Professional Documents
Culture Documents
The Video Surveillance Report 2018 Sponsored by IDIS Final
The Video Surveillance Report 2018 Sponsored by IDIS Final
THE VIDEO
SURVEILLANCE
REPORT
2018
ion 1. Introduction
port 2017 builds
The onVideo
theSurveillance Report
– and the2017 builds
spectre on thepunitive fines for
of more – and
datathe
breaches
spectre of more punitive fines for data breaches
ports in 2015 success
and 2016of two
on previousunder
reports
thein 2015 and 2016
forthcoming onprotectionunder
EU data law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
onsored, likethethissame
report,
subject
by – alsoissponsored,
sharpening like thisacross
minds report,
theby
supply chain
is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global manufacturer
surveillance leader IDIS, and
installers the largest
securitymanufacturer
professionals scramble
installers
to strengthen
and security professionals scramble to strengthen
in Southmarket
ideo surveillance: Korea. In 2015,their
Video
cybersurveillance:
defences. market their cyber defences.
provided a snapshot
trends and of systems
expectations provided a snapshot of systems
With this in mind, some of our findings onWith pagethis6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinning
around the world, the factors underpinning
interesting reading. interesting reading.
d how control procurement
rooms useddecisions and how control rooms used
surveillanceCCTVReport systems.
2016: The video surveillance Report 2016:
and play, meanwhile, CONTENTS
security needs and plug and play, meanwhile,
ations, the security
focusedneedson upgrade motivations, the security needs
CONTENTS
shaped by the of physical
surveillance systems as shaped by the physical
osed to people, data and the threats1.
environment, Introduction
posed to people,........................................
data and 1. Introduction 2 ........................................ 2
ssionals thought
assets,about
whatplug-
security professionals thought about plug-
ch cutting-edgeand-play
features
systems
they and which cutting-edge
2. The features
rise of open they
platforms ...................
2. The rise of 4 open platforms ................... 4
valued most highly.
ne subject in particular
This time round
that we’d
there was one subject in particular that we’d
3. Cybersecurity in the age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been
Information
neglectful to ignore: cybersecurity. Information
erent world altogether
security once
to the
convergence ..........................................
seemed a different world altogether to the
convergence 6 .......................................... 6
security professionals.
realm inhabited
But anyby physical security professionals. But any
wo disciplinesdemarcation
has now been between the 4.twoCutting-edge
disciplines has nowtechnologies
been ..................
4. Cutting-edge 9 technologies .................. 9
tegration withemphatically
other buildings
demolished. Integration with other buildings
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
networkinauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14
Sponsored by A trend
Sponsored
report from
by A trend report from
A trend report from IFSEC Global 1 Sponsored by IDIS
m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Sponsored by A trendSponsored
report fromby A trend report from
THE VIDEO
SURVEILLANCE
REPORT
2018
CONTENTS
Introduction 3
Installed base 5
Upgrading & innovation 6
VGA/HDMI video encoders 11
Deep learning powered video analytics 13
ion 1. Introduction Systems faults & critical failover 15
port 2017 builds
ports in 2015
The on
success
Cybersecurity
Video
theSurveillance Report
and 2016of two
– and the
on previousunder
reports
2017
thein
builds
spectre on thepunitive fines for
of more
2015 and 2016
forthcoming
17
– and
datathe
onprotectionunder
EU data
breaches
law (the
spectre of more punitive fines for data breaches
the GDPR),
forthcoming EU data protection law (the GDPR),
onsored, likethe
thissame
IDIS, the largest
global
report,
subject
by – alsoissponsored,
Technical
sharpening like
surveillance support
manufacturer leader IDIS, and
installers
thisacross
minds
the largest
report,
theby
supply chain
securitymanufacturer
professionals scramble 19
is sharpening
as vendors,minds across the supply chain as vendors,
installers
to strengthen
and security professionals scramble to strengthen
in Southmarket
ideo surveillance: Korea. In 2015,their
Video surveillance:
cyber defences. market their cyber defences.
provided a snapshot
trends andof systems
expectations provided a snapshot of systems
With this in mind, some of our findings onWith
pagethis
6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinning
around the world, the factors underpinning
interesting reading. interesting reading.
d how control procurement
rooms useddecisions and how control rooms used
surveillanceCCTV systems.
Report 2016: The video surveillance Report 2016:
and play, meanwhile, CONTENTS
security needs and plug and play, meanwhile,
ations, the security
focusedneeds
on upgrade motivations, the security needs
CONTENTS
shaped by the of physical
surveillance systems as shaped by the physical
osed to people, data and the threats1.
environment, Introduction
posed to people,........................................
data and 1. Introduction 2 ........................................ 2
ssionals thought
assets,
about
whatplug-
security professionals thought about plug-
ch cutting-edgeand-play
features
systems
they and which cutting-edge
2. The features
rise of open they
platforms ...................
2. The rise of 4 open platforms ................... 4
valued most highly.
ne subject in particular
This time round
that we’d
there was one subject in particular that we’d
3. Cybersecurity in the age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been
Information
neglectful to ignore: cybersecurity. Information
erent world altogether
security once
to the
convergence ..........................................
seemed a different world altogether to the
convergence 6 .......................................... 6
security professionals.
realm inhabited
But anyby physical security professionals. But any
wo disciplinesdemarcation
has now been between the 4.twoCutting-edge
disciplines has nowtechnologies
been ..................
4. Cutting-edge 9 technologies .................. 9
tegration withemphatically
other buildings
demolished. Integration with other buildings
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
networkinauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14
ion 1. Introduction
About IDIS
The IDIS
port 2017 builds Video
on is Surveillance
the a global security– andcompany
Report 2017
the that
builds
spectre of designs,
on thepunitive fines for
more – and
datathe
breaches
spectre of more punitive fines for data breaches
ports in 2015 manufactures
success
and 2016
of two and delivers
on previous reports
under surveillance
the in 2015 andsolutions
forthcoming 2016
EU dataonprotectionunder
law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
onsored, likethe forreport,
thissamea wide byrange
subject of is
– also commercial
sharpeningand
sponsored, like
mindspublic-
this report,
across theby
supply chain
is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global manufacturer
surveillance
sector markets.leader
As the IDIS,
installers
largestthevideo
and largest
security manufacturer
professionals scramble
surveillance installers
to strengthen
and security professionals scramble to strengthen
in South
ideo surveillance: Korea.
market In 2015, Video
their cybersurveillance:
manufacturer in South Korea, headquartereddefences. market their cyber defences.
provided a snapshot
trends of
and systems
expectations
just outside Seoul, and provided a snapshot of systems
Withoperating
this in mind, across
some50 of our findings onWith
pagethis6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinning
around the world, the factors underpinning
countries with 100+interesting
strategicreading.
partners, IDIS is a interesting reading.
d how control procurement
rooms useddecisions and how control rooms used
world-leading total solution provider with more
surveillanceCCTVReport systems.
2016: The video surveillance Report 2016:
and play, meanwhile,than needs
security
and
ations, the security
two million
over
focusedneeds 16.8
and plug
million
CONTENTS
recorders installed
and play,
cameras
on upgrade motivations, the securityutilising
worldwide
meanwhile,
IDISneeds
CONTENTS
shaped by the technology.systems as shaped by the physical
of physical
surveillance
osed to people, data and the threats1.
environment, Introduction
posed to people,........................................
data and 1. Introduction 2 ........................................ 2
The IDIS Total Solution meets the surveillance
ssionals thought
assets, about
whatplug-
security professionals thought about plug-
ch cutting-edge and
and-play analytical
featuressystems
they and needs
whichof businesses
cutting-edge large and they
features
small. By providing 2. benefit
the The riseofofeasyopen
to platforms ...................
install 2. The rise of 4 open platforms ................... 4
valued most highly.
and operate, end-to-end, highest-quality
ne subject in particular
Thissurveillance
time round
that we’dthere was one subject in particular
arein that
solutions,3.IDISCybersecurity
customers the we’d
age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been
Information
neglectful to ignore: cybersecurity. Information
ensured a low total cost
erent world altogether
security once
to the
convergence
of ownership..........................................
seemed a different world altogether to the
combined convergence 6 .......................................... 6
with
security professionals. the
realm inhabited flexibility and scalability to effectively
But anyby physical security professionals. But any
hasfuture-proof
wo disciplinesdemarcation
now been betweentheirthe
investments.
