You are on page 1of 20

Sponsored by A trendSponsored

report fromby A trend report from

THE VIDEO
SURVEILLANCE
REPORT
2018

ion 1. Introduction
port 2017 builds
The onVideo
theSurveillance Report
– and the2017 builds
spectre on thepunitive fines for
of more – and
datathe
breaches
spectre of more punitive fines for data breaches
ports in 2015 success
and 2016of two
on previousunder
reports
thein 2015 and 2016
forthcoming onprotectionunder
EU data law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
onsored, likethethissame
report,
subject
by – alsoissponsored,
sharpening like thisacross
minds report,
theby
supply chain
is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global manufacturer
surveillance leader IDIS, and
installers the largest
securitymanufacturer
professionals scramble
installers
to strengthen
and security professionals scramble to strengthen
in Southmarket
ideo surveillance: Korea. In 2015,their
Video
cybersurveillance:
defences. market their cyber defences.
provided a snapshot
trends and of systems
expectations provided a snapshot of systems
With this in mind, some of our findings onWith pagethis6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinning
around the world, the factors underpinning
interesting reading. interesting reading.
d how control procurement
rooms useddecisions and how control rooms used
surveillanceCCTVReport systems.
2016: The video surveillance Report 2016:
and play, meanwhile, CONTENTS
security needs and plug and play, meanwhile,
ations, the security
focusedneedson upgrade motivations, the security needs
CONTENTS
shaped by the of physical
surveillance systems as shaped by the physical
osed to people, data and the threats1.
environment, Introduction
posed to people,........................................
data and 1. Introduction 2 ........................................ 2
ssionals thought
assets,about
whatplug-
security professionals thought about plug-
ch cutting-edgeand-play
features
systems
they and which cutting-edge
2. The features
rise of open they
platforms ...................
2. The rise of 4 open platforms ................... 4
valued most highly.
ne subject in particular
This time round
that we’d
there was one subject in particular that we’d
3. Cybersecurity in the age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been
Information
neglectful to ignore: cybersecurity. Information
erent world altogether
security once
to the
convergence ..........................................
seemed a different world altogether to the
convergence 6 .......................................... 6
security professionals.
realm inhabited
But anyby physical security professionals. But any
wo disciplinesdemarcation
has now been between the 4.twoCutting-edge
disciplines has nowtechnologies
been ..................
4. Cutting-edge 9 technologies .................. 9
tegration withemphatically
other buildings
demolished. Integration with other buildings
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
networkinauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14
Sponsored by A trend
Sponsored
report from
by A trend report from
A trend report from IFSEC Global 1 Sponsored by IDIS
m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Sponsored by A trendSponsored
report fromby A trend report from

THE VIDEO
SURVEILLANCE
REPORT
2018
CONTENTS
Introduction 3
Installed base 5
Upgrading & innovation 6
VGA/HDMI video encoders 11
Deep learning powered video analytics 13
ion 1. Introduction Systems faults & critical failover 15
port 2017 builds
ports in 2015
The on
success
Cybersecurity
Video
theSurveillance Report
and 2016of two
– and the
on previousunder
reports
2017
thein
builds
spectre on thepunitive fines for
of more
2015 and 2016
forthcoming
17
– and
datathe
onprotectionunder
EU data
breaches
law (the
spectre of more punitive fines for data breaches
the GDPR),
forthcoming EU data protection law (the GDPR),
onsored, likethe
thissame
IDIS, the largest
global
report,
subject
by – alsoissponsored,
Technical
sharpening like
surveillance support
manufacturer leader IDIS, and
installers
thisacross
minds
the largest
report,
theby
supply chain
securitymanufacturer
professionals scramble 19
is sharpening
as vendors,minds across the supply chain as vendors,
installers
to strengthen
and security professionals scramble to strengthen
in Southmarket
ideo surveillance: Korea. In 2015,their
Video surveillance:
cyber defences. market their cyber defences.
provided a snapshot
trends andof systems
expectations provided a snapshot of systems
With this in mind, some of our findings onWith
pagethis
6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinning
around the world, the factors underpinning
interesting reading. interesting reading.
d how control procurement
rooms useddecisions and how control rooms used
surveillanceCCTV systems.
Report 2016: The video surveillance Report 2016:
and play, meanwhile, CONTENTS
security needs and plug and play, meanwhile,
ations, the security
focusedneeds
on upgrade motivations, the security needs
CONTENTS
shaped by the of physical
surveillance systems as shaped by the physical
osed to people, data and the threats1.
environment, Introduction
posed to people,........................................
data and 1. Introduction 2 ........................................ 2
ssionals thought
assets,
about
whatplug-
security professionals thought about plug-
ch cutting-edgeand-play
features
systems
they and which cutting-edge
2. The features
rise of open they
platforms ...................
2. The rise of 4 open platforms ................... 4
valued most highly.
ne subject in particular
This time round
that we’d
there was one subject in particular that we’d
3. Cybersecurity in the age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been
Information
neglectful to ignore: cybersecurity. Information
erent world altogether
security once
to the
convergence ..........................................
seemed a different world altogether to the
convergence 6 .......................................... 6
security professionals.
realm inhabited
But anyby physical security professionals. But any
wo disciplinesdemarcation
has now been between the 4.twoCutting-edge
disciplines has nowtechnologies
been ..................
4. Cutting-edge 9 technologies .................. 9
tegration withemphatically
other buildings
demolished. Integration with other buildings
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
networkinauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14

A trend report from IFSEC Global 2 Sponsored by IDIS


m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Sponsored by A trendSponsored
report fromby A trend report from

Some innovations create other possibilities:


INTRODUCTION finding missing persons, alerting authorities to
the movements of terror suspects and generating
The fourth annual edition of The Video
Surveillance Report sets out, like previous intelligence with operational, not just security,
benefits, for instance. Neural networks could
editions, to gauge industry opinion and
take these possibilities to a whole other level –
experiences of the latest innovations in
something we explore on pages 13 and 14.
network cameras and video surveillance
This report picks up on two side-effects of the
systems. Once again sponsored by IDIS, the growing usefulness of video surveillance. One
report shares findings based on a survey of is growing storage needs, driven by higher
243 professionals working in the resolutions and video analytics, among other
sector – from installers and integrators to factors. We canvassed views on solutions to this
consultants and heads of security. challenge, be it extra hard drives or – our main
focus – data compression standards. Secondly, if
We asked end users about their existing systems systems are now more useful they become more
– when they were last upgraded, whether they indispensable – and systems downtime becomes
sourced from a single manufacturer and whether a bigger problem. Therefore we also have a
they’d yet migrated to IP. Motivations that drive section on the frequency of system faults and how
system upgrades have been a recurrent focus seriously end users take the issue.
since we launched the inaugural report in 2014
ion 1. Introduction
and this year is no different. This time round we
assessed which hardware end users were most
Beyond the technology itself we also asked end
users to rate the technical support they received
from manufacturers. Whether you find their
likely to upgrade next as well as the comparative responses surprising depends very much, if you’re
port 2017 buildsThe Video
on theSurveillance
importance of imageReport
and the 2017
–resolution, builds
spectre
video on
of more thepunitive fines
analytics, for
– and
datathebreaches
spectre of more punitive fines for data breaches
ports in 2015 success
and 2016 of twoon previousunder reports thein 2015 and 2016
forthcoming on an end user yourself,
forthcoming your
on own experience of GDPR),
data compression technologies and more.EU data protection under
law (the
technical
the GDPR),
support.
EU data protection law (the
onsored, likethe thissame
report,
subject
by – alsoissponsored,
sharpening like mindsthisacross
report, thebysupply chain
is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global manufacturer
surveillance leader IDIS, and
installers the largest
securitymanufacturer
professionals scramble installers
to strengthen
and security professionals scramble to strengthen
inCCTV
ideo surveillance: once
Southmarket
Korea. had just two
In 2015, purposes:
Video
their cyber to act as
surveillance:
defences. a
market We also askeddefences.
their cyber respondents how widely they use
visual
provided a snapshot
trends and deterrent
of systems to would-be criminals
expectations provided a snapshot of systems and to VGA/HDMI video encoders for audit trails and
providearound evidence With this in mind, some of our findings onWith
page this
6
in court. If compliance, for trainingmake
in mind,
for somepurposes,
of our findings
andon aspage 6 make for
a video
, the factors installed
underpinning the to secure
world, theconvictions
factors underpinning
interesting reading. interesting reading.
d how control its effectiveness
procurement
rooms in fulfilling
useddecisions and how thecontrol
first goalroomswasusedhotly stream within their VMS to integrate and monitor
surveillanceCCTV Report systems.
2016:
thenThe thatvideo
was, surveillance Report 2016: security or other applications.
CONTENTS CONTENTS
disputed arguably, partly because
and play, meanwhile,
security needs and
its effectiveness inplug and play,
achieving meanwhile,
the latter was patchy.
ations, the security
focused needs
on upgrade motivations,
But the archetypal half-asleep, night-shift the security needs
security We could of course hardly ignore cyber-crime,
shaped by the of physical
surveillance systems as shaped by the physical which joined environmental disasters, large-
guard who intermittently checks his monitors for
osed to people, data and the threats1.
environment, Introduction
posed to people,........................................
data and scale1. Introduction
involuntary 2 ........................................
migration and illicit trade as the 2
ssionals thoughtsigns
assets, of
about
whatintruders
plug-
security has been rendered
professionals something
thought about plug- biggest global security threats in 2018, according
ch cutting-edge of an
and-play anachronism
features they andbywhich
systems innovation. Now resolutions
cutting-edge features they to ...................
the2.WEF’s Global Risks Report. The frequency
are often HD-sharp (or
2. The
better) and
risefootage
of open platforms
is now
The rise of
4 open platforms ................... 4
valued most highly. and variety of attacks seemingly grows year on
classified as ‘data’ – a resource to be mined by
ne subject in particular
This time round
that we’dthere was one subject in particular that we’d year and video surveillance systems are far from
increasingly complex algorithms 3. Cybersecurity deployedin bythe
video age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been neglectful to ignore: cybersecurity. Information immune. We asked respondents if they were more
Information
analytics
erent world altogether
security tosoftware.
once theseemedNow
convergence
providing
a different
..........................................
worldsophisticated
altogether to the
convergence
concerned about the 6 ..........................................
threat than two years ago, to 6
image
security professionals.
realm analysis
But anybyand
inhabited crystal-clear
physical security footage,
professionals.CCTV Butis any rank various risk factors by threat level and which
much
wo disciplinesdemarcation
has now more
been effectivethe
between at4.providing
two court material
Cutting-edge technologies
disciplines has now and part..................
been of
4.the supply 9
Cutting-edge chain technologies
they thought was least
.................. 9
tegration with therefore,
emphatically
other buildingswe might surmise,
demolished. deterrence.
Integration with other buildings educated about the cybercrime threat.
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
network inauguration
cameras during the 5.2017
Warranties
presidential ........................................
inauguration 5. Warranties 14 ........................................ 14

A trend report from IFSEC Global 3 Sponsored by IDIS


m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Sponsored by A trendSponsored
report fromby A trend report from

ion 1. Introduction
About IDIS
The IDIS
port 2017 builds Video
on is Surveillance
the a global security– andcompany
Report 2017
the that
builds
spectre of designs,
on thepunitive fines for
more – and
datathe
breaches
spectre of more punitive fines for data breaches
ports in 2015 manufactures
success
and 2016
of two and delivers
on previous reports
under surveillance
the in 2015 andsolutions
forthcoming 2016
EU dataonprotectionunder
law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
onsored, likethe forreport,
thissamea wide byrange
subject of is
– also commercial
sharpeningand
sponsored, like
mindspublic-
this report,
across theby
supply chain
is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global manufacturer
surveillance
sector markets.leader
As the IDIS,
installers
largestthevideo
and largest
security manufacturer
professionals scramble
surveillance installers
to strengthen
and security professionals scramble to strengthen
in South
ideo surveillance: Korea.
market In 2015, Video
their cybersurveillance:
manufacturer in South Korea, headquartereddefences. market their cyber defences.
provided a snapshot
trends of
and systems
expectations
just outside Seoul, and provided a snapshot of systems
Withoperating
this in mind, across
some50 of our findings onWith
pagethis6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinning
around the world, the factors underpinning
countries with 100+interesting
strategicreading.
partners, IDIS is a interesting reading.
d how control procurement
rooms useddecisions and how control rooms used
world-leading total solution provider with more
surveillanceCCTVReport systems.
2016: The video surveillance Report 2016:
and play, meanwhile,than needs
security
and
ations, the security
two million
over
focusedneeds 16.8
and plug
million
CONTENTS
recorders installed
and play,
cameras
on upgrade motivations, the securityutilising
worldwide
meanwhile,
IDISneeds
CONTENTS
shaped by the technology.systems as shaped by the physical
of physical
surveillance
osed to people, data and the threats1.
environment, Introduction
posed to people,........................................
data and 1. Introduction 2 ........................................ 2
The IDIS Total Solution meets the surveillance
ssionals thought
assets, about
whatplug-
security professionals thought about plug-
ch cutting-edge and
and-play analytical
featuressystems
they and needs
whichof businesses
cutting-edge large and they
features
small. By providing 2. benefit
the The riseofofeasyopen
to platforms ...................
install 2. The rise of 4 open platforms ................... 4
valued most highly.
and operate, end-to-end, highest-quality
ne subject in particular
Thissurveillance
time round
that we’dthere was one subject in particular
arein that
solutions,3.IDISCybersecurity
customers the we’d
age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been
Information
neglectful to ignore: cybersecurity. Information
ensured a low total cost
erent world altogether
security once
to the
convergence
of ownership..........................................
seemed a different world altogether to the
combined convergence 6 .......................................... 6
with
security professionals. the
realm inhabited flexibility and scalability to effectively
But anyby physical security professionals. But any
hasfuture-proof
wo disciplinesdemarcation
now been betweentheirthe
investments.
4. Cutting-edge technologies ..................
two disciplines has now been 4. Cutting-edge 9 technologies .................. 9
tegration withemphatically
other buildings
demolished. Integration with other buildings
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
network
inauguration 5.2017
cameras during the Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14

A trend report from IFSEC Global 4 Sponsored by IDIS


m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Sponsored by 28%
A trendSponsored
report fromby A trend report from
Do you use a single manufacturer or a mix?
Are your surveillance cameras analogue or IP? One single source manufacturer 30%
100% IP-based 28% A mix of manufacturers 70%
100% analogue 58%
14%
A mixture of analogue and IP 58%
cyber-attack too. Our 2016 video surveillance
INSTALLED BASE 14% Pie chart

