Which security technologies are becoming outdated or obsolete?
Editor Introduction
When technology performs a required task effectively, there is little reason to upgrade to the ‘next big thing’. In this regard, the physical security market is notoriously slow to change.
Much of yesterday’s most robust and dependable equipment is still in place at thousands of customer sites, still performing as well as the day it was installed. However, there comes a point when any technology becomes outdated. We asked this week’s Expert Panel Roundtable: Which security technologies are becoming outdated or obsolete?
Security technology is constantly evolving. In the real world, there will always be individuals or parties looking to break protocols and overcome systems, in order to gain unauthorised entry. It is inevitable then that some technologies simply become too vulnerable to targeted attack, to remain viable for any significant level of security. Technologies, such as 125 kHz proximity readers and cards, have largely become obsolete, due to the ease of cloning this technology. Unfortunately, the technology required to overcome these readers is cheap and readily available to anyone looking to purchase it. Additionally, magnetic stripe cards for access control have similarly been superseded by hackers and technology designed to circumnavigate their once robust security. Many legacy systems still have their uses (particularly where specialist components are involved), but their usefulness needs to be weighed against the level of potential threats, the value of the premises and contents being protected, and the budgets available.
As we shift more and more to IP solutions, anyone still utilising analogue products is running the risk of having an outdated and vulnerable system. The COVID-19 pandemic has impacted the access control industry across the board. One of the most obvious outcomes is the emphasis it has put on investments into new systems, retrofits and integrations to support hygienic access, such as touchless solutions. Going beyond having updated infrastructure to utilise these new technologies, it is also no longer enough to have just a surveillance system or an intercom. There is more demand for hybrid solutions that enable security teams to visually confirm access, as well as communicate audibly with visitors and staff.
Proprietary, vertical, single-vendor solutions are becoming outdated. Traditionally, the popularity of open vs. proprietary solutions has been somewhat cyclical. However, the changing requirements of today’s customer environments dictate the obsolescence of proprietary systems. The driving factors include:
- Today’s systems are often required to transcend beyond traditional loss prevention and safety roles, so as to support an organisation’s mission and competitive advantage.
- This competitive advantage increasingly requires best-of-class solutions that include AI and analytics. Proprietary solutions can only deliver limited solution sets and cannot maximise this impact.
- Today’s security integrators must have strong IT skills to effectively service their customers. These skills enable integrators to overcome the one downside of open systems, the need to integrate and support these best-in-class solutions.
- With the rapid rate of change in new technologies, open best-in-class solutions enable adoption of new technology, without abandoning the full investments made in proprietary systems.
It’s less about which technologies are becoming obsolete and more about how they can be updated and integrated to improve health and safety of building occupants. For example, a video camera is a foundational component of a security strategy, but with the Cloud and analytics, it can do so much more. Where security personnel previously had to manually comb through hours of security footage to identify a grainy face or make out a licence plate number, a video system can now be part of a prevention strategy. Newer technology, such as thermal cameras, goes one step further to help maintain health, by alerting management if someone has an elevated skin temperature. Once integrated with access control, having knowledge of who is in the building helps contact-tracing efforts. When talking about which technologies are becoming outdated, it is those that are siloed, manual and don’t improve overall health and safety.
Traditional burglar alarms systems have plagued both businesses and law enforcement for years, inundating 911 call centers with false alarms. The result is costly fines for businesses and unnecessary deployment of vital police resources. Thankfully, these older alarm systems are becoming a thing of the past, as video verified alarm services all but eliminate false alarms, saving some companies thousands of dollars in fees. Many businesses already have security cameras in place, so it’s a ‘no-brainer’ to connect these two systems together. It is no surprise that police departments have become fatigued by false alarms and as a result, rarely respond in time to make an impact. In contrast, video verified alarms elicit a priority-one response from police, since it is a professionally verified crime in progress. Video verification has become the new standard in protection, giving confidence to managers and owners, while saving time and money.
With COVID-19 being at the forefront of everyone’s mind and with an eye on infection control, access control methods that require any form of touch now look increasingly outdated. Fingerprint readers, keypads and palm scanners may well become obsolete, with a drive towards hard credentials and biometrics. Even when it comes to visitor management, touch screens upon entry to secure sites suddenly could be replaced with visual verification or CCTV analytics.
As we move forward, hardware-defined cameras that perform certain tasks find themselves seriously challenged. The market is ripe for a revolution, as the development of AI technologies and sensor richness continue to increase, setting a new pace in innovation. Hardware development cannot keep pace and the development cycles are simply too long. For end users, this means longer wait times to reap the benefits of new technologies, as well as investing in new hardware more frequently. This paves the way for software-defined devices to become more commonplace and serve as the main vehicles for ushering in innovation to the market, a cycle already acknowledged in the smartphone and TV industries.
It seems odd to talk about obsolete technologies in an industry that embraced VCRs, until just a few years ago and I would bet more than a few are still in use. However, the improved imaging of digital IP cameras has quickly convinced most that analogue video needs to go. As much of an advance as IP video has been, storing large high-resolution image files have hampered the growth of digital video. But now cloud storage and retrieval, along with advances in indexing and searching, have greatly mitigated those issues and high-resolution images are now the norm. Another advantage that Cloud brings is the ability to merge security data from multiple sources, so as to produce a more holistic view of the estate and the status of what is being protected. Gone are the days of siloed access, video, fire, and intrusion systems.
Editor Summary
In access control, 125 kHz proximity and magnetic stripe cards have mostly outlasted their usefulness, haven’t they? In video, analogue systems have been far surpassed by newer technology. Also, proprietary systems in general, which are difficult to integrate with other technologies, offer decreasing usefulness in an age, when everything needs to be connected.
- Related links
- Johnson Controls Limited Access control systems & kits
- TDSi CCTV cameras
- TDSi Access control software
- TDSi Access control systems & kits
- Johnson Controls Limited Access control readers
- TDSi IP cameras
- TDSi Access control readers
- TDSi IP Dome cameras
- TDSi Access control cards/ tags/ fobs
- Card Access control cards/ tags/ fobs
- Biometric Access control software
- Biometric Access control systems & kits
- Magnetic Stripe Access control cards/ tags/ fobs
- Biometric Access control readers
- Proximity Access control systems & kits
- Standalone / Networked Access control systems & kits
- Network IP cameras
- Proximity Access control cards/ tags/ fobs
- Indoor/Outdoor Dome cameras
- Indoor/Outdoor IP Dome cameras
- Thermal CCTV cameras
- Standalone / Networkable Access control readers
- Proximity Access control software
- Thermal IP cameras
- Magnetic Stripe Access control readers
- Central Monitoring Option Access control software
- Proximity Access control readers
- License Access control software
Expert commentary
- Global regulations of AI: the role and impact on the physical security industry
- Mind the gap: Addressing cybersecurity at every phase of technology management
- When choosing an access solution, make Total Cost of Ownership a key part of the calculation
- How Californian cities are improving surveillance and security - key developments from 2022 to 2024
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
DownloadDahua 4MP WizColor Bullet Camera with Fixed-Focal and WizSense AI
Hikvision WonderHub: Interactive Displays for Collaboration
Verkada GC31 Cellular Gateway for Seamless Device Connectivity