Page 13 - AeM_January_2022
P. 13
RESEARCH, ANALYSIS & TRENDS
es, besides supporting in the digital transformation of
various industry verticals such as energy, logistics,
manufacturing, retail, education, healthcare, etc.
3. Converged systems will break down data
silos
Data and information scattered and isolated in dispar-
ate systems or groups create barriers to information
sharing and collaboration, preventing managers from
getting a holistic view of their operations. Here, the con-
vergence of various information systems has been control, a hygienic practice more and more favored be-
proven to be an effective approach. Hence, the trend in cause of the pandemic.
the security industry has been to converge systems
wherever possible, including video, access control, 6. The Zero Trust approach will take the cyber-
alarms, fire prevention, and emergency management, security spotlight
to name a few. Furthermore, non-security systems, like
human resources, finance, inventory, and logistics sys- With more security devices connecting over the Internet
tems are also converging onto unified management than anyone ever imagined, cybersecurity has become
platforms to increase collaboration and to support man- an immense challenge in the industry. Stricter data se-
agement in better decision-making based on more curity and privacy protection regulations, like the EU's
comprehensive data and analytics. GDPR and the Data Security Law in China, have
placed higher demands on cybersecurity. And in 2021,
4. Cloud-based solutions and services will be several landmark ransomware attacks on a variety of
essential enterprises have been the decisive factor for many
companies to reinforce their network security architec-
From small business markets to enterprise levels, we ture and strengthen their online protections.
can see more businesses leveraging cloud-based se-
curity solutions and services, with the pandemic accel- The term "Zero Trust" has become a hot word just in
erating this movement for people and businesses recent years. A strategic initiative that developed to
around the world. Cloud offers what all businesses prevent data breaches by eliminating the concept of
want for their platforms and services – simplicity. With a trust from an organization's network architecture, Zero
cloud-hosting infrastructure, there is no need for a local Trust is rooted in a philosophy of "never trust, always
server or software. Users can conveniently check the verify" accepted within the IT industry first and slowly
status of their assets and businesses in real time, re- but steadily moves into the physical security realm, as it
ceive security events and alarms quickly, and accom- gradually becomes an important part of the IoT world.
plish emergency responses by simply using a mobile
app. For security business operators, the cloud enables 7. Green manufacturing and low-carbon initia-
them to remotely help their clients configure devices, fix tives will take big strides
bugs, maintain and upgrade security systems, and pro-
vide better value-added services. Low-carbon initiatives are valued by societies around
the world with products featuring low-power consump-
5. Biometric access control will bring higher tion becoming the preferred options for customers and
security and efficiency demand for solar-powered cameras are increasing.
Meanwhile, local laws, regulations and policies that
The access control market is rapidly becoming occu- restrict carbon emission standards for manufacturing
pied by biometric authentications, from fingerprint and enterprises are pushing industries toward adopting
palmprint recognition to facial and iris recognition. Bio- more environmentally conscious practices in their daily
metric access controls bring inherent advantages, like operations and production, which includes using more
higher security and efficiency with reduced counterfeit- environment-friendly materials and adopting multiple
ing. They verify within seconds – or fractions of sec- energy-efficient designs in product manufacturing pro-
onds – and prevent unnecessary physical contact. Iris, cesses. (Source: Hikvision Digital Technology) ◊
palmprint, and facial recognition offer touchless access
By MediaBUZZ
January 2022: Digital Media Trends & Predictions 13