Upcoming Trends in Security & Surveillance for 2021
It’s fair
to say 2020 has not been the year any of us were expecting. It has been
challenging, we have all made sacrifices, and there are still further obstacles
in our path as we try to get back to “normal”. SARS-CoV-2, the coronavirus
strain that causes COVID-19, is a highly contagious respiratory illness that is
affecting lives worldwide. Epidemics and pandemics have been threatening the
human race time and again. SARS, H1N1, Ebola, and more have shown their teeth
in the past, but with each such outbreak, we are learning new ways of fighting
and managing such unexpected diseases that can potentially kill millions of
people. Technology cannot prevent the onset of the pandemics; however, it can
help prevent the spread, educate, warn, and empower those on the ground to be
aware of the situation, and noticeably lessen the impact. The pandemic of 2020
has certainly changed the landscape for us all, not just the security industry.
It has made us a lot more aware of touch points, crowded gatherings and
personal space. It is inevitable that technology will adapt as our lives do. We
have already seen manufacturers race to bring us solutions such as body
temperature management, face mask detection and crowd control etc. It’s time to
change. It’s time to get better. It’s time to learn more and sharpen our
skills.’
During pandemic Webinar is boom
through Zoom. Google meet, Gotowebiner etc in security safety automation
industry. System Integrator, End Users, professionals are learn many things
through OEM direct Webinar. US already ban China made surveillance product. In
india Atmanirbhar Bharat (self-reliant India) is the vision of the Prime
Minister of India Narendra Modi of making India a self-reliant
nation. The first mention of this came in the form of the 'Atmanirbhar Bharat
Abhiyan' or 'Self-Reliant India Mission' during the announcement of the
coronavirus pandemic related economic package on 12 May 2020. Known china CCTV
OEM are thrown out. Yes, it’s true, India don’t have much infrastructure to
generate Camera manufacturing plant, it will take time at list 5 year. Within
this time, we can follow BIS website to get information about selected camera /
NVR model are china factory make or not. Low cost and high cost both option
camera you can found. If you found that model belongs to china factory
immediately change with Closest or Alternative Substitute. Now we check what
will be next in 2021 for Security Safety & Automation.
OSHA new Policy:
The COVID-19 outbreak has caused almost all firms to deploy the work from home practice for employees. While some may be used to this, others may feel lost in the exercise. While not all Indian are able or fortunate enough to work from home, many have transitioned to telecommuting and virtual work over the last week or two.
While employers’ responsibilities for the safety and health
of their at-home workers is less than those in the office or onsite, some do
still exist. OSHA distinguishes between home offices and other home workplaces.
OSHA’s compliance directive
on home offices is pretty clear:
· “OSHA will not conduct inspections of employees’ home
offices.
· “OSHA will not hold employers liable for employees’ home
offices, and does not expect employers to inspect the home offices of their
employees.
· “If OSHA receives a complaint about a home office, the
complainant will be advised of OSHA’s policy. If an employee makes a specific
request, OSHA may informally let employers know of complaints about home office
conditions, but will not follow-up with the employer or employee.”
What about recording injuries while working at home? If an
employee is working at home, when could the injury be considered work-related?
OSHA answers the question:
How do I decide if a case is work-related when the employee
is working at home? Injuries and illnesses that occur while an employee is
working at home, including work in a home office, will be considered
work-related if the injury or illness occurs while the employee is performing
work for pay or compensation in the home, and the injury or illness is directly
related to the performance of work rather than to the general home environment
or setting.
Video Intercoms:
One of the newer phenomena
we’ve faced in the world has been the concept of physical distancing, brought
to light by the global coronavirus pandemic. This has created challenges not
only socially, but for technologies that were not designed to accommodate what may
be the new norm. Video intercoms are really going to be playing a bigger part
in the way facilities are organized and processes are organized. We’re seeing
some customers that are using this to limit having to actually go inside a room
in a healthcare facility, for example, to limit the chances of transmitting
something all while maintaining that frequency of checking. One of the main
benefits of door intercoms is, simply put, the ability to limit — or even
eliminate — human contact at the door. In this pandemic, an immediate need is
providing [the customer with] a way to create physical distancing upon entry.
This can also be applied to healthcare workers. Integrators have to understand
this greater demand for security at the door and deliver solutions to their
customers. Everybody is having food, groceries and other things delivered to
their door. Demand for that is very high right now. Additional security at the
door or the gate is something people want and need.
Home Over IP:
Amazon, Apple, Google and
the Zigbee Alliance announced a new working group that plans to develop and
promote the adoption of a new, royalty-free connectivity standard to increase
compatibility among smart home products, with security as a fundamental design
tenet. Zigbee Alliance board member companies such as IKEA, Legrand, NXP
Semiconductors, Resideo, Samsung SmartThings, Schneider Electric, Signify
(formerly Philips Lighting), Silicon Labs, Somfy and Wulian are also on board
to join the working group and contribute to the project. The goal of the
Connected Home over IP project is to simplify development for manufacturers and
increase compatibility for consumers. The project is built around a shared
belief that smart home devices should be secure, reliable and seamless to use. By
building upon IP, the project aims to enable communication across smart home
devices, mobile apps and cloud services, and to define a specific set of
IP-based networking technologies for device certification.