4. Cutting-edge technologies ..................
two disciplines has now been 4. Cutting-edge 9 technologies .................. 9
tegration withemphatically
other buildings
demolished. Integration with other buildings
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
network
inauguration 5.2017
cameras during the Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14
Pie chart
report revealed that 56% of security professionals
without an HD analogue solution said they would
consider switching to one if it were cost-effective,
One single source manufacturer
100% IP-based
100% IP-basedCAMERAS
simple
A mix or leveraged existing coaxial cables.
of manufacturers
ARE YOUR SURVEILLANCE
100% analogue
ANALOGUE100%OR IP?analogue
A mixture of analogue and IP
A mixture of analogue and IP
Nevertheless, analogue systems probably don’t
have a long-term future, according to Lambert.
“Long-term support from manufacturers and
Do you use a single manufacturer or a mix?
replacementsOne 30%
for equipment that fails30%
in the
28% single source manufacturer
70%
A mix of manufacturers
28% analogue world is going to get more and more
rare,” he said.Pie“So
chart if you need your system to have
58% 70%
58%14% a long life, I can’t really see that analogue’s the
14% way to go.”
One single source manufacturer
A mix of manufacturers
One single DO YOU source
USE Amanufacturer
SINGLE
100% IP-based A mixcurrent of manufacturers
When was yourMANUFACTURER OR A MIX?
video surveillance system installed?
100% analogue In the last 2 years 47%
In the last 3-5 years 27%
When was your current video surveillance system installed?
A mixture of analogue and IP In the last 6-10 years 15%
9% In the last 2 years 47%
In the last 11-15 years
More than 15 years ago 2% In the last 3-5 years 27%
In the last 6-10 years 15% 30%
Pie chart In the last 11-15 years 9%
More than 15 years ago 2%
Proponents of IP surveillance systems cite In the last 2 years 30%In the last 3-5 years
28% In the last 6-10 years In the last 11-15 years
superior image quality, remote accessibility, More than 15 years ago Pie chart
ion 1. Introduction
9%
A mix of manufacturers
And yet, 22 years since the first network 27%
7 and 8.
Better technical support 20%
Bar chart
WHICH COMPONENT OF YOUR SYSTEM ARE YOU WHICH 13%OF THESE IMPROVEMENTS WOULD MOST
Bar chart
MOST LIKELY TO UPGRADE NEXT? LIKELY MOTIVATE THE NEXT UPGRADE TO YOUR/
YOUR CUSTOMERS’
0% SURVEILLANCE SYSTEM?
40% (CHOOSE UP
Higher TOlatency
resolution, lower THREEcameras
MAXIMUM) Better technical support
20%
Monitors
Storage
port 2017 buildsThe onVideo theSurveillance Report– and the 2017 builds
spectre on thepunitive fines
of more for
A more– and
datathe
breaches
scalable spectre
system of more
to support ourpunitive
growth fines for data breaches
Better technical support
ports in 2015 success
and 2016 of two
on previousunder reports thein 2015 and 2016
forthcoming EU dataonprotectionunder
law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
0% 0% 13% 25% 38% 50%
onsored, likethe thissamereport,
subject
Whole by Cameras
system – alsoissponsored,
sharpening
Storage NVRslike
minds thisacross
Monitors report,
theby
PSU supply chain
is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global
Askmanufacturer
surveillance
the general publicleader IDIS, and
installers
about the
videolargest
security manufacturer
professionals scramble
surveillance That lower total cost of ownership should be thetothird
installers
to strengthen
and security professionals scramble strengthen
insystems
ideo surveillance: South
40% Korea.
and
market In 2015,
they’ll probably
Video
their cyber think first
surveillance:
defences. and market their cyber defences.
highest upgrade motive out of eight suggests that
foremost
provided a snapshot
trends of about
and systems the cameras
expectations providedvisible in publicof systems
a snapshot
With this inThesemind, devices,
some of our findings end users
onWith are
pagethis inmindful
6 make mind, of keeping
for some a tight rein
of our findings on on costs.
page 6 make for
spaces around
, the factors installed
underpinning and private buildings.
the world, the factors underpinning
which
30% interesting reading. interesting reading.
d how control roomsact
procurement asdecisions
used the system’sand eyes and ears,
how control roomsare aused One might have expected cybersecurity to poll a
surveillanceCCTV more
Report pressing
systems. consideration than
2016: The video surveillance Report 2016: other parts of
the
and play, meanwhile,
security
20% system
surveyneeds
ations, the security
focused
needs when
suggests.
on
anditplug
upgradeAsked
comes CONTENTS
andtoplay,
upgrading
which system
motivations,
meanwhile, too, our
component
the security needs
CONTENTS
higher percentage, given the growing number of
documented cases where network cameras have
been breached (especially when respondents were
shaped by the ofthey are mostsystems
physical
surveillance
10%
likely toasupgrade
shaped by next,
thecameras
physical
osed to people, were
environment,
datacited
andby the25% 1.posed
Introduction
of respondents.
threats to people,........................................
data and 1. Introduction
permitted to choose 2 up........................................
to three options). Specific 2
ssionals thought
assets, about security professionals thought about plug- findings on cybersecurity are discussed on pages 17
whatplug-
However, professionals involved in procurement
ch cutting-edge 0%
and-play
features systems
they and which 2. cutting-edge
The rise features
ofentire
open they and
platforms
18
...................
2. The rise of 4 open platforms ................... 4
are actually
Whole more
system
valued most highly.
likely to
Storage replace the
Monitors system
in one go (33% ticked this choice) than they are to Better technical support was near the foot of the
ne subject in particular
This time round
that we’d
there was one subject
switch cameras alone. 3. Cybersecurity in the age ofin particular that we’d table3. of Cybersecurity
reasons to upgrade – which makes sense
in the age of
ore: cybersecurity.
have been
Information
neglectful to ignore: cybersecurity. Information when you discover, on page 19, how satisfied
It’s perhaps
erent world altogether
security once
to the unsurprising
seemed
convergence
to see
a different camera
world
..........................................
storage
altogether to the
convergence 6 .......................................... 6
the vast majority of end users appear to be with
security professionals.
realm
(16%) inhabited
But highly
rank anyby physical security
here, given thatprofessionals.
HD and But any the standard of support they receive from their
wo disciplinesdemarcation
has now been between the
4K resolutions, full-frame-rate 4. Cutting-edge
two disciplines has
recording and nowtechnologies
been ..................
4. Cutting-edge
technology provider.9 technologies .................. 9
tegration withemphatically
other buildings
demolished. Integration
increasing retention times are driving rapid growth with other buildings
– including the
systems,
hijackinga spate
of of breaches – including the hijacking of
2017 presidential
network inauguration
cameras during the 5.2017Warranties
presidential ........................................
inauguration 5. Warranties 14 ........................................ 14
25% 23%
Sponsored by A trendSponsored
report fromby A trend report from
Which of these data compression options would you prefer?
