Genetec’s top physical security trends

Issue 1 2022 Surveillance, Information Security, Integrated Solutions

Genetec has shared its top predictions for the physical security industry in 2022. A summary of its predictions is listed below.

Monitoring occupancy and space utilisation will remain a top priority

Within months of the pandemic, businesses were deploying different solutions to track occupancy in their buildings and control social distancing. Almost two years later, this trend is still growing because they’re seeing value from the data collected.

Beyond safety objectives, organisations will embrace the use of spatial analytics data to reduce wait times, optimise staff scheduling and enhance business operations. As businesses give employees the flexibility to split up their work time between the office and home, organisations will be looking for ways to best optimise their workplaces. By using space utilisation intelligence, they will be able to analyse employee office attendance, monitor meeting room demands and make informed floor plan changes such as adding more desk-sharing options.

Video analytics will become more viable for large-scale deployments

In recent years, demand for video analytics solutions has been strong. As AI techniques such as machine learning and deep learning continue to bolster the power of analytics, more organisations are eager to invest.

However, because complex video analytics still require very powerful servers for adequate data processing, deploying analytics at an enterprise level isn’t always practical. As we move into 2022, we believe video analytics applications will mature in ways that make them easier and more economical to deploy at scale. This evolution will be made possible by vendors who focus on hardware resource efficiency and offer more granular controls for running analytics at certain intervals or schedules, instead of continuously.

Cybercrime will continue to grow and inspire new strategies

A report by Cybersecurity Ventures predicts that global crime costs will reach US$ 10,5 trillion annually by 2025. With a growth rate of 15% per year, this cost is said to represent the greatest transfer of economic wealth in history.

As more devices come online and data processing becomes central to operations, businesses will need to remain agile and responsive to the evolving threat landscape. Their customers will also demand greater transparency about how they are keeping data secure and private. All of this will usher in an entirely new model for cybersecurity that relies on continuous verification rather than just hardening networks and systems.

Building layers of protection into a security ecosystem won’t be enough. Decision makers will need to implement more offensive cybersecurity strategies and choose partners who offer higher levels of automation to stay on top of potential threats.

Supply chain risks will gain more focus and attention

The supply chain issues that the world is currently experiencing will encourage businesses to be less dependent on single-source, proprietary solutions. Forward-thinking organisations will instead seek open architecture solutions that offer increased choice and flexibility based on requirements and current availability.

But there’s more to supply chain issues than the current shortage of goods and materials. As cybercriminals become more sophisticated, organisations are under greater pressure to scrutinise the cybersecurity measures, standards and certifications of their entire supply chain ecosystem.

In a world where organisations no longer have clearly defined network perimeters, we anticipate seeing more businesses and government agencies broadening the scope of their cybersecurity policies to establish baseline security standards for the solutions they purchase and the vendors they partner with.

Move to cloud and hybrid deployment

As more businesses take a step towards trialling cloud applications, they’ll quickly understand the benefits of hybrid cloud, which will produce even greater forward momentum in the adoption of cloud technologies in the new year.

This could include implementing a digital evidence management system to speed up video and data sharing between different departments during investigations, deploying a cloud video management system to secure a high-risk remote location, or installing a physical identity access management (PIAM) solution to better manage access rights for all employees.

Forward thinking security leaders and their organisations will think less about how a product capability is delivered and more about how and where they will employ this technology to improve and strengthen their security and data insights in 2022 and beyond.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...
Acronis and Metrofile Cloud announce partnership
Infrastructure Integrated Solutions
Acronis has appointed Metrofile Cloud as its premier disaster recovery (DR) partner in southern Africa, combining Acronis' technologies with Metrofile Cloud's local expertise to deliver secure and adaptable disaster recovery solutions for businesses across the region.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.