Sri Lanka News
In the past year, we have continued to see that the global security market is both dynamic and evolving. The term “security” no longer means simply protecting the perimeter of a building; it also involves securing corporate networks and sensitive data. In 2016, this trend was driven by a change in organisational threats. Businesses as a whole are much more focused on cyber-threats, a growing paradigm that challenges business and security leaders to stay one step ahead of crime and fr...
After two decades of advances from simple visual ID badges to smart cards, standards-based access control systems and mobile ID solutions, the industry began entering its next new chapter in 2016. We began “mobilising” security to make it more pervasive and personalised, with a better user experience. We entered a new era of secure connected identities will not only make us safer but fuel innovation in how we work, shop and play. The industry began paying much closer attention to p...
SourceSecurity.com’s Expert Panel covered a lot of ground in 2016 about a variety of topics in our Roundtable discussions. The very most-clicked-on Roundtable discussion in 2016 was about how to choose between a cloud-based system and a server-based system. Other hot topics that made the Top-10 list of Roundtable discussions included edge-based video storage, the challenges of commoditisation, and mistakes customers make when buying and installing security systems. Here is...
Again in 2016, the most well-trafficked articles posted at SourceSecurity.com tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2016 that generated the most page views. They are listed in order here with the author&r...
The shift from wired to wireless access control was expected to gather pace in 2016—and that has happened. This year we at Assa Abloy surveyed a large cross-section of security professionals, seeking their insight into the changing market. Comparing our data with research we did in 2014 showed a clear trend towards wireless access control. Wireless access data Our 2014 survey found 23% of commercial properties using a wireless or hybrid wired/wireless access control s...
The winds of change have swept into the access control market in 2016. The hardware is transitioning away from being solely panel-based, software is rapidly moving to the cloud, and credentials are going mobile. It seems that the security access control world is finally waking up from its technological slumber, and 2017 will be an exciting time. These three major trends are feeding off one another and are driving the growth all around. IP and edge based systemsIn 2016, hardware companies like...
Merger and acquisition activity has become a familiar topic in the physical security market. In 2016, SourceSecurity.com covered M&A news involving some of the industry’s largest companies, including high-profile names such as Tyco, Honeywell, Hikvision, ADT, and Ingram Micro. Here’s a look at the top 10 M&A stories in 2016, as covered by SourceSecurity.com: 1. Johnson Control and Tyco merge Johnson Controls and Tyco announced their merger into one comp...
Over the last year, we have continued to see the rise of manufacturers from China in the mid- to low-end market for video surveillance - a trend that currently shows no signs of tapering. Additionally, the shift from analogue to IP systems has remained consistent, with end users increasingly looking to network-enabled devices to mitigate risk from both a physical and cyber perspective. Complex network attacks in 2016 demonstrated the need for increased network security for network-connected dev...
The economy positively impacted the security marketplace in 2016 as end users have been more willing to invest in new security systems or upgrade existing systems. Organisations are breaking down department silos as it has become clear that security impacts everyone. Companies are realising they need to do more with the data they have. Utilising security system data Access control, video management, identity management and visitor management systems provide data that can help companies streaml...
Drastic increase in cybersecurity discussions is one thing that many of us in the security industry didn’t predict for 2016. Cybersecurity has obviously always been an important issue in general, but the discussion has gained a lot of momentum in the past year. As I said, this wasn’t predicted by most of us in the industry. The intensity of the focus on and discussion around cybersecurity in 2016 was a response to some of the high-profile denial of service (DoS)...
The end of the year is a great time to reflect on what the security industry has accomplished and to look ahead. We invited our Expert Panel Roundtable to weigh in on what they expect looking forward to the new year. Most industry-watchers are familiar with the major trends, but how will those trends play out in 2017? Specifically, we asked this week’s Expert Panel Roundtable: What will be the biggest headlines for the security marketplace in 2017?