15%
Answer Choices Responses
H.265
37% 23%
H.265 with dual codec to avoid hardware upgrades 37%
Switch to a manufacturer with its own bespoke compression technology 15%
Not sure 25%
H.265
WHICH
H.265 withOF
Pie chart THESE
dual codec toDATA COMPRESSION
avoid hardware upgrades OPTIONS need to upgrade processing power or display
WOULD YOU PREFER?
Switch to a manufacturer with its own bespoke compression technology hardware, because operators can view in H.264
Not sure
H.265 while benefiting from H.265 compression when
H.265 with dual codec to avoid hardware upgrades
Switch to a manufacturer with its own bespoke compression technology
Not sure
recording.
efficiently, at a lower bitrate, than its predecessor. For viewing a wide area, do you think a single PTZ, single fisheye or multiple cameras are
...Value?
PTZ
PTZbetter… Fisheye Multiple cameras
30%
Fisheye Multiple cameras
32% 38%
Slashing bandwidth and storage consumptionFor viewing a wide area, do you Stackedby
...Value?
think a single
bar chart PTZ,
...For single
quickly fisheye
scanning or
a multiple
large space?cameras
PTZ or object?
...For tracking a moving person
...For quickly scanning a large space?
are better…
30%
Fisheye Multiple cameras
31%
32%
40%
31%
60%
38%
29%
40%
13%
29%
27%
ion 1. Introduction
Stacked bar chart BETTER…
PTZ Fisheye Multiple cameras
potentially up to a maximum ofbar8K.
Stacked chart Network
...For quickly
scanning a large
space?
...For zooming
in without losing
resolution?
PTZs can pan, tilt and zoom (hence the acronym) ‘recommended’ status Benchmark Magazine
to provide wide-area coverage. They can’t capture also praised the IDIS 5MP Super Fisheye for
the full scene all at once, traditionally relying on having few moving parts, thereby reducing
staff in the control room to steer towards and maintenance costs. PSI Magazine rewarded
zoom in on areas of interest. One installer noted the 12MP model with a ‘9 out of 10’ and ‘PSI
that operators “can forget to reposition it back to Recommended’ status.
where it’s supposed to be watching and can lead
to theft in a facility”. However, operators can set
up pre-set positions. We asked survey respondents how PTZs and
fisheyes compare to each other, and to multiple
Fisheye cameras, meanwhile, harness an ultra- fixed cameras, on a range of performance
wide-angle lens to produce an extremely wide measures. Of the five we posed, PTZs came up
or panoramic/hemispherical image. The result trumps for two of the arguably most important:
is a convex, non-rectilinear image (how a fish zooming in on a scene without sacrificing too
would see a hemispherical view from beneath much resolution and tracking a moving person
the water) rather than straight lines of perspective or object – and by a wide margin in both cases.
(rectilinear). Fisheye lenses, which have been used They’re also competitive when it comes to value
in photography as far back as the early 1960s, are for money, respondents seem to believe, albeit
typically available in 180° or 360° to suit the view. there’s little difference between the tallies accrued
for all three options. One spain-based distributor
The flaws of both options have been mitigated over
argued that “the best value will be one camera
time through innovation. Increasingly powerful
with multi-sensors.”
analytics platforms, for instance, are becoming
more effective – especially with the assistance As for ‘quickly scanning a large space’, fisheye
of video analytics engines (see page 13-14) – at cameras have a modest edge over PTZs, which
automatically guiding PTZs to track moving objects claim second place, while multiple regular
and scanning for targets. Dewarping removes the cameras claim their only victory in ‘not missing
geometric distortions created by the fisheye lens. or obscuring key details on the periphery’ more
And the emergence of HD and ultra HD models effectively than the alternatives – but by a decent
ion 1. Introduction
of both camera types mean that image detail and
clarity can remain high even when operators zoom
margin.
in very closely on a point of interest. By overall aggregate, PTZs are the comfortable
winner.
port 2017 buildsThe onVideotheSurveillance Report– and the 2017 builds
spectre on thepunitive fines for
of more – and
datathebreaches
spectre of more punitive fines for data breaches
IDIS Super
ports in 2015 success
and 2016 of two
on previousunder reportsthein 2015 and
forthcoming 2016
Fisheye 12MPEU on
data These
protection underfindings
law (the
the are interesting
GDPR),
forthcoming EU data insofar as they
protection law (the GDPR),
onsored, likethe thissame
report,
subject
by – alsoissponsored,
sharpening like thisacross
minds report, supplyreflect
theby chain perceptions
is sharpening
as vendors,minds across
acrossthe
thesupply
supplychain and
chain as vendors,
IDIS, the largest
global manufacturer
surveillance leader IDIS, and
installers the largest
securitymanufacturer
professionals scramble
howinstallers
theseto strengthen
and security
might professionals
influence scramble to strengthen
CCTV specifications.
in Southmarket
ideo surveillance: Korea. In 2015,their Videocybersurveillance:
defences. market But their cyber defences.
we should be cautious in proclaiming these
provided a snapshot
trends and of systems
expectations provided a snapshot of systemsfindings a definitive, authoritative judgement
With this in mind, some of our findings onWith pagethis 6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinning around the world, the factors underpinning on these camera types. User experience can
interesting reading. interesting reading.
d how control procurement
rooms useddecisions and how control rooms used sometimes be coloured by substandard or ageing
surveillanceCCTV Report systems.
2016: The video surveillance Report 2016:
CONTENTS CONTENTS
technology, and by suboptimal system design and
and play, meanwhile,
security needs and plug and play, meanwhile, installation.
ations, the security
focusedneeds on upgrade motivations, the security needs
shaped by the of physical
surveillance
IDIS Super systems as shaped by the physical One consultant who completed the survey
osed to people,
environment,
data Fisheye in
and the
action threats 1. Introduction
posed to people, ........................................
data and wrote1.that Introduction
“without ........................................
2 more detail on size/shape/ 2
ssionals thought
assets,about
whatplug-security professionals thought about plug- distances, it’s all a guess.” An India-based
ch cutting-edge and-play
features systems
they and which 2. Thecutting-edge
rise of openfeatures they consultant,
platforms 2. Themeanwhile,
...................
rise of 4 open said the issue was “object-
platforms ................... 4
valued most highly. of-Interest/area-of-Interest specific. For instance,
IDIS insight specific ‘area zoom without losing resolution’ is
ne subject in particular
This time round
that we’dthere was one subject in particular that we’d
3. Cybersecurity in the age of
possible3. Cybersecurity
with motorisedin the age
varifocal of also.
camera
haveIDIS
ore: cybersecurity. been Super
Information Fisheye,
neglectful available
to ignore: in both 5MP
cybersecurity. and
Information
12MP
erent world altogether
security tomodels,
once theseemed can convergence
incorporate,
a different
..........................................
world alongside
altogether to the
For convergence
tracking a moving6 ..........................................
object, a fisheye will help 6
the 360° view, smaller elements, focusing if the area is smaller – in fact it’s better than PTZ
security professionals.
realm inhabited
But anyby physical security professionals. But any
as it wouldn’t need manual intervention. For ‘key
hason
wo disciplinesdemarcation
now entrance
been points,
between thecash
4. registers or
twoCutting-edge
disciplines hasother
nowtechnologies
been ..................
4. Cutting-edge 9 technologies .................. 9
tegration with areas
emphatically
other of interest.
buildings
demolished.In accordance
Integration with its buildings details’ even a PTZ will serve the purpose.”
withother
– including the
systems,
hijackinga spate
of of breaches – including the hijacking of
2017 presidential
network inauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14
in South
ideo surveillance:
Yes - we think we need it
Korea. Init 2015,
38%
becomes a more formidable technical challenge
andmarketperformance.”
No - neither have Video
nor need ittheir
Jamie cyber surveillance:
defences.