Video Surveillance:
The global CCTV camera
market is anticipated to generate substantial revenue of more than to USD 38
billion till 2021. Asia Pacific and America holds the largest share of the
global market and act as one of the main driver for the market. According to
“India CCTV Camera Market Outlook, 2021”, the India CCTV Camera market is
expected to grow with a CAGR of more than 26 % in the period from 2016 to 2021.
Technology wise non-IP dominates the Indian market but in the coming years IP
is expected to take the lead soon. Non -IP technology constitutes of analog and
HD CCTV cameras. Analog is technology which is in a depleting stage and it
share is expected to be taken by the IP technology and the HD type CCTV camera.
Dome typed cameras are the most widely used cameras in any sectors. Commercial
segment is the driver of the CCTV market in India with the increasing count of
SOHO’s and SME’s. With the increasing security concerns, residential sector
would also be one of the factors for the increasing market. As criminal
activities are more in the northern region of India, North dominates the market
in terms of revenue.
Facial Recognition:
Facial recognition is the
common theme of the week’s top digital identity news with retail applications,
new edge servers, and biometric border control deployments around the world. A
new software partnership on biometric cryptography has also been announced, a
report shows the importance of selfie biometrics in fraud reduction published,
and the industry, as well as society more broadly, continues to contend with
the issue of algorithmic bias. Facial recognition solutions identify a person
by forming a unique code built on algorithms
from multiple points on a person’s face, including nose, chin,
lips, eyes and jaw. However, when a person wears a mask, many of
these key points are not visible. Faces were often completely missed, and
unsuccessful or false identifications were high. Those are know this wearing
masks can reduce the accuracy they avoid to take Facial recognition
Video Verification:
The city currently has over
1,000 video surveillance cameras deployed across the metropolitan area and is
expected to reach over 1,700 security devices. Now it’s very difficult to watch
every moment on comment control center. It’s very important to see what camera
saw. Through Video Auditing software the task are easy. Day by day its
increase.
Rise of Mobile Credentials:
There has been a tremendous
uptick in the popularity of mobile credentials. Research firm IHS Markit
has reported that mobile-based credentials are the fastest-growing
access control product. Globally they have experienced nearly a 150 percent
growth between 2017 and 2018. Estimates show that more than 120 million mobile
credentials will be downloaded in 2023 by end users. A 2019 survey by HID
estimated that 54% of businesses had upgraded or would upgrade to a mobile
access control system in the next three years. Though access cards
still play a powerful role in the access control market, we are seeing a strong
shift towards mobile access control like various companies. The use of
mobile-based credentials is the logical next step for the physical security and
access control industry. The fact that people are always with their smartphone
helps popularise this trend. Phones aren’t just phones anymore. They play
a bigger role in day-to-day life and this also includes access control. Mobile
credentials can revolutionise the industry, eliminating the need to carry and
wipe a card. Instead, a phone’s technology can be used to authenticate identity
and grant entry. This gives greater flexibility, improves privacy and can also
lower the maintenance costs of credential management for end users.
Additionally, a clear advantage is that employees are more likely to carry
their smartphone with them and less likely to lose them compared to NFC
transponders.
The advantages of using
virtual access control cards, which are stored on smartphones, are obvious:
less logistics when distributing, revoking or replacing cards and many more
ways to integrate with technology on the phone or other hosts and devices in
the network. Often also the user experience of mentioned as a benefit of mobile
access: users do not have to fill up their wallets with a pile of RFID cards
but can conveniently carry them around in their phone. The networking capacity
of smartphones would even be a great way to overcome the limitations
of offline access control installations where access rights would be
stored on smartphones instead of cards.
Security in the cloud:
After the entrance of
IP-networking in security around twenty years ago, it is one of the major
current trends in our industry: cloud based security systems. In the
context of physical security one could define cloud based systems as those systems
with a topology that looks like this:
· A
server that is ‘in the cloud’ and can be accessed from virtually anywhere;
· Devices
that connect over an IP-network to that central server;
· Web
based administration of the system;
· Commercially
based on a service or transaction model with recurring fees.
Variations exist. But in general
this pretty much sums up what to expect when reviewing a cloud based system.
We see this set-up currently
already in several categories:
· Video
Intercom Systems, like the systems from Akuvox, which are based
on video intercom stations that connect to a cloud based server,
which also enables use of apps as virtual door phones.
· Mobile
access systems that enable the use of virtual
credentials on smartphones. and that are managed from a cloud based
server.