With security, as with any business cost-centre, business leadership wants to find savings where they make sense. As a result, one of the trends we are seeing is that security departments are teaming up with other departments - IT, operations, marketing - to maximise their investment in security systems and leverage the data collected by their physical security sensors to inform their business strategies. Rise in cyber-attacks We have also seen a worrying increase in cyber-attacks, like the hi...
The past year has seen growth in the deployment and use of edge analytics, plus a significant emphasis placed on robust cybersecurity. The expectation for 2017 is that these two trends will continue to be a driving factor for value-based decision making of large, influential customers. IP camera product lines from reliable and well-regarded brands that include edge analytics and offer a trusted, secure platform will be at an advantage over those that don’t. Looking back at the expectation...
2016 was a year of fast-paced changes in the market for video surveillance, especially for higher-resolution and panoramic cameras. We spoke with Scott Schafer, Arecont Vision’s Executive Vice President, for his thoughts on 2016 and the year ahead. SourceSecurity.com: Did your predictions for 2016 match up with what you thought back at the end of 2015? How has the intervening year changed the thoughts? Scott Schafer: Looking back on our predictions for industry trends...
There has been a lot of investment in safe city projects around the world in 2016, particularly in India, where Qognify is currently involved in a number of major initiatives, as well as upgrading of security systems at major public transportation hubs and international airports. At Qognify, we have seen a continual trend towards organisations wanting their security systems to deliver operational efficiency and effectiveness to the wider business. Here are some notable trend...
The access control industry is now picking up the challenge of embracing new technologies The access control business has, over the last 10 years, completely changed its image from being a rather unattractive slow growth and conservative business to taking up a position as a fast-growing confident business. The access control industry has listened and acted on the needs of the stakeholders in the supply chain and as a result the world market for access control products and so...
New construction has continued to grow as a result of low interest rates in 2016 and that has positively impacted the security marketplace. Yet the limited availability of skilled labour is becoming a large issue as it leads to higher cost of labour. This also creates a challenge in recruiting, training, and retraining a capable staff in building construction and maintenance activities. As a result, there is a continued desire to improve our efficiency in production, commissioning and the manage...
The security market in 2016 saw an uptick in the economy, the introduction of new technologies, increased compliance requirements in key verticals, and rising concerns over the need for greater security. Users interested in upgrading or deploying new systems consistently chose networked system platforms. This trend further drove the demand for adaptive transmission solutions as a means of repurposing existing analogue infrastructure to accommodate IP devices on a networked platform. As this mi...
Access control and video management systems provide much more data than originally intended An organisation is a complex environment that is ever changing and continuously growing to include more servers, more buildings, more systems and as a result -- includes more risk, costs and threats. As a Chief Operations Officer looks at the many objectives across an organisation, he needs to evaluate how to increase profits, manage risk, and provide a cost-effective route for improvin...
If you want more security, you have to give up some privacy. The familiar trade-off will be tested to new extremes in the United Kingdom in 2017 when the recently ratified Investigatory Powers Bill, a.k.a., the “Snooper’s Charter,” takes effect. Based on the levels of high-tech government surveillance of UK citizens ushered in by the bill, Britons should be very secure indeed. Britain’s new law is the latest reflection of the struggle to balance intelligence agencies&rs...
Three key trends will continue dominating the security industry looking ahead to 2017 – cloud video, predictive maintenance and emergency preparedness. Cloud video The continued integration of cloud and hosted video into security programmes offers a lot of benefits for customers. The convenience of remotely viewing video footage in real-time or historic footage has been a great benefit to our customers and provides significant business intelligence. It helps with ever...
There will likely continue to be high numbers of lone wolf and soft target attacks in the year ahead. The drivers behind these tragedies are a confluence of self-radicalisation, social media, violent extremism, and mental illness. They will require our skills as security professionals — observation, investigation, interviewing, due diligence — like never before. Looming in the background of these physical attacks is the prospect of combined physical and cyberatta...