Barnfield,
12% market
sales their cyber defences.
provided a snapshot of systemswhere faces being masked fall well below the
Don't have it and not sure if we need it 13%
provided a snapshot
trends and
director, of systems
expectations
IDIS Europe
Pie chart With this in mind, some of our findings onWith
camera’spagethis
6 make
in mind,
horizon for some of our findings on page 6 make for
line.
, the factors installed
underpinning around the world, the factors underpinning
interesting reading. interesting reading.
d how control procurement
rooms useddecisions and how control rooms used
surveillanceCCTV Report systems.
2016: The Mindful of the growing importance of data
Yes -video
alreadysurveillance Report 2016:
and play, meanwhile,
ations, the security
DO YOU,
security needs and
NEED PRIVACY
focusedneeds
OR
on upgrade
CONTENTS
YOUR
Yes - we plug
No MASKING?
CUSTOMERS,
thinkand
have it
weplay, HAVE
need it
- neither have it nor need it
motivations, the security needs
OR
meanwhile, CONTENTS
protection, nearly half of those polled already use
privacy masking and a further 30% believe that
Don't have it and not sure if we need it
shaped by the of physical
surveillance systems as shaped by the physical they need it. With another 11% unsure either way,
osed to people, environment,data and the threats1. Introduction
posed to people,........................................
data and 1. Introduction
that leaves just 16% ........................................
2 who don’t think they need 2
13%masking?
ssionals thoughtassets, aboutwhat plug-
security
Do you, or your customers, have or need privacy
Yes - already have it
professionals37%
thought about plug- privacy masking.
ch cutting-edge and-play
thinkfeatures
we need itsystemsthey and12% which 37%
cutting-edge features they
Yes - we
No - neither have it nor need it 2. 12% The rise of open platforms ...................
38%
2. The rise of 4 open platforms ................... 4
valued
Don't have it and notmost
sure if wehighly.
need it 13% Given the high stakes within the EU – GDPR fines
Pie chart can be reach up to €20m or 4% of annual turnover
ne subject in particular
This time round that we’d there was38% one subject in particular that we’d
3. Cybersecurity in the age of 3. Cybersecurity
– it should be unsurprising in the
that age
theseoffigures
ore: cybersecurity.
have been Informationneglectful to ignore: cybersecurity. Information
erent world altogether
security once to the
convergence ..........................................
seemed a different world altogether to the
convergence
are higher still when 6 ..........................................
we filter down to EU-based 6
Yes - already have it
security professionals.
realmYes inhabited
- But
we thinkanybywe physical
need it security professionals. But any professionals (82% of EU-based respondents have
wo disciplinesdemarcation
has No now been between
- neither have it nor the 4.need
two Cutting-edge
disciplines
it has nowtechnologies
been or expect to need 9
..................
4. Cutting-edge privacy masking, versus
technologies 68%
.................. 9
tegration with Don't
emphatically
other buildings have demolished. Integration with other buildings outside of the EU).
it and not sure if we need it
– including thesystems,hijacking a spate of of breaches – including the hijacking of
2017 presidential
network inauguration
cameras 5. Warranties ........................................
13%during the 2017 presidential inauguration
5. Warranties 14 ........................................ 14
12% 37%
A trend report from IFSEC Global 10 Sponsored by IDIS
m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Pie chart Pie chart
Yes
Yes No Not sure
Sponsored by A trend Sponsored
report fromby A No
trend
– butreport
we mayfrom
do in the future
No – and we have no plans to do so
Do you use VGA/HDMI video recording for training purposes?
Not sure
Yes 31%
Do you use VGA/HDMI video encoders to provide audit trails and/or compliance?
No – but we may do in the future 29%
Yes 41%
No – and we have no plans to do so 21%
No 46%
13% Not sure 19% 19%
Yes 31%
No – but we intend to do so 40%
No – and have no plans to do so 29% Pie chart
19%
DO YOU USE VGA/HDMI
Pie chart
13% ENCODERS AS A VIDEO 31%
DO YOU FIND VGA/HDMIYes - veryMONITORING
useful AND
STREAM WITHIN YOUR VMS TO INTEGRATE AND
RECORDING SCREENS FROM OTHER
MONITOR SECURITY OR OTHER 41%APPLICATIONS Yes - very useful It’s good to have, but we’re yet to see any tan
(EG POS)? Yes It’s goodAPPLICATIONS USEFUL?
21%
to have, but we’re yet to see
We’ve any tangible
seen benefit
no benefit and are disappointed
No – but we intend to do so We’ve seen no benefit and are disappointed
No – and have no plans to do so
46% 29%
ssionals thought
assets,about
what plug-
security
Yes - but rarely
professionals
26%
thought about plug-
No - never 26%19%
ch cutting-edgeand-play
features
systems they and which
Pie chart 2. The cutting-edge
29% rise of open features they
platforms ...................
2. The rise of 4 open platforms ................... 4
April May June
valued most highly. July August September
ne subject in particular
This time round
that we’d
there was one subject in particular that we’d
3.- regularly
Cybersecurity in the age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been
Information
neglectful to Yes
ignore: cybersecurity. Information
erent world altogether
security once
to the
seemed a Yes
convergence
Yes
7%- sometimes
different
..........................................
world altogether to the
convergence 6 .......................................... 6
- but rarely
security professionals.
realm inhabited 8%
But anyby physical
No - security
never professionals. But any
35%
wo disciplinesdemarcation
has now been between
10% the 4.
twoCutting-edge technologies
disciplines has now been ..................
4. Cutting-edge 9 technologies .................. 9
tegration withemphatically
other buildings
demolished. 19%Integration with other buildings
11% 26%
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
networkinauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14
29%
26%
A trend report from IFSEC Global29% 11 Sponsored by IDIS
m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Sponsored by A trendSponsored
report fromby A trend report from
IDIS insight
ion 1.“Many
Introduction
in the industry are yet
to realise the benefits of using
encoders within surveillance systems.
The End
port 2017 builds Video
on users
the are still paying
Surveillance Report
– and the forspectre
2017 expensive
builds on thepunitive fines for
of more – and
datathe
breaches
spectre of more punitive fines for data breaches
ports in 2015 success
and 2016
of two
on previous reports
under the
and bespoke integration to control andin 2015
forthcomingand 2016
EU on
data protectionunder
law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
onsored, likethethissame
report,
monitor subject
by – alsoapplications
multiple issponsored,
sharpeningfrom like this
minds report,
a across theby
supply chain
is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global manufacturer
surveillance leader IDIS,
installers the
and
single user interface. The IDIS VGA/HDMI largest
security manufacturer
professionals scramble
installers
to strengthen
and security professionals scramble to strengthen
in Southmarket
ideo surveillance: Korea. In 2015,their Video
cybersurveillance:
defences. market their cyber defences.
Video Encoder is not only delivering cost
provided a snapshot
trends and of systems
expectations provided a snapshot of systems
savings; it’s reducing Withrisk
thisthrough
in mind, greater
some of our findings onWith pagethis6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinning
around the world, the factors underpinning
situational awareness interesting
and reading.
control and by interesting reading.
d how control procurement
rooms useddecisions and how control rooms used
surveillanceCCTV closing
Report security
systems.
2016: gaps surveillance
The video caused by the need2016:
Report
and play, meanwhile,to switch
wellneeds
ations, the security
focused
between
as providing
on
CONTENTS
disparate
security needs and plug and play, meanwhile,
an audit trail
upgrade motivations,
systems
thetosecurity
as
ensure needs
CONTENTS
shaped by the standard operating
of physical
surveillance systems asprocedures
shaped by the andphysical
validate
osed to people, compliance.” James Min, managing........................................
environment,
data and the threats 1. Introduction
posed to people, data and 1. Introduction 2 ........................................ 2
ssionals thought
assets,about
what plug-
security
director, IDIS Europeprofessionals thought about plug-
ch cutting-edgeand-play
features
systems
they and which cutting-edge
2. The rise of open features they
platforms ...................