Pie chart
report revealed that 56% of security professionals
without an HD analogue solution said they would
consider switching to one if it were cost-effective,
One single source manufacturer
100% IP-based
100% IP-basedCAMERAS
simple
A mix or leveraged existing coaxial cables.
of manufacturers
ARE YOUR SURVEILLANCE
100% analogue
ANALOGUE100%OR IP?analogue
A mixture of analogue and IP
A mixture of analogue and IP
Nevertheless, analogue systems probably don’t
have a long-term future, according to Lambert.
“Long-term support from manufacturers and
Do you use a single manufacturer or a mix?
replacementsOne 30%
for equipment that fails30%
in the
28% single source manufacturer
70%
A mix of manufacturers
28% analogue world is going to get more and more
rare,” he said.Pie“So
chart if you need your system to have
58% 70%
58%14% a long life, I can’t really see that analogue’s the
14% way to go.”
One single source manufacturer
A mix of manufacturers
One single DO YOU source
USE Amanufacturer
SINGLE
100% IP-based A mixcurrent of manufacturers
When was yourMANUFACTURER OR A MIX?
video surveillance system installed?
100% analogue In the last 2 years 47%
In the last 3-5 years 27%
When was your current video surveillance system installed?
A mixture of analogue and IP In the last 6-10 years 15%
9% In the last 2 years 47%
In the last 11-15 years
More than 15 years ago 2% In the last 3-5 years 27%
In the last 6-10 years 15% 30%
Pie chart In the last 11-15 years 9%
More than 15 years ago 2%
Proponents of IP surveillance systems cite In the last 2 years 30%In the last 3-5 years
28% In the last 6-10 years In the last 11-15 years
superior image quality, remote accessibility, More than 15 years ago Pie chart

enhanced video analytics, easier installation and 70%


2% In the last 2 years In the last 3-5 years
58% and better scalability, flexibility and
integration, 9% In the last 6-10 years In the last 11-15 years
70%
14% the reasons to abandon
cost-effectiveness among 15%
More than 15 years ago
47%
analogue systems. 2%
One single source manufacturer

ion 1. Introduction
9%
A mix of manufacturers
And yet, 22 years since the first network 27%

surveillance camera was launched by Axis 15%


Communications, 74% of end users who In the last 2 years
47%

port 2017 builds completed


The Video
on our survey
theSurveillance still the
Report
– and have
2017 atbuilds
spectreleast some
on
of more thepunitive fines WHEN
for In
– and
data WAS
the
In the
last
the YOUR CURRENT VIDEO SURVEILLANCE
3-5
breaches years
lastspectre
6-10 yearsof more punitive fines for data breaches
SYSTEMIn theINSTALLED? 30%law (the GDPR),
ports in 2015 analogue
success
and 2016 of twocameras,
on previous albeit
under only
reports thein 14%
2015 have
forthcomingandentirely
2016 onprotection
EU data under
law (the
the GDPR),
forthcoming
last 11-15 years
More than 15 years ago
EU data
27%
protection
onsored, likethe thissame
analoguereport,
subject
by – also
systems. issponsored,
sharpening
Indeed, Revenueslike
mindsthis report,
across
from theby
global supply chainis sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global manufacturer
network surveillance leader
camera sales IDIS,
installers
only the largest
and
overtooksecurity
those manufacturer
professionals
of scramble
installers
to strengthen
and security professionals scramble to strengthen
2%
inanalogue
ideo surveillance:SouthmarketKorea. In 2015, Video
their cyber surveillance:
cameras in 2014 (IHS Markit). defences. market their cyber
9% defences. 70%
provided a snapshot
trends and of systems
expectations provided a snapshot of systems In the last 2 years
15%
With this in mind, some of our findings onWith page this6 make
in mind, for47%
some of our findings
In the onyears
last 3-5 page 6 make for
“Analogue
, the factors installed
underpinning aroundcameras, certainly
the world, in theunderpinning
the factors UK, are still In the last 6-10 years
interesting reading. interesting reading.
d how control procurement
rooms
there byused
thedecisions
million,” and how control
UK-based CCTVrooms consultantused In the last 11-15 years
surveillanceCCTV Report systems.
2016: Thetold video surveillance Reportof 2016: More than 15 years ago
Simon
and play, meanwhile,
security
them are
ations, the security
focusedneeds
Lambert
needs
very and
old,plug
IFSEC
someand CONTENTS
Global. “Some
meanwhile,
play, are
of them
on upgrade motivations, the security needs
quite new
27%
CONTENTS 2%
– but there are nonetheless many people asking
shaped by the of physical
surveillance systems as shaped by the physical 9%
consultants for advice 1. onIntroduction
whether they........................................
should
osed to people,
environment,
data and the threats posed to people, data and Based1.on Introduction
how long 2ago ........................................
they upgraded their 2
ssionals thoughtkeep
assets, their
about analogue
whatplug- cameras, even
security professionals thought about install newplug- 15%
systems, our survey findings suggest that around
ch cutting-edge ones,
and-play orsystems
features whether
they and they
whichshould replace them.”
cutting-edge features they 47%
2. The rise of open platformsthree ...................
2.
in The rise of
four (74%) open
4end platforms
users upgrade their................... 4
valued most highly. systems at least every five years, with around half
Users can enjoy some advantages of IP without
a total
timerip-and-replace
ne subject in particular
This round
that we’d
there was one of their
subject in particular that we’d (47%) doing so every two years.
analogue
3. Cybersecurity in the age of 3. Cybersecurity in the27% age of
ore: cybersecurity.
have been
Information
infrastructure neglectful to ignore: cybersecurity.
by upgrading only certain Information
erent world altogether
security once
to the seemed
convergence ..........................................
We alsoconvergence
discovered ..........................................
6 that around 70% of 6
components. Somea enddifferent
users world
mightaltogether
even to the
security professionals.
realm
forego inhabited
But anyby physical
IP altogether, notsecurity professionals.
just because But any systems contain hardware from more than one
of financial
wo disciplinesdemarcation
has now been between the 4. twoCutting-edge
disciplines has now technologies
been manufacturer.
..................
4. Cutting-edge 9 technologies .................. 9
constraints but to protect themselves against
tegration withemphatically
other buildings demolished. Integration with other buildings
– including the
systems,
hijackinga spate
of of breaches – including the hijacking of
2017 presidential
network inauguration
cameras during the 5.2017
Warranties
presidential........................................
inauguration 5. Warranties 14 ........................................ 14

A trend report from IFSEC Global 5 Sponsored by IDIS


m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Sponsored by A trendSponsored
report fromby A trend report from

in data demands. In a different, related question,


UPGRADING & respondents (also including service providers this
time) were asked what improvements most frequently
INNOVATION prompted upgrades and two of the top three answers
ratchet up storage requirements sharply.

These two factors – higher resolution, lower latency


cameras and superior analytics – also help explain
why cameras came out on top, since some modern
cameras
Which of perform
these improvements analytics
would most likely onupgrade
motivate the next the to‘edge’.
your/your cu In fact,

newer cameras can ease storage demands too


Higher resolution, lower latency cameras 47%
More and better analytics 33%
Lower total cost of ownership 33%

by deploying more sophisticated compression


A more cyber-secure system
A simpler, more intuitive system
27%
26%

technologies, something discussed on pages


Failover protection 23%
More extensive third-party integration 21%
A more scalable system to support our growth 20%

7 and 8.
Better technical support 20%

Bar chart

It’s worth remembering that video surveillance has


50%
Which component of your system are you most likely to upgrade next?
Whole system 32%
now gone mobile and body-worn cameras typically
Cameras
Storage
28%
16%
used by38%emergency services and other public-facing
NVRs
Monitors
13%
7%
workers have different storage, retention and retrieval
PSU 4% needs compared
25% to fixed cameras.