Dahua Technology, a world-leading manufacturer and supplier of video surveillance products headquartered in Hangzhou, China upgraded the security level for Banco de la Provincia de Buenos Aires (Banco Provincia). Banco Provincia is a publicly owned Argentine bank operating 342 branches and is Argentina's second-largest by deposits and total assets. Banks strive to safeguard negotiable & non-negotiable assets Banks strive to safeguard their negotiable (cash, bonds, etc.) and non-negotiable...
OneM2M’s participation in IoT Grand Slam to highlight IoT interoperability and Release 2 Key members of oneM2M will take part in a virtual panel session which will examine standards for Internet of Things (IoT) interoperability, drawing on key features from oneM2M’s latest set of specifications, Release 2. The discussion will highlight how the organisation is playing a vital role in providing interoperability across a vast number of IoT protocols and will outline o...
Pressure from online shopping is making it even more critical for brick and mortar stores to maximise the revenue per visit Analytics is trending hot for both video and data. The problem for many security video acquisition products is the old adage: bad data in, results in bad data output. The acquisition device has to be able to deliver on the promise to the end user and perform in challenging environments. What products, with what capabilities, are changing the video a...
The single largest group of consumer IoT devices being deployed is for home automation and residential security Business and technology analysts are in unanimous agreement that the number of IoT devices will explode into the many 10’s of billions within the next five years. These billions of new computing devices will produce enormous volumes of data about ourselves, our society, and our physical environment. The security industry is at ground zero of this upheaval. In f...
The holiday season generates 34% of annual sales for retailers but accounts for 37% of annual losses It is that time a year again, when shoppers and shoplifters converge on our retail outlets looking for that all important deal or steal. Peak shopping season This year, the National Retail Federation estimates holiday spending will rise 3.6% from 2015 to more than $655 billion. While the peak shopping season used to be defined as the time between Thanksgiving and Christmas Ev...
Innovation is not an end goal but an ongoing process that must be sustained Regardless of market, the challenge of commoditisation is very real for manufacturers as companies producing lower-end products continue to imitate the most advanced technologies. This creates a perception among customers, and the marketplace in general, that even leading-edge products with greater features, functionality, and value are indistinguishable from others on the market. As a result of commod...
Merging objectives into a business relationship requires ongoing communication along with a shared vision and values A myriad of books has been written on business relationships. From establishing and maintaining business relationships to compensation issues and contract terminations, there’s a how-to book out there on most every aspect of business. While I have never published a business “how-to” book, I do have the benefit of experience in successfully navi...
In a fast-moving market like physical security, sharing information is an essential component of growth. However, there often seems to be more information available than an integrator or end user could ever digest and put to use. How does one go about finding the information he or she needs in an environment that can seem to be drowning in information (sometimes the wrong information). We asked this week’s Expert Panel Roundtable to share their strategies and suggestions. Specifically, we...
Browse security news
- By event
- 11th National Conference On CFIUS
- RSA Conference 2025
- RSAC USA 2025
- 19th Annual Flagship Conference on Economic Sanctions Enforcement and Compliance
- G2E Asia + Asian IR Expo 2025
- Airport Show 2025
- Secutech Taipei 2025
- 6th European Forum on Global FDI Reviews
- Infosecurity Europe 2025
- Security LeadHER 2025
- 16th Advanced Forum on DCAA & DCMA Cost, Pricing, Compliance & Audits
- View more
Featured products
Related videos
Enhanced security with S617 video door station
Remote Guarding Video Series Part 1: Overview and Basics.
Remote Guarding Video Series Part 5: Future and Technology
The ultimate guide to mastering key control
DownloadUsing artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
Download- Sri Lanka Security companies
- Sri Lanka Manufacturers
- Sri Lanka Distributors
- Sri Lanka Resellers / Dealers / Reps
- Sri Lanka Installers
- Sri Lanka Consultants
- Sri Lanka Systems integrators
- Sri Lanka Events / Training / Services
- Sri Lanka Manned guarding
- Sri Lanka Training organisations
- Sri Lanka Associations / regulatory bodies
- Sri Lanka Event organisers
- Sri Lanka Media
- Sri Lanka Recruitment / personnel
- Sri Lanka Services