2. The rise of 4 open platforms ................... 4
valued most highly.
ne subject in particular
This time round
that we’d
there was one subject in particular that we’d
3. Cybersecurity in the age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been
Information
neglectful to ignore: cybersecurity. Information
erent world altogether
security once
to the
convergence ..........................................
seemed a different world altogether to the
convergence 6 .......................................... 6
security professionals.
realm inhabited
But anyby physical security professionals. But any
wo disciplinesdemarcation
has now been between the 4.twoCutting-edge
disciplines has nowtechnologies
been ..................
4. Cutting-edge 9 technologies .................. 9
tegration withemphatically
other buildings
demolished. Integration with other buildings
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
networkinauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14
Pie chart
Sponsored by A trendSponsored
report fromby A trend report from
Yes
No – but we intend to
standard systems tend to look at pixel values for
DEEP LEARNING-
No – and we have no plans to do so
Do you currently use deep-learning video analytics (VA)?
Yes
No – but we intend to
16%
52%
input data, deep learning systems can also harness
edges, vector shapes and a plethora of other visual
POWERED VIDEO
No – and we have no plans to do so 32%
16%
32% elements to ‘recognise’ objects.
Pie chart
ANALYTICS 52%
The replacement of CPUs with GPUs (graphics
processing units), which can manage thousands
Yes of data processes simultaneously, was a game-
No – but we intend to
changer. The GPU can not only process images but
DO YOU No – and we have
CURRENTLY no plans to do so
USE DEEP-LEARNING VIDEO
ANALYTICSYes
(VA)? undertake transcoding, pattern matching, image
No – but we intend to analysis and recognition, signal processing and
No – and we have no plans to do so
16% more besides.
32%
16% Deep learning algorithms can handle larger datasets,
32% including unlabelled data, in less time, all while
reducing the burden on data centre infrastructure.
52% They are accelerating, and being enabled by,
52% migration to open and integrated platforms.
a deep
Better at spotting learning VA system might learn how
false alarms 41% to
monitoring and analysis 32% of CCTV footage. In fact,Flags anomalies/trends sooner or more accurately 25%
Makes the previously impossible possible 21%
VA applications have made possible a breadth and DON'T KNOW
DO YOU BELIEVE THAT DEEP-LEARNING VA 27%
NONE OF THE ABOVE 3%
depth of analysis that was hitherto impossible. OFFERS THE FOLLOWING IMPROVEMENTS OVER
ion 1. Introduction
They even provide operational benefits beyond Bar chart TRADITIONAL VA?
asset and people protection 52%– with many, such
as dwell time, queue-management and heat 50%
port 2017 builds mapping,
The Video
on of particular
theSurveillance benefit
Report
– and 2017
the tobuilds
the of
spectre retail
on the
more sector.
punitive fines for – and
datathe breaches
spectre of more punitive fines for data breaches
ports in 2015 success
and 2016 of twoon previousunder
reportsthein 2015 and 2016
forthcoming EU dataonprotection 38% under
law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
onsored, likethe But if
thissame VA
report, performs
subject tasks that
by – alsoissponsored, are
sharpening likesimply beyond
thisacross
minds report,thebysupply chain is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largesthuman
global operators,leader
manufacturer
surveillance then the
IDIS,
installerslatest paradigm
the largest
and security shift – scramble
manufacturer
professionals installers
to strengthen
and security professionals scramble to strengthen
in‘deep
ideo surveillance:Southmarketlearning’
Korea. In –2015,
is giving
Video
their them
cyber greater capacities
surveillance:
defences. market 25%their cyber defences.
still byand
provided a snapshot
trends mimicking
of systems human
expectations intelligence.
provided Such of systems
a snapshot
systems are becoming With
morethis effective
in mind, someat of our findings onWith
filtering pagethis 6 make
in mind, for some of our findings on page 6 make for
, the factors installed
underpinning around the world, the factors underpinning 13%
and processing interesting
data –and nothow reading.
just control
throughrooms
periodic interesting reading.
d how control procurement
rooms useddecisions used
surveillanceCCTV software
Report systems.updates but through self-learning.
2016: The video surveillance Report 2016: A
majorityneeds
and play, meanwhile,
security
powered
of end
on by
users
and plug(…%)
deep learning
and either CONTENTS
algorithms
already use VA
play, meanwhile,
or atneeds
leastBetter
0%
at CONTENTS
spotting false alarms DON'T KNOW
Better at spotting false alarms
DON’T KNOW
Discount respondents who admitted to assume that systems are ‘intelligent’ enough to
ignorance of the technology’s pros or cons (24%) configure themselves, but behaviours must still
– understandable given its relative novelty and be defined by the manufacturer or integrator.
complexity – and we see that deep learning VA is And with humans still involved, mistakes and
widely believed to offer a plethora of compelling misjudgements are always possible. Multiple site
benefits. Each of six operational benefits we put visits might be necessary to optimise configuration
to them were endorsed by at least one in three of of detection zones, masks, camera angles or
those who did express an opinion. Even the more perspective settings.
generic statement ‘makes the previously impossible
Benchmark magazine recounted a conversation
possible’ – a bold claim – was recognised as true by
with a leading manufacturer, who told them
one in five (21%) respondents.
that one customer had been unhappy with their
The top two most frequently cited benefits – investment in around 1,000 channels of video
‘reducing manpower costs’ and being ‘better analytics. Keen to uncover the problem, the
at spotting false alarms’ – can both reduce costs manufacturer visited the site and discovered that
– and nothing makes a boardroom pitch for only about 150 channels had been implemented
investment more convincing than demonstrating – just 15% of their investment. The problem, it
operational efficiencies. The costs of false alarms transpired, was labour costs.
can be particularly eye-watering in, say, an airport,
That all said, with deep learning VA can be
with shutdowns caused by unattended bags or
deployed with much less incident-specific
suspicious persons running into tens of thousands configuration than its predecessors and is
of pounds per minute. arguably simpler and quicker overall to get up and
No surprise then to see that almost as many running.
respondents (36%) agreed that deep learning VA Today’s facial recognition algorithms, which
was suitable for high security environments. An are already 100 times more accurate than they
ability to quickly categorise and interpret large were in 1995 (National Institute of Standards
ion 1. Introduction
volumes of data is invaluable when monitoring
particularly ‘busy’ scenes classified as a high
and Technology), are now being supercharged
by neural networks. Some 30% of those polled
security risk. Human operators are limited in how agreed that deep learning enhances the accuracy
port 2017 builds comprehensively
The Video
on theSurveillance theyReport
– can
and thegrasp
2017 what’s
builds
spectre happening
on
of more thepunitive fines for
– and
of facialdata the
breaches
spectre ofBiometrics
recognition. more punitive fines for data
specialist Herta breaches
ports in 2015 inand
crowded
success 2016
of twoonpublic
previous squares,
reports
under sports
the in stadiums,
2015
forthcoming EUtrain
and 2016 onprotection
data Security – a technology partner of this report’s GDPR),
under
law (the
the GDPR),
forthcoming EU data protection law (the
onsored, likethe stations,
thissamereport,airports
by – and
subject alsoisthe like – andlike
sponsored,
sharpening in this
mindsdeciding
report,
across theby
supplysponsor,
chain
is sharpening
as vendors,
IDIS – usesminds across
deep the supply
learning chain
in its as vendors,
intelligent
IDIS, the largest
global
what manufacturer
surveillance
activity warrantsleader IDIS,inspection.
installers
closer the largest
and securitymanufacturer
professionals scramble installers
to strengthen
and security professionals
video analytics, which includes facial recognition.scramble to strengthen
in Southmarket
ideo surveillance: Korea. In 2015,their Videocybersurveillance:
defences. market their cyber defences.