WHICH COMPONENT OF YOUR SYSTEM ARE YOU WHICH 13%OF THESE IMPROVEMENTS WOULD MOST
Bar chart
MOST LIKELY TO UPGRADE NEXT? LIKELY MOTIVATE THE NEXT UPGRADE TO YOUR/
YOUR CUSTOMERS’
0% SURVEILLANCE SYSTEM?
40% (CHOOSE UP
Higher TOlatency
resolution, lower THREEcameras
MAXIMUM) Better technical support

Higher resolution, lower latency cameras


30%
More and better analytics
Lower total cost of ownership

ion 1. Introduction A more cyber-secure system


Whole system

20%
Monitors

A simpler, more intuitive system


Failover protection
Cameras

Storage

10% More extensive third-party integration


PSU
NVRs

port 2017 buildsThe onVideo theSurveillance Report– and the 2017 builds
spectre on thepunitive fines
of more for
A more– and
datathe
breaches
scalable spectre
system of more
to support ourpunitive
growth fines for data breaches
Better technical support
ports in 2015 success
and 2016 of two
on previousunder reports thein 2015 and 2016
forthcoming EU dataonprotectionunder
law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
0% 0% 13% 25% 38% 50%
onsored, likethe thissamereport,
subject
Whole by Cameras
system – alsoissponsored,
sharpening
Storage NVRslike
minds thisacross
Monitors report,
theby
PSU supply chain
is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global
Askmanufacturer
surveillance
the general publicleader IDIS, and
installers
about the
videolargest
security manufacturer
professionals scramble
surveillance That lower total cost of ownership should be thetothird
installers
to strengthen
and security professionals scramble strengthen
insystems
ideo surveillance: South
40% Korea.
and
market In 2015,
they’ll probably
Video
their cyber think first
surveillance:
defences. and market their cyber defences.
highest upgrade motive out of eight suggests that
foremost
provided a snapshot
trends of about
and systems the cameras
expectations providedvisible in publicof systems
a snapshot
With this inThesemind, devices,
some of our findings end users
onWith are
pagethis inmindful
6 make mind, of keeping
for some a tight rein
of our findings on on costs.
page 6 make for
spaces around
, the factors installed
underpinning and private buildings.
the world, the factors underpinning
which
30% interesting reading. interesting reading.
d how control roomsact
procurement asdecisions
used the system’sand eyes and ears,
how control roomsare aused One might have expected cybersecurity to poll a
surveillanceCCTV more
Report pressing
systems. consideration than
2016: The video surveillance Report 2016: other parts of
the
and play, meanwhile,
security
20% system
surveyneeds
ations, the security
focused
needs when
suggests.
on
anditplug
upgradeAsked
comes CONTENTS
andtoplay,
upgrading
which system
motivations,
meanwhile, too, our
component
the security needs
CONTENTS
higher percentage, given the growing number of
documented cases where network cameras have
been breached (especially when respondents were
shaped by the ofthey are mostsystems
physical
surveillance
10%
likely toasupgrade
shaped by next,
thecameras
physical
osed to people, were
environment,
datacited
andby the25% 1.posed
Introduction
of respondents.
threats to people,........................................
data and 1. Introduction
permitted to choose 2 up........................................
to three options). Specific 2
ssionals thought
assets, about security professionals thought about plug- findings on cybersecurity are discussed on pages 17
whatplug-
However, professionals involved in procurement
ch cutting-edge 0%
and-play
features systems
they and which 2. cutting-edge
The rise features
ofentire
open they and
platforms
18
...................
2. The rise of 4 open platforms ................... 4
are actually
Whole more
system
valued most highly.
likely to
Storage replace the
Monitors system
in one go (33% ticked this choice) than they are to Better technical support was near the foot of the
ne subject in particular
This time round
that we’d
there was one subject
switch cameras alone. 3. Cybersecurity in the age ofin particular that we’d table3. of Cybersecurity
reasons to upgrade – which makes sense
in the age of
ore: cybersecurity.
have been
Information
neglectful to ignore: cybersecurity. Information when you discover, on page 19, how satisfied
It’s perhaps
erent world altogether
security once
to the unsurprising
seemed
convergence
to see
a different camera
world
..........................................
storage
altogether to the
convergence 6 .......................................... 6
the vast majority of end users appear to be with
security professionals.
realm
(16%) inhabited
But highly
rank anyby physical security
here, given thatprofessionals.
HD and But any the standard of support they receive from their
wo disciplinesdemarcation
has now been between the
4K resolutions, full-frame-rate 4. Cutting-edge
two disciplines has
recording and nowtechnologies
been ..................
4. Cutting-edge
technology provider.9 technologies .................. 9
tegration withemphatically
other buildings
demolished. Integration
increasing retention times are driving rapid growth with other buildings
– including the
systems,
hijackinga spate
of of breaches – including the hijacking of
2017 presidential
network inauguration
cameras during the 5.2017Warranties
presidential ........................................
inauguration 5. Warranties 14 ........................................ 14

A trend report from IFSEC Global 6 Sponsored by IDIS


m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
8%
35% April May June
Bar chart
10%
July August September
30%
Sponsored by A trendSponsored
report fromby 11% A trend report from
23%
29% 7%
15% 8%
35%
2MP8%
CAMERAS STILL DOMINATE THE MARKET. “Camera resolution
Upgrade cameras
10%
is
WHEN DO YOU PLAN TO UPGRADE TO HIGHER
RESOLUTION
0% CAMERAS?
relative
Upgrade to the11%
storage system setting/
Already have higher resolution than 2MP
scope of camera coverage.
Not sure
29%
We have 2 MP in general
corridors, but 4-6MP in
Already have higher resolution than 2MP
24%
In the next 12 months

In the next 1-2 years congregated 41% areas or car


Upgrade cameras
Upgrade storage system
In the next 3-5 years park open areas.”
Not sure
More than five years from now
End user in healthcare sector
35%
2MP cameras are sufficient for our immediate and future needs

