What is on the Horizon?

What is on the Horizon?

The security industry has a long history of pushing the technology envelope. Whether taking quantum leaps or building incrementally on past achievements, we’re in constant forward motion. While no one can guarantee how that will play out in 2021, here are a few observations about where I think we are going.

MEETING NOVEL CHALLENGES WITH NOVEL SOLUTIONS

Technology continues to advance at an accelerated pace. Software and hardware are being integrated in novel ways to create smarter solutions. We are seeing more solutions being designed to serve multiple purposes from safety and security to business operations. What’s driving these trends? Some of the impetus is simply the natural evolution of technology and the fiexibility that networks offer. Another thing spurring innovation is the need to respond to crises. As the well-worn adage says, “Necessity is the mother of invention.” COVID-19 is no exception. During 2020, many IP devices— originally designed for security—have been integrated with other technologies and put into service in new ways.

For example, hospitals using IP cameras and networks to scale their ability to visually monitor patients remotely, ef- flciently manage resources and rapidly respond to emergencies. They are using audio and object detection analytics to recognize a patient in distress from a fall, injury or other difflculty, and expedite lifesaving response. They’re using in-room video cameras to monitor patient vital signs remotely through integrated telemetry systems. In today’s COVID world, this greatly decreases the frequency of inperson encounters between patients and medical staff thereby reducing exposure and the risk of transmitting the virus— and ultimately improving healthcare outcomes.

COVID-19 will continue to have a major impact on how the world operates in the coming year. To help their customers remain safe and protected in this new reality, security professionals will flnd themselves creatively adapting traditional surveillance and security devices to new roles and employing new technologies–offering solutions for touchless entry, social distancing and virtual interactions designed to contain the spread of the virus. With lessons- learned and resourcefulness in mind, technological advancement, integrated network solutions, and future challenges will increasingly create opportunity for IP solutions to add value.

OVERCOMING ERODING TRUST IN INSTITUTIONS AND TECHNOLOGY

It is no secret that trust in business, government, media and NGOs has been eroding for a while. Trust comes in many forms: being an honest and transparent partner, standing behind your products and following a consistent business model. Furthermore, it’s crucial to deliver products that can capture, process and store data responsibly and protect against cyberattacks. This starts with forward-thinking and best practices in the design, development and testing of products in order to minimize risks.

As security professionals, we need to embody a strong business ethic, one that resists corruption, demonstrates social responsibility, and personifles good global citizenship. We must manage that flne line between protecting individual privacy and providing sufflcient surveillance to make the community feel safe and secure in public and private environments. It is a dynamic landscape that that requires navigating changing attitudes and regulations both within the United States and across the globe.

DRIVING NEW APPROACHES TO CYBERSECURITY

As the technology ecosystem continues to expand, so, too, does the threat landscape. With an exponential growth in connected devices, the need for heightened cybersecurity measures is more important than ever. This has led to some important trends in the areas of zero trust networks, layered cybersecurity, lifecycle and device management and OEMs.

Zero trust networks. To counter the high risk of a permeable network, companies are adopting the philosophy of “never trust, always verify” everyone and everything trying to connect to their systems, before granting access. In zero trust networks, the identity of an entity is veri- fled multiple times in different ways, depending on its behavior and the sensitivity of speciflc data in the network being ac cessed. Network micro-segmentation lets businesses apply varying levels of security to specific parts of the network where more critical data resides. Granular network perimeter security – based on users and devices, their physical locations, and other identifying data – determines whether their credentials can be trusted to access the network.

Layered cybersecurity. Another trend gaining traction is hardening a device’s operating core where sensitive information such as end-user data, log-in credentials and network access certificates reside. In the coming year, I expect more manufacturers will be incorporating chipsets encoded with protective features like device identification to prevent port hijacking, secure boot and signed firmware checking to prevent unauthorized or malicious downloads. They’ll be implementing a more layered approach to cybersecurity so that each layer of hardware and software shields the layer below with additional security features. To further reduce cyber vulnerability, we’ll see more manufacturers automating procedures to ensure that customers implement changes, upgrades, and patches throughout their ecosystems in a timely manner.

