+44 01483 457477
Advertisements

Hassan El-Banna, Sr. Business Development Manager Middle East, Turkey & Africa (META) at Genetec gives us in AMEInfo, a Look out at these physical security trends in 2022.

Standardization of open and interoperable solutions across smart cities, faster hybrid cloud adoption, and a tighter focus on supply chain risks are some of the top physical security topics to keep an eye on

  • Organizations are employing spatial analytics data to cut wait times
  • Video analytics apps will be easier and more cost-effective to implement at scale
  • Smart city investments would reach $203 billion by 2024

The long-term impacts of the pandemic and other geopolitical events will generate new technical developments and considerations in 2022. Standardization of open and interoperable solutions across smart cities, faster hybrid cloud adoption, and a tighter focus on supply chain risks are some of the top physical security topics to keep an eye on.

Top physical security trends in 2022

Monitoring occupancy and space usage will continue to be a significant focus.

Occupancy tracking is still expanding nearly two years after the pandemic began, as businesses see value in the data collected. Organizations are employing spatial analytics data to cut wait times, manage staff scheduling, and improve company operations, in addition to safety goals.

Corporate organizations are also figuring out how to make their workplaces more efficient by splitting their work time between the office and home. The use of data on space utilization translates to increased operational efficiency, better resource management, and significant cost savings.

Large-scale deployments of video analytics will become more feasible.

Video analytics solutions have been in high demand in recent years. More companies are keen to invest as AI techniques such as machine learning, and deep learning continues to increase the power of analytics. However, complex video analytics still necessitate extremely powerful servers for appropriate data processing, making them impractical for large-scale adoption.

We predict that by 2022, video analytics apps will have matured to the point that they will be easier and more cost-effective to implement at scale.

Cybercrime will continue to evolve, requiring new approaches.

According to an analysis by Cybersecurity Ventures, global crime expenditures are expected to exceed $10.5 trillion annually by 2025. This is the most significant transfer of economic wealth in history, with a growth rate of 15% per year. According to the EMEA Physical Security in 2021 survey results, with the rise of work-from-home and the growing adoption of IoT, 48% of MEA respondents believed in the prioritization of the implementation of better business continuity plans. Against this backdrop, 67% of respondents planned to prioritize the improvement of their cybersecurity strategy in 2021. Cybersecurity concerns will continue to be a priority in 2022, with companies needing new approaches to face the growing cybercrime risks.

Businesses will need to be agile and sensitive to the expanding threat landscape as more devices come online and data processing becomes vital to operations. Customers want companies to keep their data safe and secure. Thus businesses must provide more openness. This will bring in a new cybersecurity model based on continuous verification rather than network and system hardening, alongside an increased focus on choosing partners who offer better degrees of automation.

The smart city movement will be aided by open architecture.

Smart city investments would reach $203 billion by 2024, according to a report titled IDC FutureScape: Worldwide Smart Cities and Communities 2021 Predictions. These smart towns are gathering massive amounts of data and seeking to improve urban safety and liveability. According to the IMD-SUTD Smart City Index 2021, the UAE ranks 29th amongst the world’s smart cities, with 78.5% of the respondents believing in the importance of data-driven physical safety procedures such as facial recognition as a part of necessary processes to improve law enforcement.

The ecology of the smart city also includes intelligent structures. Various businesses are attempting to evaluate data from different sensors and automate procedures. The problem is that this necessitates a shift away from proprietary solutions by cities and corporations. Human and data silos are inherently created by the closed-architecture concept, which stifles growth prospects.

By focusing on open and interoperable solutions, decision-makers will get the most out of their current technology investments by improving data sharing and collaboration. Longer-term, they’ll become more adaptable to changing requirements and more self-sufficient in data unification and ownership.

Adaptable access control technology will continue to be adopted by businesses.

Today’s businesses want more from their access control systems. They desire more flexibility in hardware choices, streamlined processes, and increased convenience for those who pass through their buildings daily.

Many businesses had to get innovative to comply with increased health and safety regulations during the pandemic. Regardless of where they are on the return-to-work spectrum, organizations today recognize that the new normal necessitates agility. This is why they’re investing in PIAM systems (physical identity access management).

Businesses may automate employee and guest access requests and remotely alter access rights for all employees using a self-service PIAM system, ensuring greater safety and compliance. Additionally, by combining access control and PIAM systems, onsite movement may be tracked, making it easier for businesses to spot possible COVID-19 transmission. We expect this trend toward more modern and adaptive access control systems to continue as the new year progresses.

Supply chain operations will receive more attention and emphasis.

Organizations are under pressure to evaluate their entire supply chain ecosystem as cyber threats get more sophisticated and global disruptions influence supply management everywhere. During the SolarWinds Attack, a flaw in its own IT resource management system exposed over 18,000 customers to malware, including Fortune 500 firms and US government agencies.

More enterprises and government agencies will widen the scope of their cybersecurity policies to create baseline security criteria for the products they acquire and the vendors they engage with, in a world where organizations no longer have clearly defined network perimeters.

Any supply chain issues in obtaining physical security equipment will encourage firms to become less reliant on proprietary solutions from a single provider. Should product availability, best practices, or lack of transparency for a specific vendor be questioned, decision-makers will be able to browse different vendor options and easily change out system components.

More businesses will migrate to the cloud and use a hybrid deployment model.

 The adoption of cloud computing is increasing. While many businesses aren’t ready to make the entire leap to the cloud, many are looking to the hybrid cloud deployment approach as a way to try out new apps.

As more physical security teams begin to experiment with cloud apps, the advantages of hybrid cloud will become clear. This will propel the use of cloud technology even further forward this year.