0% 15% 30% 24%

WOULD YOU RATHER UPGRADE TO CAMERAS 41%


WITH
Upgrade cameras
BETTER DATA COMPRESSION TECHNOLOGY OR
Upgrade storage system
SIMPLY UPGRADE YOUR STORAGE SYSTEM?
Surveillance cameras were once notorious for Not sure
35%
producing grainy footage that undermined its
effectiveness as court evidence – and therefore as
a deterrent. But in recent years resolutions have 24%
Upgrade cameras
improved immeasurably and end users tend to 41%
Upgrade storage system
expect 2MP resolutions as a bare minimum, with Not sure
cameras going as high as 7K (30MP). In last year’s
35%
report we discovered that just 11% of respondents
already had 4K (about 9MP) resolution cameras. 24%
Of those who didn’t yet enjoy 4K resolutions, 71% 41%
expected to eventually.
In the era of Big (and growing) Data, video
This time round we gauged the appetite for surveillance systems have been on the same,
ion 1. Introduction
upgrading beyond 2MP cameras. If our survey
35%
steep growth trajectory as other industries when
is any barometer, a significant proportion of the it comes to storage needs. A modest majority of
market (40%) already has. What’s more, 98% of respondents preferred to upgrade to cameras with
port 2017 buildsThe onVideotheSurveillance Report– and the 2017 builds
spectre on thepunitive fines
of more for
– and
datathe
breaches
spectre of more punitive fines for data breaches
the rest expressed an intention to do so within the better in-built data compression technology rather
ports in 2015 success
and 2016 of two
on previousunder reportsthein 2015 and 2016
forthcoming EU dataonprotectionunder
law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
next five years. than simply upgrading their storage system (41%
onsored, likethe thissame
report,
subject
by – alsoissponsored,
sharpening like thisacross
minds report,theby
supply chainis sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global manufacturer
surveillance leader IDIS,
installers the
and largest
securitymanufacturer
professionals versus
scramble 35%).
installers This
to strengthen
and makesprofessionals
security sense whenscramble
you consider
to strengthen
We can of course expect 2MP cameras to go thattheir
25%cyber
said defences.
that cameras were the system
in Southmarket
ideo surveillance: Korea. In 2015,their Videocybersurveillance:
defences. market
the way of 4CIF and 720P models as higher
provided a snapshot
trends and expectations provided a snapshot of systemscomponent they’d likely upgrade next. Moreover,
of systems
resolutions become more affordable.
With this in mind, someHowever,
of our findings onWith
higher pagethis
6 make
in mind,
resolutions forand
some of our
better findingswere
analytics on page
the6 make for
, the factors installed
underpinning around the world, the factors underpinning
it’s not just anticipation interesting
of fallingreading.
costs driving interesting reading.
d how control procurement
rooms useddecisions and how control rooms used two biggest upgrade motivations (as detailed on
surveillanceCCTV these
Report responses:
systems. more one in four intend
2016: The video surveillance Report 2016: to go p6). A 4K camera with on-board analytics and data
beyondneeds
and play, meanwhile,
security
higherneeds
ations, the security
focused
2MP within
resolutions
on
and plug
upgrade was
CONTENTS
theandnextplay,
12 months
the mostthe
motivations, important
and
meanwhile, CONTENTS
compression technology, therefore, effectively kills
motive three birds with one stone.
security needs
shaped by the offor
physical
surveillance
upgradingsystems as shaped
(as explained on bypagethe 6).
physical
osed to people, data and the threats1.
environment, Introduction
posed to people,........................................
data and 1. Introduction 2 ........................................ 2
ssionals thoughtOnlyabout
assets, 4%
what ofplug-
respondents
security see 2MPthought
professionals cameras about plug-
ch cutting-edge as features
sufficient
and-play for their
systems
they ‘immediate
and which and future
cutting-edge features they
2. The rise of open platforms ...................
2. The rise of 4 open platforms ................... 4
needs’.
valued mostWhy so few, given that 2MP might work
highly.
adequately for short-range, well-lit scenes and the
ne subject in particular
This time round
that we’dthere was one subject in particular that we’d
bandwidth and storage 3.burden
Cybersecurity in higher
imposedInformation
by the age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been
Information
neglectful to ignore: cybersecurity.
resolutions?
erent world altogether
security once
to the Improvements
seemed
convergence
a differentinworld
..........................................
dataaltogether
compression to the
convergence 6 .......................................... 6
standards
security professionals.
realm Butmight
inhabited providesecurity
anyby physical part ofprofessionals.
the answer. But any
wo disciplinesdemarcation
has now been between the 4. twoCutting-edge
disciplines has now technologies
been ..................
4. Cutting-edge 9 technologies .................. 9
tegration withemphatically
other buildings demolished. Integration with other buildings
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
network inauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14

A trend report from IFSEC Global 7 Sponsored by IDIS


m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Not sure

25% 23%

Sponsored by A trendSponsored
report fromby A trend report from
Which of these data compression options would you prefer?
15%
Answer Choices Responses
H.265
37% 23%
H.265 with dual codec to avoid hardware upgrades 37%
Switch to a manufacturer with its own bespoke compression technology 15%
Not sure 25%

H.265
WHICH
H.265 withOF
Pie chart THESE
dual codec toDATA COMPRESSION
avoid hardware upgrades OPTIONS need to upgrade processing power or display
WOULD YOU PREFER?
Switch to a manufacturer with its own bespoke compression technology hardware, because operators can view in H.264
Not sure
H.265 while benefiting from H.265 compression when
H.265 with dual codec to avoid hardware upgrades
Switch to a manufacturer with its own bespoke compression technology
Not sure
recording.

25% 23% “Overall IDIS Intelligent Code delivers up to


25% 23%
a 30% bit rate reduction on top of the 50%
reduction of H.265, achieving a total 65%
15% reduction for users. Then by leveraging motion
37%
15%
adaptive transmission (MAT) technology
37% – which reduces frame rate by restricting
transmission of frames without movement – we
H.265
H.265 with dual codec to avoid hardware upgrades
can deliver a further reduction. From an H.264
Switch to a manufacturer with its own bespoke compression technology baseline, IDIS Intelligent Codec plus MAT
Not sure delivers total savings of up to 90%, depending
on scene and resolution.
H.265 with dual codec was comfortably the
most popular choice of compression
23% standard “As a result, customers can upgrade to higher
25%
among end users, presumably because it avoids megapixel cameras worry-free. For instance, by
migrating from 2MP to 4K/8MP they will gain
immediate hardware upgrades. Dual codec four times the pixels with half the bit rate.”
can accommodate both H.265 and the long-
15% For viewing a wide Jamie Barnfield,
area, do you sales
think a single PTZ, director,
single IDIScameras
fisheye or multiple Europe are better…
established standard it is replacing,
37% H.264.
...Value?
PTZ
30%
Fisheye Multiple cameras
32% 38%
...For quickly scanning a large space? 31% 40% 29%
...For tracking a moving person or object? 60% 13% 27%
Also known as High Efficiency Video Coding ...For zooming in without losing resolution? 66% 11% 23%
(HEVC), H.265 can encode video files twice as ...For not missing or obscuring key details on the periphery? 16%
For viewing a wide area, do you think a single PTZ, single fisheye or multiple cameras are better…
18% 66%

efficiently, at a lower bitrate, than its predecessor. For viewing a wide area, do you think a single PTZ, single fisheye or multiple cameras are
...Value?
PTZ
PTZbetter… Fisheye Multiple cameras
30%
Fisheye Multiple cameras
32% 38%

Slashing bandwidth and storage consumptionFor viewing a wide area, do you Stackedby
...Value?
think a single
bar chart PTZ,
...For single
quickly fisheye
scanning or
a multiple
large space?cameras
PTZ or object?
...For tracking a moving person
...For quickly scanning a large space?
are better…
30%
Fisheye Multiple cameras
31%
32%
40%
31%
60%
38%
29%
40%
13%
29%
27%

about 50% it’s a vital step forward ...Value?