· Video
management software now also is offered by several vendors as a cloud
service, for example: 3dEYE, Open Eye, and VIVOTEK.
IoT security topologies:
The Internet of
Things idea has been around for ages. It was predicted over a decade ago that
billions of device will connect to the Internet. Sensors all around us will
deliver data to the cloud. Feeding data into ‘big data’ processing applications
that will give us access to a wealth of information. Devices also connect the
cloud. To be part of applications that can be used and managed from virtually
any location. For security it would mean that it very much is related
to cloud based security applications. The additional step here would
be that camera’s, readers, intercoms, intrusion detection sensors and biometric
stations would connect directly to the cloud based service. Installations would
be easier and more scalable. Access control systems could be deployed at any
door and still be real online access control systems. Video surveillance
would be available at any location that would require security monitoring.
Security sensors and devices can be rolled out everywhere.
Smartphones and wearables
Using smartphones or other
wearable devices in security has been a popular idea for many years.
Smartphones and tablets often can be used to access the administration
Interface (GUI) of the access control, video management or PSIM systems. That
hardly is considered an innovation. Smartphones can also be used
as virtual access control and identity cards in mobile acess systems.
In addition it appears that also biometrics like facial
recognition and fingerprint identification are now available on
smartphones. It appears logical that smartphones with their native connectivity
features are an interesting extension of security systems.
Mobile credentials
enable both multimodal and multi-factor authentication. Multimodal means
proving identity and/or gaining access using at least two separate biometrics,
or permitting access through any one of various credentials, such as a
smartcard or PIN. Multi-factor authentication involves proving identity and/or
obtaining access via at least two methods or credentials. Multi-factor
authentication is widely used in digital access. For example, when an employee
logs onto a company’s system, he or she must use a secondary method to verify
identity via a one-time token via SMS or other app. It is also burgeoning
in physical access applications. Although two-factor authentication has been
mandated in regulated industries, it is emerging in unregulated verticals as
well. The development of multimodal readers will continue to fuel this trend.
Believers say that people prefer
carrying around their smartphone over additional cards. They refer to the
technical possibilities that smartphones offer in areas like user convenience
and integration of systems.
Identity analytics and AI
A relatively new field in security
is identity analytics. Seeing through identity and security related data in an
automated way. To monitor use of access priviliges and consequently alter those
access rights. The idea comes from the IT industry and that is where you will
see it deployed mostly now. Recent research indicates that this is an
emerging market with high anticipated growth potential. It would make sense to
include physical security into these applications.
Believers will say that, like with
video analytics, many more security related events can be actively monitored,
more incidents can be detected and a tighter security regime can be implemented
without hindering users unnecessarily.
It remains to be seen what the
future will bring exactly. But intelligent security related data analytics
certainly will have a place in modern enterprise security management
applications.
Centralized Control of Fire Detection:
The principle of networking
involves connecting several panels together to form a system. Inputs on one
panel may activate outputs on another, for example, or the network may allow
monitoring of many systems. Networking is often used in situations where one
panel is not large enough, or in multiple-building situations. Networking is
also an effective way to decouple systems to reduce the risk of a large portion
of a facility going offline at any time due to system failure or maintenance
requirements. Sub-Networks can be created using either hardware or software
architectures. Networked systems normally are more costly and involve
additional training and system configuration for successful implementation.
From this year many customer
implement centralised monitoring & controlling of Fire Panel through
creating WLAN communication with Graphic software. Due to cost effective
graphical monitoring control software only industrial &
Enterprise business implement the same. Also it will possible if same brand
panel is there in all location.
BMS Workforce:
The growth of IBMS market is
observing hindrance due to lack of availability of skilled workforce. The
Intelligent building management systems are usually complex and require skilled
personals to operate. The cost of training operators to handle complex
equipment such as HVAC control, outdoor controls, security and access control,
energy management systems and smart meters is quite high. Owing to which, small
scale companies cannot afford to invest large capital to train their operators.
This factor is likely to affect the growth of the IBMS market in the country.
But due to COVID-19 many OEM
& society presence webinar program to educate more. This will be effect in
this 2021-22. The region segmentation for the IBMS market has been done
by South India, West
India, North India, East India. Which include general lighting controls, communication systems, security
controls, HVAC controls, access controls, outdoor controls entertainment
controls and others. The India IBMS market is segmented by application into:
hospitality, residential and retail, life science, office space, manufacturing,
and energy and infrastructure. All these segments have also been estimated on
the basis of geography in terms of revenue (USD Million).
The goal of building
management systems was—and still is—to help optimize building performance by
· Providing data on core building operational systems,
specifically HVAC.
· Enabling the automatic control of a building’s main operating
functions.
IoT for buildings has the
same goal of performance optimization (and by extension, saving money)
through data and automatic control, but advanced technology takes these aspects
many steps further than a traditional BMS system can.
We wish you all the very best
for 2021 and we look forward to working with you for many years to come.