Download PDF version Contact company

Genetec Inc., the global pioneer in enterprise physical security software, shared the results of its 2025 State of the Physical Security Report.

Based on insights from more than 600 physical security pioneers, including end users, channel partners, systems integrators, and consultants based in the Middle East, Turkey, and Africa (MEA) markets, the report offers a comprehensive analysis of evolving trends in physical security operations.

Hybrid cloud adoption

According to the report, 48% of META end users envision hybrid deployments as their preferred approach within the next five years, compared to just 22% favouring fully cloud-based implementations and 25% planning to remain fully on-premises. This preference for hybrid-cloud is echoed by consultants and channel partners, with 53% of consultants planning to recommend hybrid deployments in the next five years.

This data not only reflects the rising demand for adaptable deployment models in the region but also highlights a measured approach to cloud adoption as the industry matures.

Digital transformation and operational resilience

In the META market, where digital transformation and operational resilience are top priorities, the evolving role of physical security is critical," said Firas Jadalla, Regional Director – Middle East, Turkey and Africa (META) at Genetec.

"By placing IT at the center of hybrid and cloud implementations, businesses can make security operations more resilient, data-driven, and adaptable to the region's dynamic threat landscape, safeguarding both people and digital assets effectively."

IT departments become central to decisions

The need to align physical and digital security has led IT, teams, to take an increasingly prominent role

A decade ago, physical security systems in large organisations were typically managed by personnel in specialised security departments.

However, the increasing adoption of cloud and hybrid-cloud solutions, the rise in cybersecurity threats, and the need to align physical and digital security have led IT, teams, to take an increasingly prominent role in influencing the acquisition and deployment of physical security systems.

Physical security and information technology

According to the report, 78% of end users in the META region say physical security and information technology (IT) departments work collaboratively. 

Additionally, IT departments are taking on an increasing role in the buying process, with over 50% of end users, systems integrators, and consultants reporting that IT teams are actively involved in physical security purchasing decisions.

AI grows as the industry prioritises practical applications

The report reveals a significant rise in the interest toward AI adoption in physical security, with 46% of end users planning to implement AI-powered features in 2025, up from just 14% in 2024.

This heightened interest aligns with a strategic, purpose-driven approach. With 49% of end users seeing AI as a tool to streamline security operations, organisations are focusing on practical applications, such as refining threat detection and automating routine processes, with intelligent automation as the ultimate goal.

Download PDF version Download PDF version

In case you missed it

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Marin Hospital enhances security with eCLIQ access control
Marin Hospital enhances security with eCLIQ access control

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

Mitigating cybersecurity risks in industrial control systems with Honeywell
Mitigating cybersecurity risks in industrial control systems with Honeywell

Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partne...

Quick poll
What is the most significant challenge facing smart building security today?