given
...For quickly scanning a largegrowing
...For tracking a moving person or object?
space?
30%
...For zooming in without losing resolution?
...For not missing or obscuring31%
...For zooming in without losing resolution?
32%
key details on40%
38%
60%
the periphery?29%
66%
13%
11%
66%
16%
27%
23%
11%
18%
23%
66%

storage demands. H.265 can more


...For zooming efficiently
...For tracking a moving person or object?
in without
...For not missing
losing resolution?
or obscuring FOR
key VIEWING
details on the
60%
periphery?
66%
A WIDE13%
11%
AREA, 27%
16%
23%
DO YOU
18% THINK 66% A SINGLE
Stacked PTZ,
bar chart SINGLE 16%FISHEYE 18% OR MULTIPLE CAMERAS ARE
encode larger frame sizes, ...For likenot4K resolution,
missing or obscuring key details on the periphery? 66%

ion 1. Introduction
Stacked bar chart BETTER…
PTZ Fisheye Multiple cameras
potentially up to a maximum ofbar8K.
Stacked chart Network

constraints notwithstanding, it should reduce 70% PTZ Fisheye Multiple cameras


latency and the incidence of frozen images. Smaller PTZ Fisheye Multiple cameras
port 2017 builds fileon
The sizes
Videothetranslates
Surveillance into longer
Report
– and the2017 recording
spectrebuilds ofPTZ ontime,
more thepunitive Fisheye fines for – anddataMultiple
the
breaches
spectre cameras of more punitive fines for data breaches
53% 70%
ports in 2015 which
success
and 2016 can
of twonegate
on or delay
previous reports
under the
thein need
2015for
forthcoming and extra EUcloud
2016 data on70%protectionunder law (the the GDPR),
forthcoming EU data protection law (the GDPR),
70%
onsored, likethe storage
thissame or
report, anbyadditional
subject or biggerlike
– alsoissponsored,
sharpening hard
minds this disk drive.
report,
across theby supply chain is sharpening
as vendors,minds across the supply chain as vendors,
53%
53%35%
IDIS, the largest
global manufacturer
surveillance leader IDIS, and
installers the largest
security
53%
manufacturer
professionals scramble installers
to strengthen
and security professionals scramble to strengthen
35%
inOne
ideo surveillance: South Korea. Inend
market
UK-based 2015, Video
their
user cyber
said surveillance:
the choice ofmarket35%
defences. their cyber defences.
provided a snapshot
trends of systems
and
compression expectations
technology provided
should be a snapshot
35%“dependent of systems18% 18%
With this in mind, some of our findings onWith pagethis 6 make
in mind, for some of our findings on page 6 make for
, the factors installed
underpinning around the world,
on the capabilities of the the factors VMS
head-end underpinningto play 18%
interesting reading. 18% interesting reading.
d how control procurement
rooms
back theused decisions
footage and how control
effectively.” rooms used 0% 0%
...For tracking a
moving person
or object?
...Value?

...For quickly
scanning a large
space?

...For zooming
in without losing
resolution?

...For not missing


or obscuring key
details on the
periphery?

surveillanceCCTV Report systems.


2016: The video surveillance Report 2016: 0% ...Value? ...For
...Value? zooming
...For zoomingin in without
without losing losing resolution?
resolution?

and play, meanwhile,


security needs and plug and play, meanwhile,
IDISneeds
ations, the security
focused insight
on upgrade motivations, the security needs
CONTENTS
0%
CONTENTS
...Value? ...For zooming in without losing resolution?
...Value? ...For zooming in without losing resolution?

shaped by the of physical


surveillance
“When IDISsystems expanded as shaped
its HD by the physical
osed to people,
environment,
data and the threats 1.posed
Introduction
to people,........................................
data and 1. Introduction 2 ........................................ 2
and 4K line up, we anticipated
ssionals thought
assets, about
what plug-
security
the storage and bandwidth professionals thought about plug- A large or wide area like a public square,
ch cutting-edge and-play
features
obstacles systems
they and which
to adopting cutting-edge
2.higher
The resolution
rise of open features they
platforms ...................
2. The rise
airport terminal or of 4 openstadium
football platforms was once ................... 4
cameras,
valued so we simultaneously developed IDIS
most highly.
Intelligent Codec as well as implementing dual typically surveyed by multiple cameras. However,
ne subject in particular
Thiscodec.
time round
that we’d
there was one subject in particular that we’d
Dual codec is3. an Cybersecurity
incredibly important in the agetwo of alternatives
3. Cybersecurity emergedin that
thecaptured
age of the full
ore: cybersecurity.
haveelement,
been
Information
neglectful to
because H.265ignore: cybersecurity.
decoding within Information
a pictureconvergencefrom a single, or at least fewer, cameras. In
erent world altogether
security
convergence .......................................... 6 .......................................... 6
VMSonce to the
takes seemed
around a different
twice the world altogethertoto the doing so they could reduce up-front investment
horsepower
realmview
security professionals. liveany
inhabited
But H.265 streams
by physical compared
security to H.264.
professionals. But any
and ongoing licensing and maintenance costs.
hasBy
wo disciplinesdemarcation utilising
now been dual codec
between the 4.
two customers
disciplines do
Cutting-edge technologies
has notnow been ..................
4. Cutting-edge 9innovationstechnologies .................. 9
Moreover, these two – PTZs and fisheye
tegration withemphatically
other buildings demolished. Integration with other buildings
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of cameras – promised to eliminate blind spots.
2017 presidential
networkinauguration 5.2017
cameras during the Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14

A trend report from IFSEC Global 8 Sponsored by IDIS


m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Sponsored by A trendSponsored
report fromby A trend report from

PTZs can pan, tilt and zoom (hence the acronym) ‘recommended’ status Benchmark Magazine
to provide wide-area coverage. They can’t capture also praised the IDIS 5MP Super Fisheye for
the full scene all at once, traditionally relying on having few moving parts, thereby reducing
staff in the control room to steer towards and maintenance costs. PSI Magazine rewarded
zoom in on areas of interest. One installer noted the 12MP model with a ‘9 out of 10’ and ‘PSI
that operators “can forget to reposition it back to Recommended’ status.
where it’s supposed to be watching and can lead
to theft in a facility”. However, operators can set
up pre-set positions. We asked survey respondents how PTZs and
fisheyes compare to each other, and to multiple
Fisheye cameras, meanwhile, harness an ultra- fixed cameras, on a range of performance
wide-angle lens to produce an extremely wide measures. Of the five we posed, PTZs came up
or panoramic/hemispherical image. The result trumps for two of the arguably most important:
is a convex, non-rectilinear image (how a fish zooming in on a scene without sacrificing too
would see a hemispherical view from beneath much resolution and tracking a moving person
the water) rather than straight lines of perspective or object – and by a wide margin in both cases.
(rectilinear). Fisheye lenses, which have been used They’re also competitive when it comes to value
in photography as far back as the early 1960s, are for money, respondents seem to believe, albeit
typically available in 180° or 360° to suit the view. there’s little difference between the tallies accrued
for all three options. One spain-based distributor
The flaws of both options have been mitigated over
argued that “the best value will be one camera
time through innovation. Increasingly powerful
with multi-sensors.”
analytics platforms, for instance, are becoming
more effective – especially with the assistance As for ‘quickly scanning a large space’, fisheye
of video analytics engines (see page 13-14) – at cameras have a modest edge over PTZs, which
automatically guiding PTZs to track moving objects claim second place, while multiple regular
and scanning for targets. Dewarping removes the cameras claim their only victory in ‘not missing
geometric distortions created by the fisheye lens. or obscuring key details on the periphery’ more
And the emergence of HD and ultra HD models effectively than the alternatives – but by a decent
ion 1. Introduction
of both camera types mean that image detail and
clarity can remain high even when operators zoom
margin.

