Access Control Communication and Transmission Cyber Security Najave II Software

2024 Tech Trends Maturity and Suitability Index

Welcome to asmag.com’s 2024 technology survey sponsored by ZKTeco. This year our survey saw participation by 250 security players who were polled not only on the suitability and maturity of security technologies but also on customer interest/enthusiasm over these technologies and their growth prospects in the near term. It is our hope that with the survey, readers will gain a better understanding of technologies that deeply shape our industry. The full results for video surveillance and access control can be found here.

Cloud/hybrid architecture

Video surveillance as a service (VSaaS) and access control as a service (ACaaS), which are increasingly adopted by security players, show little change in terms of suitability and maturity this year as compared to 2023, even though ACaaS ranks No. 1 for access control technologies with huge growth potential (full results can be found in the access control and video surveillance articles).

It’s worth noting that the hybrid architecture has received higher scores of 4.03 on suitability and 3.7 on maturity. In terms of customer inquiry and growth potential, hybrid ranks No. 4 and No. 3, respectively. Based on the results, we can see that the cloud momentum is still there, and this is especially the case for hybrid cloud, which distributes processing/storage between on-prem and cloud.

“Hybrid architecture is gaining popularity because it combines the best of both on-premise and cloud-based systems. It allows organizations to retain local control of their most sensitive data while leveraging the scalability and convenience of the cloud for broader management. This dual capability is especially useful for companies with legacy systems that aren’t ready for full cloud migration,” said Tom Buckley, Co-Founder of Qumulex.

“A flexible hybrid-cloud deployment provides multiple options, ensuring that regardless of how many systems are running on local servers or connected to the cloud, they can all be brought back to a central head-end for seamless management from a single platform. A hybrid approach also simplifies the transition to cloud-connected systems at a manageable pace, enabling edge devices to become cloud-compatible, adding cloud services to existing infrastructure, and allowing for the development of a long-term strategy that maximizes ROI while avoiding expensive forklift upgrades,” said Laurent Villeneuve, Senior Product Marketing Manager at Genetec.

AI/Generative AI

Generative AI refers to artificial intelligence that can create new contents based on existing datasets. A potential game-changer for security, generative AI garnered a suitability score of 4.16 and ranks No. 1 in both customer inquiries and growth potential over the next five years.

“Generative AI is gaining a lot of attention in security because of its ability to improve the accuracy and speed of threat detection, as well as its potential to reduce false alarms. By learning from vast amounts of data, generative AI can identify patterns that humans or traditional systems might miss, enabling more proactive security measures. It can also be used to enhance facial recognition, predictive maintenance, and video analytics. While it’s still maturing as a security technology, its rapid development and widespread applicability make it a top candidate for investment and adoption in the near future. As it matures, we expect to see more innovative applications that will revolutionize how we approach physical and cybersecurity,” Buckley said.

Meanwhile, Villeneuve argues that GenAI can also introduce new risks, which must be properly addressed.

“The rise of GenAI also introduces new security threats, including the proliferation of deep fakes and vulnerabilities in foundation models, which are trained on vast amounts of publicly available internet data. These models are increasingly becoming targets for adversarial attacks, such as efforts to introduce malicious data into the models’ training datasets. The security industry, in particular, must be vigilant in identifying and mitigating these emerging risks to ensure the integrity and safety of its systems. If implemented correctly, this can lead to faster response times and more efficient investigations, ultimately improving overall operational effectiveness,” he said.

Edge processing

In terms of edge processing, it gained a suitability score of 4.3 and maturity score of 3.86. In terms of customer inquiries, it ranks third. The high suitability score reveals that users enjoy the benefits offered by edge processing, where data is processed on the edge – only metadata is transmitted to the backend for further processing. This allows for better utilization of bandwidth and quicker response to incidents. The increasing availability of AI cameras where video can be processed on the edge also helps drive this trend.

Cybersecurity

Cybersecurity received suitability and maturity scores of 4.39 and 3.91, respectively. It also ranks No. 2 in both customer inquiries and future growth potential. The results reflect the growing importance of cybersecurity amid high attack rates. According to Broadcom, connected cameras accounted for 15 percent of all IoT attacks. A US News and World Report survey further shows 13 percent of respondents have experienced camera hacks, while 49 percent are worried about them. This has prompted vendors to design their products with cybersecurity in mind. Gallagher, for example, has launched their Controller 7000 with enhanced hardware and security infrastructure to optimize cybersecurity. Video surveillance equipment manufacturers are increasingly highlighting NDAA compliance where no key parts of components are made in China. With hacking and security breaches becoming more rampant, discussions and awareness over cybersecurity are all but likely to continue.

Unmanned security (drones and robots)

As for unmanned security such as drones and robots, it scored moderate suitability and maturity scores of 3.7 and 3.34, while ranking fourth in terms of growth potential in the near term. Unmanned security has been a much-discussed topic a few years back, yet user interest and enthusiasm seem to have diminished a bit. However unmanned security still has useful applications, especially in critical mission scenarios where monitoring by fixed cameras is insufficient. Mitsubishi, for example, has teamed up with 3S to offer a fire-prevention solution where drones are flying with both visible and thermal cameras, the latter of which can detect small fire points, which can escalate into larger-scale fires.

Tables:

Ranking of security technologies, by inquiries from customers

Ranking Technology
1 AI/Generative AI
2 Cybersecurity/cyber-defense solutions
3 Edge processing/storage
4 Hybrid cloud architecture
5 Unmanned security platforms
6 5G
7 Radar and lidar

Ranking of security technologies, by future growth potential

Ranking Technology
1 AI/Generative AI
2 Cybersecurity/cyber-defense solutions
3 Hybrid cloud architecture
4 Unmanned security platforms
5 5G
6 Edge processing/storage
7 Radar and lidar

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *