A Snapshot of Market and Technology Trends for 2015

January 15, 2015

2015 TrendsFrom the entire Genetec team, we wish everyone a very happy New Year! 

If 2014 taught us anything, it's that there is never a dull moment in our industry. The momentum of change is constant; and if the evolving technological advancements of cloud solutions, security devices and computing power weren't enough to raise some eyebrows, the shifting dynamics of major business relationships and mergers between big industry players did. 

However, this is the nature of the industry we thrive in. This coming year, we will likely witness some familiar themes that kicked-off 2014 play an even larger role in our industry, while we anticipate newer trends that will define this New Year. Here are a few thoughts on what we expect to see in 2015. 

1.       Extending Security Systems with Hybrid Cloud Capabilities - 2015 marks the year when additional applications for cloud-enabled solutions will become available. Larger organizations will leverage the cloud's inherent flexibility to complement existing on-premise servers with cloud-based storage for longer-term retention, redundant archiving or other application-specific needs. In a number of situations, the cloud presents an easier and more economical growth strategy for expanding storage requirements, which can be phased in over time. 

2.       Holistic View of Security and Unification - Whether to benefit from operational or cost efficiencies, or both, customers are actively seeking to merge more and more security systems into a single unified security platform. Unification offers a more comprehensive and holistic view of a security environment, one that extends beyond security to encompass communications and business systems. This one-platform mentality will continue to drive security objectives, with simplicity and effectiveness at the core of decisions.  Beyond access control and video integration, unification should take other core security systems, including intrusion, intercom, and license plate recognition into consideration as well.  

3.       High Performance Computing and Ultra HD/4K Cameras - The last few years were all about HD and megapixel cameras, and in 2015, the availability of new, ultra-HD devices, such as 4K cameras will continue to drive adoption of higher resolution cameras. This trend will increase pressure on VMS manufacturers to leverage high performance computing (eg. using a graphics card's GPU for advanced decoding capabilities as opposed to a workstation's CPU) to display greater numbers of HD cameras from a single workstation, at greater resolutions and higher frame rates. The ability of a VMS to manage higher throughput on servers will allow customers to benefit from these cameras, while minimizing their investment in additional hardware. 

4.       Growing Appetite for Everything IP and SIP-enabled Intercom: With more and more devices and systems connected to an IP network, organizations are looking to facilitate internal and external communication by incorporating SIP-enabled intercom solutions within their security environment. Leveraging the SIP standard will allow organizations to streamline and simplify integrations between security and intercom solutions, and promote more one-to-one voice communications through their facilities. 

5.       Investments in the Collaborative Ecosystem - Whether we like to believe it or not, there is a continued divergence between open-architecture security systems and the all-in-one (or end-to-end) proprietary model, and security and IT directors will surely continue to weigh the pros and cons of each. Realistically, in order to accommodate the technological diversity required by customers to build next-generation security platforms, a robust and dynamic community of partners should work together, remaining mutually invested in shared success. As an open architecture system continues to provide greater flexibility of hardware and software integration and facilitates system growth, more customers will seek the long-term advantages of a collaborative ecosystem. 

6.       Collaboration and Data Sharing - Collaboration between multiple stakeholders within the city environment will continue to permeate metropolises large and small (even expanding across multiple urban cores and communities), but we will also see this trend seeping into private enterprises. Within organizations themselves, sharing of video and other systems' data across various departments or geographically-dispersed offices will become more prevalent. To facilitate this higher level of collaboration, manufacturers are in a unique position to offers tools that promote efficiency and communications between these entities, while also ensuring privacy and internal security policies are respected. 

7.       Simplicity of Design and Configuration - As unification continues to shape the direction of enterprise security systems and related business decisions, simplicity will remain of great importance. From a usability standpoint, evolving interface design concepts that center on user tasks will continue to impact the effectiveness of a security team. Similarly, tools that make systems easier to deploy, set up and configure will benefit channel partners who seek to streamline deployments and focus more on service.  

8.       Security and Privacy - As the use of security technology increases exponentially, both in private and public sectors, and as new local and federal legislative standards and compliance are introduced, data privacy and security remain top of mind. In response, vendors will be focused on introducing greater safeguards and advanced data encryption to help organizations ensure only the right people have authorized access to security information, from capture, through transmission, into storage and during retrieval. 

9.       Open-Architecture IP Access Control - With the end-of-life announcements of well-known access control products (and some entire companies), an increasing number of end users are becoming painfully aware that end-to-end proprietary access control systems have major long-term cost implications. Short-term needs such as securing an organization are increasingly defined within the context of the long-term impact, and thus businesses are turning to choices that shy away from the costly constraints of proprietary access control systems. 

10.   Mobility and Wearable Tech - Mobility will continue to be a recurring theme in 2015. As more governments seek to equip law enforcement with wearable technologies, mobile features which enable remote capture and access from wearable equipment or mobile phones and tablets will be high on customer wish lists. These devices will also begin serving double-duty, as organizations continue to leverage these technologies as mobile credentials for access control. 

What are your thoughts on where the industry is heading this year? Have any other trends to add? We want to hear about it.

Tags:   Trends

View All Blog Posts