Device management and lifecycle management. Two other aspects of cybersecurity coming to the forefront are individual device management and comprehensive lifecycle management of the entire surveillance solution. With cyberattacks becoming increasingly numerous and sophisticated, it’s becoming even more important for manufacturers, integrators and end users to work together to institute consistent hardware, software and user policies that conform to cybersecurity best practices and continue over the lifetime of the ecosystem and its individual components.

Fewer OEM relationships. OEM partnerships will become less common as it is difficult for the end-user to know the real manufacturer, which is a must for valid cybersecurity processes.

SHIFTING MORE COMPUTING TO THE EDGE

Billions of devices are already connected to the network and this number continues to increase exponentially. With all that potential computing power at the edge, there’s more momentum for manufacturers to harness that in-camera resource to help customers detect and identify threats, and make split-second decisions on how to mitigate them.

Driving the move to edge-based processing is the opportunity for customers to reduce system complexity and lower their operating costs. They can build faster and more scalable systems, and facilitate more complex, real-time analysis of events at the point at which they occur, which can lead to more timely response to incidents.

In the coming year we’ll likely see more powerful edge devices embedded with deep-learning processing units (DLPU). These devices will provide a perfect platform for third-party developers to create analytics based on AI and deep learning that can provide more granular object classification and more predictive behavior analysis. Furthermore, because these deep learning programs only transfer relevant video over the network, customers will be able to lower bandwidth consumption and reduce their storage needs. With the improvement in analytics accuracy, customer will also experience fewer false alarms which will lead to additional cost savings and more efficient use of human resources.

REACHING FOR MORE PREDICTIVE ANALYTICS

Inspired by the way the human brain processes information, manufacturers will continue the trend of building cameras embedded with deep learning processing units. Developers will be able to use these DLPUs to improve the reliability of their video analytics algorithms and enhance surveillance, security and business processes.

These deep learning tools correlate the massive amount of data collected by devices and sensors to train the analytics to better recognize patterns, classify information and make decisions by labeling and categorizing what the camera sees. While it will still take some discernment on the part of customers and integrators to separate hype from fact, the opportunities for deep learning solutions will rise as the technology matures. With continued investment in refining this learning process, I expect we’ll see dramatic increases in video analytics accuracy, and a demand for these solutions, in the coming years.

BRIDGING THE EDGE AND CLOUD COMPUTING DIVIDE

As we look towards 2021, with more processing power available in edge devices, hybrid computing solutions will become an emerging trend. Companies will be looking to implement smart architecture that directs processing tasks across the edge, core, and cloud to wherever it makes the most sense. These multi-tiered solutions will give customers the flexibility to deploy and manage their ecosystem more efficiently and more cost-effectively. The traditional client-server model alone presents limitations, inefficiencies and network performance issues due to centralized cloud servers that must respond to a multitude of device requests.

Leveraging a hybrid edge-cloud model—where central and edge computing resources are combined—can reduce cloud hosting costs, bandwidth and latency issues. With more powerful devices companies will be able to take better advantage of processing at the core, the cloud and now, the edge—essentially where another server can process significant amounts of data on the device.

As an added benefit, edge devices offer an unparalleled level of built-in cybersecurity features. Many of these devices can be managed with on-premise tools that allow users to perform device configuration, back up, firmware upgrades and manage cybersecurity controls—ensuring a greater level of security than cloud environments.

MITIGATING RISKS AND CAPITALIZING ON OPPORTUNITIES

As in past years, the security industry will have its hands full mitigating the risks of cyberattacks, navigating regulations on privacy, information collection and storage, and meeting customer demands for tools that can help them be more proactive in protecting their people, property, and electronic data. But with each challenge there comes new opportunity to devise new technologies and solutions to create a smarter, safer ecosystem that can better meet customers’ security and business needs.

This article originally appeared in the November / December 2020 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3