Such innovation has huge potential for identifying
provided a snapshot
trends
Great ofexpectations
and systems
expectations provided a snapshot of systems
With this in mind, some of our findings serial
onWithshoplifters
pagethis6 make who
in mind, account
for some of ourfor moston
findings theft
pagein 6the
make for
, the factors installed
underpinning around the world, the factors underpinning
interesting reading. retailinteresting
sector. reading.
Increasingly able to identify people
d how control procurement
rooms
The terms used decisions
‘smart’ andand how control
‘intelligent’ haverooms
longusedbeen
surveillanceCCTV Report systems.
2016: The video in surveillance Report 2016: from awkward angles and as they move through a
bandied about liberally the security industry.
and play, meanwhile,
security
However,
ations, the security
focused
needs
needs
bothand
onwith
upgrade
vendorsCONTENTS
plug and andplay,
motivations,
meanwhile,
end users have
the security
CONTENTS
site, it can also potentially bar blacklisted people
entry from a particular area.
done so no single, commonly agreed needs
and
shaped by the of physical
surveillance systems as shaped by the physical
understood definition1. of Introduction
what these terms actually This is1.one way in which deep learning systems
osed to people,
environment,
data and the threats posed to people,........................................
data and Introduction 2 ........................................ 2
mean. But deep learning is more closely aligning can take decisions without authorisation of human
ssionals thought
assets, about
whatplug-
security professionals thought about plug-
ch cutting-edge those
and-play words
features systems
theyto their
and whichmeaning when applied
cutting-edge featuresto they personnel. It’s interesting to note that so many of
people. 2. The rise of open platforms ...................
2. The rise of 4 open platforms ................... 4
those polled – 28% – believe deep learning VA
valued most highly.
‘can be more trusted to trigger actions without the
Nevertheless,
ne subject in particular
This time round
that we’d expectations
there was one subject of a technology
in particular that we’d
3. Cybersecurity in the age of approval3. Cybersecurity
of a human operator’ in the age of note that
(although
alsobeen
ore: cybersecurity.
have described
Information more
neglectful hyperbolically
to ignore: as ‘artificial
cybersecurity. Information
erent world altogether
security once
to theseemed
convergence ..........................................
convergence
the statement ..........................................
said6‘more’ trusted than traditional 6
intelligence’ or ‘AI’acan different world altogether
be unrealistic. The to the
security professionals.
realm inhabited
But any systems – a rather different emphasis than saying
technology isby physical
still security and
in its infancy professionals.
we’re a longBut any
they ‘should’ be trusted.)
way from AI computer4.
wo disciplinesdemarcation
has now beenbetween the two Cutting-edge technologies
disciplines
HAL 9000 depicted has now inbeen ..................
4. Cutting-edge 9 technologies .................. 9
tegration withemphatically
other buildings demolished. Integration with other buildings
the film 2001: A Space Odyssey. Users might
– including the
systems,
hijackinga spate
of of breaches – including the hijacking of
2017 presidential
network inauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14
AND CRITICAL
August September operational value as well as security intelligence
11% from visual data, makes critical failover
FAILOVER 8%
7% functionality more necessary.
7%
7% 8% 29% 35%
8% 35%
10% Essentially, CCTV systems are becoming more
10%
0%
35% useful and effective to businesses and law
11%
HOW SERIOUSLY WOULD YOU REGARD THE LOSS enforcement. As the risks and costs of downtime
11%
CHART:OF FOOTAGE,
Q12 DUE TO A SYSTEM FAILURE,
1% Very
HOWEVER
seriously 29% rise in tandem, manufacturers are developing back-
ModeratelyRARELY seriously AND BRIEFLY IT OCCURS?
It’s a minor problem
29%
– chances offault? up contingencies
missing something important are miniscule that keep systems operational
How often29% is there a break/gap in footage captured (however brief) due to a system
NeverHow
- Notoften
awareisofthere
it everahappening
break/gap in footage captured (however brief) due
Never - Not aware of it ever happening
1-2 times a year 23%
23%to a system fault?
42%
when there are system faults.
1-2 times
3-5 times a yeara year 21%42%
3-5 times a year 9% 3%21%
6-10 times
More 6-10
a year
than times a year
10 times a year Very seriously 11% 3% Some sectors have a particularly pressing need for
More than 10 times a year 11%
25%
Very seriously Moderately seriously back-up systems. For instance, in football stadia
ously Moderately seriously It’s a minor problem – chances of missing something important are miniscule
Bar chart
ely seriously
Bar chart
incidents
It’s a minor problem – chances of missing something important are occur with comparative regularity. In a terror-
miniscule
66%
or problem – chances of missing something important are miniscule stalked world, high availability matters in crowded
50%
9%
50% 9% places like public squares and train stations too, as
25% well as other critical national infrastructure (CNI).
38% 25%
38%
Only a minority of respondents would not take
66% In an interconnected world, security experts
a break in footage
66% caused by a system fault at
66%
25%25% increasingly talk of ‘resilience’: minimising
least ‘somewhat seriously’ (…%), with the most
economic disruption from cyber-attacks, terror
common
13% response being ‘very seriously’ (…%).
13% attacks and natural disasters. Failover systems
reflect a recognition among manufacturers that
0%0%
Never - Not
Never aware
- Not of it
aware ofever happening
it ever happening
they must build resilience into products if they’re
HOW OFTEN IS THERE A BREAK/GAP IN FOOTAGE toWhich
winhardware
contracts
tends toin government,
fail/malfunction transport,
most often in your opinion?
CAPTURED (HOWEVER BRIEF) DUE TO A SYSTEM Cameras 20%
FAULT? banking,
Storage healthcare, utilities
19% and other high-
security
NVR/DVR
environments. 16% 16%
ion 1. Introduction
Software
PoE or other connecting cable 14%
PSU 7%
11%
11% DON'T KNOW 8%
3%3% 23%
23% WHICH HARDWARE TENDS TO FAIL/MALFUNCTION
Never
Never- Not aware
- Not awareofof
it ever happening
it ever happening
1-21-2
times a year
MOST
Bar chart OFTEN IN YOUR OPINION?
times a year
port 2017 builds
The
21% 21%Video
on theSurveillance Report
–3-5
andtimes
3-5 2017
the
times a year builds
spectre
a year of on
more the
punitive fines for– and
data the
breaches
spectre of more punitive fines for data breaches
ports in 2015success
and 2016of two
on previousunder
reports
6-10
6-10
More
the
times
times
than
in
a a2015
year and 2016
forthcoming
year EU on
data protection
20% under
law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
More than 1010 times
times a year
a year
onsored, likethe
thissame
report,
subject
by – alsoissponsored,
42%
42% sharpening like mindsthisacross
report,
theby
supply chainis sharpening
as vendors,minds across the supply chain as vendors, DON’T KNOW
IDIS, the largest
global manufacturer
surveillance leader IDIS, and
installers the largest
securitymanufacturer
professionals scramble
installers
to strengthen
and security professionals scramble to strengthen
in Southmarket
ideo surveillance: Korea. In 2015,their Videocybersurveillance:
defences. market 15%their cyber defences.
