Tough with opportunities

1 February 2017 Surveillance, Information Security

It is expected that cyber security breaches and crimes will dominate the headlines; especially with the fast-growing list of new, innovative threats, like fileless malware, dronejacking and the continued evolution of malware. The exploitation of IP cameras as a backdoor will also prove challenging, with ever more secure security policies being implemented. The alignment of internal security systems to IT processes will continue, stimulating IP sales.

However, the electronic security landscape will be sure to provide its own challenges that require smart, innovative use of technology to address security and business management concerns effectively. Integration will remain a key aspect, converging multiple subsystems into a converged powerhouse of intelligence and forensic data, most likely including SIoT (Security Internet of Things).

Marius Stoop, sales manager.
Marius Stoop, sales manager.

What will make an impact?

• The current product curve is peaking, with excellent products across many levels, allowing one to meet solution requirements and the price sensitivity of some markets. Big data and cloud storage should offer some storage alternatives in the near future. SIoT, the excitingly anticipated marriage between IoT and electronic security brings with it an expectation of virtually endless possibilities.

• The projects environment should be ready to embrace a more open platform architecture (less proprietary) driving compatibility, integration, cloud presence and convergence.

• While the mid to lower tiers will be more interested in (more proprietary) boxed solutions, many top camera manufacturers are now offering entry to mid-level head-end software and solutions, and vice versa for some head-end manufacturers.

What about the economy?

• Bleak forecasts, political turbulence, electricity and water supply constraints are seen in some crystal balls, one should protect against these by remaining steadfast in a strong business strategy and focus on the execution thereof.

• A slightly stronger version of 2016 could be expected. Growth has to be driven by offering the customer value to invest in outcomes-based solutions and good ROI with a suitable TCO.

2017 will undoubtedly be as challenging as any. With most companies undergoing consolidation of one kind or another, the product and service offering will be funnelled into a high concentration of a few strong contenders.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...
ISPA’s take-down process protects from local scams
News & Events Information Security
During the recent school holidays, parents could rest a little easier knowing that ISPA, SA’s official internet industry representative body, is removing an average of three to four problematic websites from the local internet every week.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.