in very closely on a point of interest. By overall aggregate, PTZs are the comfortable
winner.
port 2017 buildsThe onVideotheSurveillance Report– and the 2017 builds
spectre on thepunitive fines for
of more – and
datathebreaches
spectre of more punitive fines for data breaches
IDIS Super
ports in 2015 success
and 2016 of two
on previousunder reportsthein 2015 and
forthcoming 2016
Fisheye 12MPEU on
data These
protection underfindings
law (the
the are interesting
GDPR),
forthcoming EU data insofar as they
protection law (the GDPR),
onsored, likethe thissame
report,
subject
by – alsoissponsored,
sharpening like thisacross
minds report, supplyreflect
theby chain perceptions
is sharpening
as vendors,minds across
acrossthe
thesupply
supplychain and
chain as vendors,
IDIS, the largest
global manufacturer
surveillance leader IDIS, and
installers the largest
securitymanufacturer
professionals scramble
howinstallers
theseto strengthen
and security
might professionals
influence scramble to strengthen
CCTV specifications.
in Southmarket
ideo surveillance: Korea. In 2015,their Videocybersurveillance:
defences. market But their cyber defences.
we should be cautious in proclaiming these
provided a snapshot
trends and of systems
expectations provided a snapshot of systemsfindings a definitive, authoritative judgement
With this in mind, some of our findings onWith pagethis 6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinning around the world, the factors underpinning on these camera types. User experience can
interesting reading. interesting reading.
d how control procurement
rooms useddecisions and how control rooms used sometimes be coloured by substandard or ageing
surveillanceCCTV Report systems.
2016: The video surveillance Report 2016:
CONTENTS CONTENTS
technology, and by suboptimal system design and
and play, meanwhile,
security needs and plug and play, meanwhile, installation.
ations, the security
focusedneeds on upgrade motivations, the security needs
shaped by the of physical
surveillance
IDIS Super systems as shaped by the physical One consultant who completed the survey
osed to people,
environment,
data Fisheye in
and the
action threats 1. Introduction
posed to people, ........................................
data and wrote1.that Introduction
“without ........................................
2 more detail on size/shape/ 2
ssionals thought
assets,about
whatplug-security professionals thought about plug- distances, it’s all a guess.” An India-based
ch cutting-edge and-play
features systems
they and which 2. Thecutting-edge
rise of openfeatures they consultant,
platforms 2. Themeanwhile,
...................
rise of 4 open said the issue was “object-
platforms ................... 4
valued most highly. of-Interest/area-of-Interest specific. For instance,
IDIS insight specific ‘area zoom without losing resolution’ is
ne subject in particular
This time round
that we’dthere was one subject in particular that we’d
3. Cybersecurity in the age of
possible3. Cybersecurity
with motorisedin the age
varifocal of also.
camera
haveIDIS
ore: cybersecurity. been Super
Information Fisheye,
neglectful available
to ignore: in both 5MP
cybersecurity. and
Information
12MP
erent world altogether
security tomodels,
once theseemed can convergence
incorporate,
a different
..........................................
world alongside
altogether to the
For convergence
tracking a moving6 ..........................................
object, a fisheye will help 6
the 360° view, smaller elements, focusing if the area is smaller – in fact it’s better than PTZ
security professionals.
realm inhabited
But anyby physical security professionals. But any
as it wouldn’t need manual intervention. For ‘key
hason
wo disciplinesdemarcation
now entrance
been points,
between thecash
4. registers or
twoCutting-edge
disciplines hasother
nowtechnologies
been ..................
4. Cutting-edge 9 technologies .................. 9
tegration with areas
emphatically
other of interest.
buildings
demolished.In accordance
Integration with its buildings details’ even a PTZ will serve the purpose.”
withother
– including the
systems,
hijackinga spate
of of breaches – including the hijacking of
2017 presidential
network inauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14

A trend report from IFSEC Global 9 Sponsored by IDIS


m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Sponsored by A trendSponsored
report fromby A trend report from

On 25 May 2018 the GDPR, which strengthens


IDIS insight citizens’ rights over their personal data,
came into effect across the EU – although its
“Both 360° and PTZ cameras have repercussions are being felt beyond Europe. Data
their place and despite recent innovations
protection legislation elsewhere is already being
I don’t see that changing – at least in the
strengthened as non-EU countries seek to avoid
short to medium term. IDIS Super Fisheyes
being shut out of the world’s largest trading bloc.
continue to be incredibly popular with both
customers and industry peers, receiving This has significant implications for the video
several industry accolades over the last surveillance control room, since CCTV images
couple of years. in which people are identifiable constitute
personal data. In fact, data protection is especially
“The fisheyes are particularly powerful where
problematic for video surveillance operators
the recorded range is critical for after-the-
since they cannot realistically obtain consent for
fact investigations. For instance, in the retail
sector, fisheyes can be mounted at a central capturing personal data (although they can put
point relatively close to the area of interest. up notices). One way to placate regulators is to
Operators can zoom while retaining image deploy privacy masking. This can be achieved
detail and when unmanned, recorded by positioning cameras strategically in relation to
footage of the entire area is available for walls, embankments, trees and other barriers.
analysis. A PTZ will only record what it was But this is only effective up to a point – after all, the
last left looking at, while pre-set PTZ tours whole point of CCTV is to spot and deter criminal
often miss critical incidents. activity and identify offenders. Technological
“We predominantly see deployment of IDIS solutions have therefore emerged.
PTZs to support surveillance of large outdoor Software-driven privacy masking, which is
spaces such as in stadiums or for town and
performed in the camera (at the edge) or
city monitoring due to their powerful five or
later by the recording device, masks areas
ion 1. Introduction eight megapixel resolution, 31x zoom, IR
performance, auto tracking and WDR. The
(usually rectangles) with solid, uniform colour
or by blurring or pixelating the image. Masks
most recent IDIS models (DC-S3583HRX
can activate only when the camera zooms in
port 2017 builds The and Video
on theDC-S3883HRX)
Surveillance Report – andhave the scooped
2017 builds
spectre oftwo ofpunitive fines for
on the
more – and
datathe
breaches
sufficiently tospectre
make of more punitive fines for data breaches
people identifiable. Mask size
ports in 2015 success
and Germany’s
2016of two top design
on previous reports
under prizes,
thein the iFand
2015
forthcoming Design
2016 onprotectionunder
EU data law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
and shape must automatically adapt to changes in
onsored, likethe Award
thissame report, and
subject by the – alsoRedissponsored,
Dot ‘seal oflike
sharpening quality’
mindsthisacross
report,
theby
supply chain is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largestglobal
Do you, or your customers, have or need privacy masking?
manufacturer
surveillance leader IDIS, and
installers the largest
security manufacturer perspective
professionals scramble installers if subjects
to strengthen
and security or the camera
professionals move. to
scramble This
strengthen
Award, which
Yes - already have it is testament to IDIS
37% quality