CONNECTING CABLE
provided a snapshot
trends of systems
and
For smaller expectations
businesses withoutprovidedcontrola snapshot
rooms,of systems
With this in mind, some of our findings onWith pagethis
6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinning around the world, the factors underpinning
POE OR OTHER
Software
courtroom. From
CONTENTSof footage
CONTENTS
Storage
5%
and play, meanwhile,
security needs and plug and play,
captured throughout the year, security personnel meanwhile,
PSU
ion 1. Introduction
port 2017 builds
The onVideo
theSurveillance Report
– and the2017 builds
spectre on thepunitive fines for
of more – and
datathe
breaches
spectre of more punitive fines for data breaches
ports in 2015 success
and 2016of two
on previousunder
reports
thein 2015 and 2016
forthcoming onprotectionunder
EU data law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
onsored, likethethissame
report,
subject
by – alsoissponsored,
sharpening like thisacross
minds report,
theby
supply chain
is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global manufacturer
surveillance leader IDIS, and
installers the largest
securitymanufacturer
professionals scramble
installers
to strengthen
and security professionals scramble to strengthen
in Southmarket
ideo surveillance: Korea. In 2015,their
Video
cybersurveillance:
defences. market their cyber defences.
provided a snapshot
trends and of systems
expectations provided a snapshot of systems
With this in mind, some of our findings onWith pagethis6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinning
around the world, the factors underpinning
interesting reading. interesting reading.
d how control procurement
rooms useddecisions and how control rooms used
surveillanceCCTVReport systems.
2016: The video surveillance Report 2016:
and play, meanwhile, CONTENTS
security needs and plug and play, meanwhile,
ations, the security
focusedneedson upgrade motivations, the security needs
CONTENTS
shaped by the of physical
surveillance systems as shaped by the physical
osed to people, data and the threats1.
environment, Introduction
posed to people,........................................
data and 1. Introduction 2 ........................................ 2
ssionals thought
assets,about
whatplug-
security professionals thought about plug-
ch cutting-edgeand-play
features
systems
they and which cutting-edge
2. The features
rise of open they
platforms ...................
2. The rise of 4 open platforms ................... 4
valued most highly.
ne subject in particular
This time round
that we’d
there was one subject in particular that we’d
3. Cybersecurity in the age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been
Information
neglectful to ignore: cybersecurity. Information
erent world altogether
security once
to the
convergence ..........................................
seemed a different world altogether to the
convergence 6 .......................................... 6
security professionals.
realm inhabited
But anyby physical security professionals. But any
wo disciplinesdemarcation
has now been between the 4.twoCutting-edge
disciplines has nowtechnologies
been ..................
4. Cutting-edge 9 technologies .................. 9
tegration withemphatically
other buildings
demolished. Integration with other buildings
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
networkinauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14
Are you more concerned about data breaches and cyber-attacks than you were two years ago?
More concerned 65%
No sector is immune, certainly not video
CYBERSECURITY
About the same 27%
Less concerned 8%
Pie chart
surveillance given that 86% of end users who
responded to this survey have network-connected
systems. A story broke in February 2018 that laid
Are you more concerned about data breaches and cyber-attacks than you were two years ago?
ARE YOU MORE CONCERNED ABOUT DATA
More concerned 65%
More
BREACHES AND
About the same
concerned
LessCYBER-ATTACKS THAN
concerned
27%
8% YOU WERE bare the risks: four British schools were among
About the same
TWO YEARS AGO?
Less concerned Pie chart
hundreds of public spaces, businesses and private
What do you think is the biggest security threat to surveillance systems? homes whose camera feeds were streamed on a
The PHYSICAL threat: Theft of NVRs/DVRs/SD cards/cameras
8%
The CYBER threat: Hacking or phishing
35%
65%
Russian website because they weren’t protected
by passwords.
27% More concerned
Pie chart
About the same It’s perhaps surprising against this background
65% Less concerned
that as many as one in four (27%) should claim
to be neither more nor less concerned about
What do you think8% the
is the biggest security threat to surveillance
The PHYSICAL threat: Theft of NVRs/DVRs/SD cards/cameras
cybersecurity threat, while 8% professed
systems?
35%
What do you think is the biggest security threat to surveillance systems?
The PHYSICAL threat: Theft of NVRs/DVRs/SD cards/cameras
The CYBER threat: Hacking or phishing
35%
The PHYSICAL threat: Theft of NVRs/DVRs/SD cards/cameras
What do you think is the biggest security threat to surveillance systems? 65%
to actually
What do you think is the biggest security threat to surveillance systems?
The CYBER threat: Hacking or phishing 65%
35%
be less concerned. There are several
WHAT DO YOU THINK IS THE27% BIGGEST SECURITY
The CYBER threat: Hacking or phishing
The PHYSICAL threat: Theft of NVRs/DVRs/SD cards/cameras 35%
possible reasons other than sheer complacency.
65%
The PHYSICAL threat: Theft of NVRs/DVRs/SD cards/cameras
The CYBER threat: Hacking or phishing
Pie chart 65%
THREAT TO SURVEILLANCE SYSTEMS?
The CYBER threat: Hacking or phishing
Pie chart
Pie chart Some may attribute the rise in media coverage
Pie chart 65%
of cybersecurity breaches, rightly or wrongly, to
improved detection and more frequent reporting.
The PHYSICAL threat: Theft of NVRs/DVRs/SD Others may have hardened their systems and
cards/cameras
35%
The PHYSICAL threat: Theft of The
TheTheCYBER threat: Hacking or phishing
CYBER threat:
NVRs/DVRs/SD Hacking or phishing
cards/cameras
The PHYSICAL threat: Theft of NVRs/DVRs/SD procedures in the last two years, possibly as part
cards/cameras
PHYSICAL threat: Theft of NVRs/DVRs/SD
The CYBER threat: Hacking cards/cameras or phishing
The CYBER threat: Hacking or phishing of efforts to comply with GDPR (although one
65%
might also expect them to be more concerned
35%
35%
35%
because of anxiety over punitive fines being
35% 65% introduced by the GDPR).
65%
Around two thirds of respondents 65% (65%) were more
65%
concerned about data breaches than they were
“Frequent changes of
ion 1. Introduction
two years ago. Exactly the same proportion also
considered the cyber threat to be a bigger security password to NVR/DVR
risk than the physical threat. A distributor based in and cameras can go
port 2017 builds Spain
The Video
on observed
the Surveillance that even – andifthe
Report someone
2017 spectrebuilds steals
of on the
more apunitive
NVR, fines for – and
datathebreaches
a spectre
long of more punitive fines for data breaches
wayEUtodata prevent
ports in 2015 success
and 2016of two
on previous reports
under
they still need to hack into it to obtain the data. the in 2015
forthcoming and 2016
EU data on protection under
law (the
the GDPR),
forthcoming protection law (the GDPR),
onsored, likethe thissame
One report,subject
consultant by –said alsothe issponsored,
sharpening
cyber threat like
minds isthis report,
across
the biggest theby supply chain is sharpening cyber threat.”
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global manufacturer
surveillance leader IDIS,
installers
concern because of the “invisibility of the attacker. the
and largest
security manufacturer
professionals scramble installers
to strengthen
and security professionals
Ghana-based installer scramble to strengthen
Who is typically the most complacent or least educated about cybersecurity?
in Southmarket
ideo surveillance: Korea. In 2015,their Video cyber surveillance:
defences. market their cyber defences.
Physical threats/vandalism are rare due to the End users 48%
22%
provided a snapshot
trends and expectations provided a snapshot of systems Installers
of systems
presence of cameras and Withthe thispossibility
in mind, some of storage
of our findingsConsultants
Vendors
onWithpagethis 6 make
8%
in mind,
8% for some of our findings on page 6 make for
, the factors installed
underpinning around the world, the factors underpinning
in a remote location.” interesting
However, reading.
a distributor based interesting
Manufacturers
WHO IS reading.
