Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Business Intelligence, Cybersecurity and Biometrics Took Center Stage at ISC West 2017

CrucialTrak's BACS product won the SIA New Product Showcase at ISC West 2017.
April 11, 2017

Like many of you, we spent most of last week at ISC West in Las Vegas surrounded by the crush of massive crowds eager to get a glimpse of the next great security product, to discuss new solutions with vendors and integrators, and to network with one of the most varied and comprehensive groups of security professionals in one (enormous) place.

Security’s editorial staff spent the show dashing from booth to booth, discussing trends, technology and tips with security manufacturers, consultants, integrators and end users alike (if we ran into you in the aisles, we apologize). Through these meetings, a broader picture of the industry materializes: Manufacturers are working to meet end users’ request for actionable business intelligence, to offer enterprises a chance to accomplish more with the data security systems already generate. The demand for stronger cybersecurity was felt across the show floor, as some manufacturers were overtly advertising cyber-secure cameras or appliances. And while it may be slow to catch on in installations, biometric technology is advancing by leaps and bounds.

Business Intelligence

Enterprises invest heavily in surveillance cameras and sensors, but they’re still considered a cost center, especially as higher megapixel counts lead to dramatically higher storage costs. This year, we saw an added push from many vendors to make better use of the data generated by existing or new security systems.

This has included expanded analytics offerings to provide heat-mapping, people-counting, traffic patterns and more. We have seen many of these before, but they are being honed to a finer, more actionable science, with easy-to-share reports and automatically compiled data sets.

Other vendors were showcasing more streamlined integration, so enterprises could apply analytics to, say, sensors above cash registers that trigger an automatic audio alert over IP speakers when queues are too long to call for more cashiers.

According to Sean Murphy from Bosch, the average security application uses only 10% of the data it produces. Analytics help enterprises tap into the other 90% of the data created and built actionable business intelligence out of it for customer service, facility use and maintenance and more.

Cybersecurity

After a number of high-profile cyberattacks facilitated by weak surveillance camera security, we saw this conversation take a new turn at the ASIS Annual Seminars & Exhibits last September, but the cybersecurity of security systems was front and center at ISC West. Nearly every camera manufacturer was prepared to explain or demonstrate their commitment to cybersecurity, and a few were touting their investments in cybersecurity technology and education, such as the Camera Hardening Guides for end users and integrators at Axis Communications.

ComNet unveiled its Port Guardian product, which senses when an IP camera cable has been disconnected and automatically locks down that port and sends an alert to an administrator, so a malicious actor cannot plug in a laptop or other device to the camera’s cable and gain access to the network.

Razberi introduced its Camera Defense appliance, which rolls five cybersecurity best practices and services (MAC address binding, firewalls, whitelisting, Internet protection and password protections) into one device, offering cybersecurity protection for anything plugged into its switch, from access control readers to cameras.

Biometrics

Historically, biometric solutions have been reserved for high-security facilities where an added layer (or three) of identity verification is required, such as pharmaceutical facilities or data centers. However, as manufacturers make strides in the speed and ease of user enrollment, durability of machinery and reductions in false rejections, the industry may be primed to see biometrics move mainstream.

The winner of the SIA New Product Showcase was the Biometric Access Control System (BACS) from CrucialTrak. This gate solution uses five cameras contained in one orb-like device to capture images of a user’s fingerprints, palm print, iris and face. Depending on the organization using it, the system can be configured to accept the first positive identification it encounters (likely facial recognition as one walks up to the gate) or all four (with the hand hovering over the orb). Managing Director Daniel Gold says it could prove to be a useful and popular solution for universities, hospitals or other facilities where hygiene is a factor, as (operated properly) the system is touchless for users.

FST Biometrics was demonstrating the speed at which users can be enrolled in its biometric-based identity management system, as well as new upgrades to detect and prevent fraud (the system can tell the difference between a photo of a user’s face and their actual face, and it cross-checks recent and historical images to combat failure rates due to aging faces).

What We’re Looking for Next

Based on what we’ve seen presented at the past few tradeshows, we’re expecting to see more emphasis on smart or connected buildings that use existing and new security sensors to streamline utilities, resource use and spending. The technology is at a good jumping off point, but now we have to wait for these solutions to be more widespread and in use for additional applications to emerge.

We’re also waiting for more integrators and dealers to jump on the cybersecurity train. Manufacturers are working to provide solutions, guidance and education, but without buy-in from the people configuring and installing systems, breaches will still occur. End users need to join in here as well. Configuring a system correctly for cybersecurity takes time; it’s not a plug-and-play situation. So accepting a higher bid for a longer, higher security installation may be in a CSO’s best interest. 

KEYWORDS: cybersecurity standards security products security technology Security trends

Share This Story

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!