believe that their networks are secure, in many cases it takes mere seconds to guess device passwords and gain access to sensitive systems. When governments have concerns about potential risks to their systems, this naturally becomes an indication to other organisations that they too should take a closer look at their vulnerabilities. As a result, we are now seeing large organisations balancing out their risk assessment by leveraging cyber-litigation insurance. And this is surely to increase throughout 2019.

Increased unification that leads to better understanding

In terms of the technology, we are sure to see even more unification of systems in 2019. Organisations are already experiencing the benefits of unifying access control systems with video surveillance, and this will only grow. What will also increase is the ability to employ analytics tools to leverage the vast amounts of data that physical security systems and other devices are already collecting. When organisations are able to understand and leverage their data, they can use it to improve any number of business functions, including efficiency, operations, customer service and revenue generation.

The challenges here will arise around sharing information between stakeholders, particularly in terms of maintaining individual privacy and control over sensitive data. But we will see solutions that will allow for disparate organisations to collaborate effectively to achieve even greater understanding.

More organisations adopting hybrid cloud storage

We are seeing an increasing number of organisations moving their storage to hybrid-cloud solutions. This allows them to divide their data between cloud and on-premises options. There are tremendous benefits here as people can take advantage of the greater flexibility and cost-savings associated with cloud solutions — often for long term archival — while maintaining the all-important feeling of control of their data. This also includes having the business data secured and protected from Denial of Service (DDoS) attacks while protecting sensitive information and transaction.

Continued acquisition of global players

In recent years, we have seen several companies consolidate as major players acquire other organisations. While the bringing together of technology has the potential to yield compelling advancements, it can also slow test cycles for these businesses. 2019 will bring many opportunities for companies such as Genetec to help its end users and partners put an enterprise-grade security platform in place, with an open-architecture, scalable, and extensible solution.

For more information contact Genetec, Brent Cary, [email protected], www.genetec.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hikvision launches AcuSeek NVR
Surveillance Products & Solutions AI & Data Analytics
By integrating natural language interaction, Hikvision’s AcuSeek NVR enables precise video and image retrieval within seconds, marking a transformative milestone for the security industry's advance into intelligent and efficient applications.

Read more...
2025 video surveillance market set for improved fortunes
News & Events Surveillance
Novaira Insights has unveiled its latest report, World Market for Video Surveillance Hardware and Software – 2025 Edition, forecasting a healthy growth rate of 8,1% until 2029, excluding China.

Read more...
Dallmeier and Hexagon form a technology partnership
Surveillance
Dallmeier and Hexagon have agreed to form a technology partnership, which will see the two companies combine their expertise to develop integrated security solutions for various application areas, particularly critical infrastructures.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Analyse, automate, and optimise logistics processes
neaMetrics Surveillance Transport (Industry) Products & Solutions Logistics (Industry)
In today’s rapidly evolving logistics sector, the pressure to improve process efficiency, optimise resource usage, and ensure seamless security is more intense than ever. Smart, proactive surveillance is no longer a luxury — it is a critical operational necessity.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Safer spaces through smart surveillance
NEC XON Surveillance
Advances in facial recognition technology are transforming surveillance from a mere recording tool into an intelligent, integrated system that enhances real-time safety, moving beyond the traditional expansion of CCTV efforts.

Read more...
Next generation of AI-powered video telematics
IoT & Automation Surveillance Transport (Industry)
Webfleet, Bridgestone’s fleet management solution in South Africa, has launched Webfleet Video 2.0, an AI-powered solution designed to enhance fleet safety, security, compliance with local regulations and operational efficiency through real-time video insights.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.