6%
TYPICALLY THE MOST COMPLACENT OR
d how control procurement
rooms useddecisions and how control rooms used NO OPINION 8%
LEAST EDUCATED ABOUT CYBERSECURITY?
surveillanceCCTV in Indonesia
Report 2016:said
systems. Thesome videoofsurveillance
their customers Report “were2016:
CONTENTS CONTENTS
Bar chart
not
and play, meanwhile, really concerned about
security needs and plug and play, meanwhile, securing the monitor
room.”needs
ations, the security
focused on upgrade motivations, the security needs 50%
shaped by the of physical
surveillance systems as shaped by the physical
osed to people, Cybersecurity
data and theisthreats
environment, certainly 1.posed
Introduction
a growing
to people, ........................................
concerndata and both 1. Introduction 2 ........................................ 2
38%
in the physical security space and in industry,
Manufacturers
ssionals thought
assets, about
what plug-
security professionals thought about plug-
NO OPINION
ch cutting-edge and-play
features systems
they and which Thecutting-edge
rise of open features they
platforms ...................
2. The rise of 4 open platforms ................... 4
25%
a report
valued most byhighly.
the Identity Theft Resource Center and
Vendors
End users
Installers
Asked who they thought was most complacent With cloud storage ranking bottom, security
or least educated about cybersecurity in the professionals are perhaps becoming less wary
supply chain, only 6% of respondents chose about outsourcing control of their data and
manufacturers. It’s reassuring news for technology cybersecurity measures. Global spending on
developers, some of whom have drawn public cloud services and infrastructure is forecast
opprobrium for not forcing users to change to reach $277bn by 2021, at a compound annual
default passwords. Product developers have growth rate (CAGR) of 21.9%, according to IDC.
certainly in the last two years been noticeably
David Lithnicum, chief cloud strategy officer at
more active in championing the cyber resilience of
Deloitte Consulting, said back in 2014 that the
their products and educating customers, through
‘folded arms gang’ in enterprise IT were already
literature, roadshows and the like, on how to
gradually coming round to the cloud as it proves
harden their processes and systems.
its worth. Writing on TechTarget he pointed to
Vendors (8%) and consultants (7%) also got off Alert Logic’s Fall 2012 State of Cloud Security
lightly. Report, which said “the variations in threat activity
are not as important as where the infrastructure is
End users were seen as the most complacent/
located. Anything that can be possibly accessed
least educated about cybersecurity (48%), with
from outside – whether enterprise or cloud – has
installers well behind in second place (22%).
equal chances of being attacked, because attacks
Frequently entering the industry via the military
are opportunistic in nature.”
or police, physical security professionals have
had to broaden their skills to equip themselves The report found that web application-based
for the IP era. Similarly, many installers formed attacks hit on-site environments as well as service
their business models in the age of the analogue provider environments, albeit the latter happened
camera. The GDPR will perhaps prompt installers to a greater proportion of organisations (53%
to prioritise cybersecurity whether or not the end versus 44%). However, on-site environments
user has pushed for it. suffered a far higher average number of attacks:
38%
most out of security systems.
VERY GOOD
25%
ADEQUATE
APPALLING
POOR
13%
ion 1. Introduction
0%
Top class Very good Adequate Poor Appalling
The vast majority (95%) of end users rated their
port 2017 builds
The Video
on
vendor’stheSurveillance Report
– and the
technical support 2017
as builds
spectre
at least on thepunitive fines for
of‘adequate’
more – and
datathe
breaches
spectre of more punitive fines for data breaches
ports in 2015 success
and 2016
of two
on previous reports
under the in 2015 and
forthcoming
with 57% opting for ‘very good’ or better, and a 2016
EU on
data protectionunder
law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
onsored, likethethissame
report,
subject
by – alsoissponsored,
sharpening like this report,
minds by
still decent chunk – 16% – calling it ‘topacross
class’.the supply chain
Less is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global manufacturer
surveillance leader IDIS, and
installers the largest
securitymanufacturer
professionals scramble
installers
to strengthen
and security professionals scramble to strengthen
than 1% thought the service they’d received was
in Southmarket
ideo surveillance: Korea. In 2015,theirVideo surveillance:
cyber defences. market their cyber defences.
‘appalling’.
provided a snapshot
trends andof systems
expectations provided a snapshot of systems
With this in mind, some of our findings onWith pagethis6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinningaround the world, the factors underpinning
interesting reading. interesting reading.
d how control procurement
rooms
PLEASE used decisions
RANK and OF
IN ORDER how control rooms
USEFULNESS used
THESE
surveillanceCCTVReport systems.
FORMS 2016: The video surveillance Report 2016:
OF TECHNICAL SUPPORT:
and play, meanwhile,
security needs and plug and play, meanwhile,
ations, the security
focusedneeds
CONTENTS
on upgrade motivations, the security Order needs
of
CONTENTS
importance
shaped by the of physical
surveillance systems as shaped by the physical
osed to people,
environment,
data andthrough
Talking the threats 1.posed
a problem Introduction
to people,........................................
data and 1. Introduction 2 ........................................ 2
on the phone 1ST
ssionals thought
assets, about
whatplug-
security professionals thought about plug-
ch cutting-edgeand-play
featuressystems
they and which 2. Thecutting-edge
rise of openfeatures they
valued mostOn-site technician visit
highly. 2ND platforms ...................
2. The rise of 4 open platforms ................... 4
ne subject in particular
This time round
that we’d
there was one subject in particular
3. Cybersecurity
Troubleshooting guides/FAQs 3RD in that
the we’d
age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been
Information
neglectful to ignore: cybersecurity. Information
erent world altogether
security once
to the
convergence ..........................................
seemed a different world altogether to the
convergence 6 .......................................... 6
Manufacturer’s classroom training
security professionals.
realm inhabited 4 TH
But anyby physical security professionals. But any
Video tutorials 4. Cutting-edge technologies ..................
4. Cutting-edge 9 technologies .................. 9
wo disciplinesdemarcation
has now been between the two disciplines has now been
tegration withemphatically
other buildings 5 TH
demolished. Integration with other buildings
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
networkinauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14
ion 1. Introduction
port 2017 builds
The onVideo
theSurveillance Report
– and the2017 builds
spectre on thepunitive fines for
of more – and
datathe
breaches
spectre of more punitive fines for data breaches
ports in 2015 success
and 2016of two
on previousunder
reports
thein 2015 and 2016
forthcoming onprotectionunder
EU data law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
onsored, likethethissame
report,
subject
by – alsoissponsored,
sharpening like thisacross
minds report,
theby
supply chain
is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global manufacturer
surveillance leader IDIS, and
installers the largest
securitymanufacturer
professionals scramble
installers
to strengthen
and security professionals scramble to strengthen
in Southmarket
ideo surveillance: Korea. In 2015,their
Video
cybersurveillance:
defences. market their cyber defences.
provided a snapshot
trends and of systems
expectations provided a snapshot of systems
With this in mind, some of our findings onWith pagethis6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinning
around the world, the factors underpinning
interesting reading. interesting reading.
d how control procurement
rooms useddecisions and how control rooms used
surveillanceCCTVReport systems.
2016: The video surveillance Report 2016:
and play, meanwhile, CONTENTS
security needs and plug and play, meanwhile, CONTENTS
shaped by the THE
ations, the security
focusedneeds
of physical
on upgrade motivations, the security needs
surveillance systems as shaped by the physical
data and the threats1. Introduction
to people,........................................
1. Introduction 2 ........................................ 2
VIDEO
osed to people,
environment,
ssionals thought
assets,about
whatplug-
posed data and
security professionals thought about plug-
ch cutting-edge
SURVEILLANCE
and-play
features
systems
they and which
valued most highly.
cutting-edge
2. The features
rise of open they
platforms ...................
2. The rise of 4 open platforms ................... 4