Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity

The Right Technology for the Job

Cybersecurity Technology
ArtemisDiana/iStock / Getty Images Plus via Getty Images
July 11, 2024

As technology moves forward at seemingly break-neck speed — and as bad actors invent new ways to attempt to thwart it — companies are showing an increased willingness to invest in more solutions for both physical and cybersecurity needs. But as with anything else, not all solutions are created equal, so it is important to choose wisely, and for the right reasons.

On the physical front, AI and cloud based solutions are driving a lot of decisions today.

For example, a study conducted by Harris found that 70 percent of security professionals believe their organization plans to increase spending on physical security systems in 2025. More than 90 percent thing the future of physical security will be cloud-based, with three quarters looking to transition to the cloud in the next year. 

The report, commissioned by Verkada, surveyed more than 1,500 IT and physical security leaders to gather insights on the state of cloud physical security. It also looked at attitudes on the cyber front and AI, finding that 90 percent of professionals surveyed think that cloud security is now more effective at protecting against data leaks and unauthorized access; while 80 percent think AI-based analytics will play a large role in future physical security solutions.

Another report, from HID, also looked at the state of physical security, particularly access control. Specific to smart buildings, the report found that open standards have become a key driver, allowing for more converged solutions that can help organizations make not only security but also business decisions — with nearly a third saying integration with other business functions a top trend. 

When asked about AI, just 23 percent had no plans to incorporate some form of the technology. 

On the cyber side, there is also recent evidence that budgets are expanding.

A report by Optiv found that cyber budgets have increased by almost 60 percent year-over-year. But the details are a big more nuanced.  While organizations with more than 5,000 employees spent an average of $26 million on cybersecurity investments in 2024, just 36 percent cited a “formal” approach to establishing those budgets, and many were a possible direct result of a rise in incidents rather than a proactive one.

More than 60 percent cited experiencing a cybersecurity event within the past two years, and 55 percent had experienced at least four incidents. 

The report also suggested that simply throwing technology at the problem may not be as effective, with 40 percent of respondents saying their organization had “too many” technologies, leading to a decrease in effectiveness overall. 

However, another study from Titania shows that some organizations are thinking more proactively, with 70 percent saying they are increasing spending on proactive cybersecurity solutions such as attack surface and risk-based vulnerability management. According to the study these investments are outpacing those in preventative and reactive solutions. 

This research also highlighted the importance of consolidating proactive security tools such as attack surface visibility and management, increased security control optimization and better manpower productivity.


KEYWORDS: physical security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Jerry Brennan

    Selecting the Right References Proves Critical for Job Searches

    See More
  • surveillance feat

    Choosing the Right Video Recording Technology for Your Enterprise

    See More
  • surveillance 1 feat

    Finding the Right Technology to Unlock Cloud and Mobile Surveillance

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing