What are the most promising new technologies in security?
Editor Introduction
New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?
One of the most promising trends in physical security is the growing adoption of hybrid-cloud technologies. Hybrid solutions offer a flexible balance between on-premises and cloud-based systems, enabling centralised monitoring, reduced maintenance, and streamlined hardware deployment. Cloud-managed appliances further simplify this process: They enable the connection of legacy systems to the cloud and significantly reduce costs and deployment time. This approach lets organisations modernise at their own pace while optimising efficiency and performance. In addition to hybrid cloud technologies, work management solutions are poised to revolutionise how physical security teams collaborate, communicate, and manage their tasks. By integrating security dispatching, work ticketing, and activity tracking into a single platform, these new solutions enable users to manage tasks more effectively ,maintain real-time visibility of their operations, and collaborate seamlessly across teams.
First introduced in 2018, the AV1 video encoding standard from the Alliance for Open Media (AOM)—an open-source, license-free coding format designed specifically for efficient network video transmission—is just now starting to make a positive impact on the physical security space, and it'll only continue to improve security as support for it grows. AV1 delivers high-quality video at low bitrates, effectively reducing bandwidth consumption and storage costs, and allowing for robust systems without breaking the bank. Beyond this, hybrid solutions are also starting to make an impact on the industry, with organisations combining edge, cloud, and on-premise technologies to create unique systems tailored toward their business goals. Hybrid solutions will be the most flexible option for designing architectures tailored to specific organisational needs, while also enabling seamless system scalability. And, though not new, continued adoption of AI and analytics will unlock more possibilities in security, transforming the industry as we know it.
The physical security industry is experiencing exciting advancements, with Artificial Intelligence (AI) leading the charge. Early AI-powered security systems already excel at identifying people, vehicles, and objects. However, the next frontier lies in systems capable of understanding the context and relationships between these elements to predict and effectively mitigate potential threats. Achieving this will require addressing challenges such as minimising biases during AI training and safeguarding privacy rights, which remain critical considerations. Another promising development is the adoption of AV1, a licence-free video compression algorithm. With efficiency comparable to H.265 HEVC and native support in major web browsers, AV1 eliminates licencing barriers, paving the way for broader adoption of cloud-based surveillance systems. Its potential to reduce storage and bandwidth requirements could significantly enhance the scalability and cost-effectiveness of modern video surveillance solutions.
It’s easy to mention AI as the most promising since we are still very much at the beginning of what is possible. However, I would like to focus on how AI can be deployed on the edge for physical security and on the importance of doing so via an open architecture. It is no secret that the security industry follows trends in the larger IT world. An example of a trend is the evolution of edge processing and, specifically, how edge devices can work together and share resources. An example of this is Docker, a container technology that is like lightweight, portable packages that carry everything needed to run software—a development platform. At the edge, they allow applications to work consistently across devices, process data locally, share compute resources between devices, and update quickly, enabling faster responses and reduced reliance on central servers. i-PRO recently added Docker support to its X-series line.
The most promising new technologies in the physical security industry are those that can effectively drive recurring monthly revenue for integrators. Those technologies are often ones that allow the integrator to offer a service to end users. This is a win-win situation in that the integrator can position themselves as an expert in offering that service which could result in better outcomes for the end-user in terms of experience and safety because a dedicated, professional organisation with deep expertise in offering that service is working with the end-user. Security maintenance is a topic full of pitfalls and gotcha’s that an end-user may not realise until after an incident and after missing critical evidence. An integrator who does this across many customers and many locations can be a much more reliable and beneficial alternative.
AI-enabled biometric verification has ushered a new paradigm to traditional physical card issuance. While traditional issuance software adequately secures cardholder data, identity verification remains the weakest link in the issuance workflow. Verification methods like the visual inspection of a driver’s licence or passport introduce sizable risks, leaving organisations vulnerable. Instead, a remote digital identity verification workflow not only offers a significant boost in security but also unlocks additional cardholder and card office advantages. An identity verification workflow can be connected to issuance software to secure the handoff of cardholder data throughout the entire issuance process. As a result, cardholders can perform digital onboarding from the comfort of their home, and card offices can enhance efficiency with self-service issuance stations, knowing the cardholder has already been verified remotely. Adding digital cardholder identity verification to an organisation’s issuance platform strengthens security for the card office while elevating the cardholder experience.
AI and IoT are redefining physical security, with AI-driven video analytics setting a new standard by cutting down false alarms and improving threat detection accuracy. This shift from reactive to proactive monitoring allows systems to distinguish between real threats and everyday activities, helping operators respond more effectively. IoT integration enhances this by creating a seamless, data-rich environment where multiple devices provide a cohesive view, improving response times and enabling a flexible approach to security needs. Mobile access is also transforming how security professionals manage systems, allowing users to monitor, adjust, and troubleshoot alarms directly from their devices. This capability adds a new layer of responsiveness, making it easier to support customers with real-time assistance and efficient issue resolution, even from the field. Cloud-based technologies further support these innovations by enabling subscription-based services for ongoing monitoring, secure video storage, and more, strengthening customer loyalty through continuous value.
The physical security industry is undergoing a seismic shift. What was previously quite low-tech, characterised by perimeter protection, alarm management, surveillance, and physical security guards, is being revolutionised by high-tech solutions and innovations. This industry is following the lead of the technology giants and will benefit from the inventions and innovations they develop such as quantum computing, cybersecurity, generative AI, autonomous systems, and sustainable technologies. These are promising developments as the security industry seeks to anticipate higher-order threats and sophisticated attacks. The industry will demand faster calculations enabling real-time decision making at the edge. Megatrends around minimising environmental impact will increase demand for sustainable provenance. And, as AI becomes ubiquitous across all industries, it will be expected as a tool for efficiency and continuous improvement. Underlying cloud-native technologies are laying the foundation for these innovations which are already beginning to change the security landscape.
We live in a digital world, and everyone is looking for a unified, seamless experience in all aspects of life. At this point, most people expect it. This includes the physical security industry. The future of physical security lies in the seamless integration of intelligence-driven solutions. As industries continue to embrace interconnection, the possibilities for transformation are broad. With fully integrated intelligent solutions, personnel can access all critical information in real-time through a single platform, eliminating the time-consuming process of analysing disparate data streams. We have seen first-hand how mobile integrations for emergency response have impacted rural communities that rely on volunteer emergency responders. That use case has the potential to make huge impacts across the globe. We also have seen how security intelligence can assist in situations like mass riots and violent protests to pinpoint instigators. There is so much opportunity on the horizon.
The growth potential of AI-driven technology is immense, revolutionising physical security through tech-enabled services like remote and proactive video monitoring. These services enhance threat detection and enable incident prevention by continuously monitoring and anticipating risks, empowering security teams to respond swiftly and effectively. With seamless scalability, they can integrate real-time analytics and live audio capabilities that enable operators to actively deter intruders or intervene before incidents escalate. Leveraging IoT connectivity and cloud-based platforms, unified, scalable services will support greater levels of remote oversight and rapid response. This convergence of technologies is redefining security services and establishing a new benchmark for adaptive, intelligent protection.
The most promising new technologies in the security industry are those that are being created that can replace the long-used VPN. Throughout the past several decades, VPNs provided the best available cybersecurity choice. However, the full pathway of the transmission packets within VPNs contains many types of vulnerabilities. This has allowed for a variety of ways in which VPN vulnerabilities can be exploited, which puts associated networks, applications, data, and physical facilities at risk. These VPN security incidents are happening more often. When security/safety systems depend upon VPNs, these inherent vulnerabilities put the safety of those in the associated facilities at risk. This makes moving to zero Trust architecture an important consideration for organisations that are targeted, and those that depend upon having a secure environment to keep activities going, such as within hospitals and surgery centres. Tools that do not need open network ports, and that can strongly encrypt the transmissions, are particularly impressive because they increase the security, and safety, of those using such technology by helping to ensure the technology is not turned off, modified, or otherwise corrupted. For safety, this would be a huge improvement for Internet of Things (IoT) products such as security cameras, alarm systems, medical devices, and intruder detectors.
Over the past year, as I have become more integrated into the physical security industry, it has been fascinating to witness the significant progress and potential for innovation in addressing modern challenges. Among these, the rise of disinformation stands out as a critical concern for end users, integrators, and manufacturers. As AI-generated manipulations and deepfakes grow increasingly sophisticated, the need for technologies that protect video and digital assets at the point of creation is vital. Proactive approaches that assign a unique cryptographic fingerprint to every video frame, sound bite, and pixel at the point of creation and securely store them on an immutable blockchain ledger have garnered considerable attention. By authenticating content at its creation, we can build trust and ensure the integrity of video surveillance data. This helps organisations stay ahead of threats and maintain confidence in their security investments. And, I believe, the more trust we build as an industry, the more confidence people will have in our security strategies overall.
Editor Summary
New technologies in the physical security industry include artificial intelligence (AI), AV1 video encoding, hybrid-cloud technologies, and edge processing, among others mentioned by our Expert Panelists. Embracing these and other new technologies pave the way for more efficient and productive operation of our industry’s systems, all to the benefit of protecting people, facilities, and assets – and to make the world a safer place.
Which challenge do you see as the biggest barrier to wider AI adoption in physical security?
- Related links
- HID Access control readers
- Biometric Access control readers
- Control Software CCTV software
- Card Swipe Access control readers
- Standalone / Networkable Access control readers
- IP Surveillance Software CCTV software
- Management Software CCTV software
- Monitoring Software CCTV software
- Proximity Access control readers
- Surveillance Software CCTV software
- Smart Card Access control readers
- Related categories
- CCTV software
- Access control readers