in South
ideo surveillance:
Yes - we think we need it
Korea. Init 2015,
38%
becomes a more formidable technical challenge
andmarketperformance.”
No - neither have Video
nor need ittheir
Jamie cyber surveillance:
defences.
Barnfield,
12% market
sales their cyber defences.
provided a snapshot of systemswhere faces being masked fall well below the
Don't have it and not sure if we need it 13%
provided a snapshot
trends and
director, of systems
expectations
IDIS Europe
Pie chart With this in mind, some of our findings onWith
camera’spagethis
6 make
in mind,
horizon for some of our findings on page 6 make for
line.
, the factors installed
underpinning around the world, the factors underpinning
interesting reading. interesting reading.
d how control procurement
rooms useddecisions and how control rooms used
surveillanceCCTV Report systems.
2016: The Mindful of the growing importance of data
Yes -video
alreadysurveillance Report 2016:
and play, meanwhile,
ations, the security
DO YOU,
security needs and
NEED PRIVACY
focusedneeds
OR
on upgrade
CONTENTS
YOUR
Yes - we plug
No MASKING?
CUSTOMERS,
thinkand
have it
weplay, HAVE
need it
- neither have it nor need it
motivations, the security needs
OR
meanwhile, CONTENTS
protection, nearly half of those polled already use
privacy masking and a further 30% believe that
Don't have it and not sure if we need it
shaped by the of physical
surveillance systems as shaped by the physical they need it. With another 11% unsure either way,
osed to people, environment,data and the threats1. Introduction
posed to people,........................................
data and 1. Introduction
that leaves just 16% ........................................
2 who don’t think they need 2
13%masking?
ssionals thoughtassets, aboutwhat plug-
security
Do you, or your customers, have or need privacy
Yes - already have it
professionals37%
thought about plug- privacy masking.
ch cutting-edge and-play
thinkfeatures
we need itsystemsthey and12% which 37%
cutting-edge features they
Yes - we
No - neither have it nor need it 2. 12% The rise of open platforms ...................
38%
2. The rise of 4 open platforms ................... 4
valued
Don't have it and notmost
sure if wehighly.
need it 13% Given the high stakes within the EU – GDPR fines
Pie chart can be reach up to €20m or 4% of annual turnover
ne subject in particular
This time round that we’d there was38% one subject in particular that we’d
3. Cybersecurity in the age of 3. Cybersecurity
– it should be unsurprising in the
that age
theseoffigures
ore: cybersecurity.
have been Informationneglectful to ignore: cybersecurity. Information
erent world altogether
security once to the
convergence ..........................................
seemed a different world altogether to the
convergence
are higher still when 6 ..........................................
we filter down to EU-based 6
Yes - already have it
security professionals.
realmYes inhabited
- But
we thinkanybywe physical
need it security professionals. But any professionals (82% of EU-based respondents have
wo disciplinesdemarcation
has No now been between
- neither have it nor the 4.need
two Cutting-edge
disciplines
it has nowtechnologies
been or expect to need 9
..................
4. Cutting-edge privacy masking, versus
technologies 68%
.................. 9
tegration with Don't
emphatically
other buildings have demolished. Integration with other buildings outside of the EU).
it and not sure if we need it
– including thesystems,hijacking a spate of of breaches – including the hijacking of
2017 presidential
network inauguration
cameras 5. Warranties ........................................
13%during the 2017 presidential inauguration
5. Warranties 14 ........................................ 14
12% 37%
A trend report from IFSEC Global 10 Sponsored by IDIS
m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Pie chart Pie chart

Yes
Yes No Not sure
Sponsored by A trend Sponsored
report fromby A No
trend
– butreport
we mayfrom
do in the future
No – and we have no plans to do so
Do you use VGA/HDMI video recording for training purposes?
Not sure
Yes 31%
Do you use VGA/HDMI video encoders to provide audit trails and/or compliance?
No – but we may do in the future 29%
Yes 41%
No – and we have no plans to do so 21%
No 46%
13% Not sure 19% 19%

VGA/HDMI VIDEO ENCODERS


Not sure 13% 31%
41% Pie chart
Pie chart Do you find VGA/HDMI monitoring and recording screens from other application
21%
Yes - very useful 75%
46% It’s good to have, but we’re yet to see any tangible benefit 25%
Yes
We’ve seen no benefit and 29%are disappointed 0%

Yes No Not sure No – but we may do in the future


No – and we have no plans to do so
Pie VGA/HDMI
chart
DO YOU USE VGA/HDMI VIDEO ENCODERS TO DO YOU USE
Not sure VIDEO RECORDING FOR
Yes
PROVIDE AUDIT TRAILS No
Yes AND/ORNot
COMPLIANCE?
sure TRAINING PURPOSES?
No – but we may do in the future
No – and we have no plans to do so
Not sure
19%
13% 31%
Yes - very useful
13% It’s good to19%
have, but we’re yet to see any tangible ben
41% 31%
We’ve seen
21% no benefit and are disappointed
41%
21%
46% 29%
46%
29%
25%
Yes
Do you find VGA/HDMI monitoring and recording screens from other applications useful?
Yes No Not sure Yes - very useful
No – but we may do in the future
75%
No – and we have no plans to
It’s good to have, but we’re yet to see any tangible benefit 25%do so
We’ve seen no benefit and are disappointed
Not sure
Do you use VGA/HDMI encoders as a video stream within your VMS to integrate and monitor security or other applications (eg PoS)?
75% 0%

Yes 31%
No – but we intend to do so 40%
No – and have no plans to do so 29% Pie chart

19%
DO YOU USE VGA/HDMI
Pie chart
13% ENCODERS AS A VIDEO 31%
DO YOU FIND VGA/HDMIYes - veryMONITORING
useful AND
STREAM WITHIN YOUR VMS TO INTEGRATE AND
RECORDING SCREENS FROM OTHER
MONITOR SECURITY OR OTHER 41%APPLICATIONS Yes - very useful It’s good to have, but we’re yet to see any tan
(EG POS)? Yes It’s goodAPPLICATIONS USEFUL?
21%
to have, but we’re yet to see
We’ve any tangible
seen benefit
no benefit and are disappointed
No – but we intend to do so We’ve seen no benefit and are disappointed
No – and have no plans to do so
46% 29%

25%security or other applications (eg PoS)?


Do you use VGA/HDMI encoders as a video stream within your VMS to integrate and monitor
29% 25%
ion 1. Introduction
Yes 31% 31%
No – but we intend to do so 40%
No – and have no plans to do so 29%
<1%
75%
Pie chart 75%
40%
port 2017 builds
The onVideo Surveillance
theService Report
providers: Do you–install,
2017
andrecommend
the builds
spectre onencoders?
of more
or sell VGA/HDMI
thepunitive fines for
– and
datathe breaches
spectre of more punitive fines for data breaches
ports in 2015 success
and 2016ofYestwoon previous
- regularly
Yes - sometimes
26%
29%
reports
under the in 2015
forthcoming and 2016
EU dataonprotection under
law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
onsored, likethethissame
report,
subject by April
Yes - but rarely
No - never Yes
– also19%issponsored,
26%
sharpening
May Junelike
minds thisacross
report,thebysupply chain
is sharpening
Yes - as vendors,
very usefulminds across the supply chain as vendors,
IDIS, the largest
global manufacturer
surveillance No – but
July leaderwe intend
IDIS, and
installers
August toSeptember
the do so manufacturer
largest
security It’s
professionals scramble good
installers toand
have,
to strengthen but we’re
security yet to see any
professionals tangible
scramble tobenefit
strengthen
Pie chart
No – and have no plans to do so We’ve seen no benefit and are disappointed
in Southmarket
ideo surveillance: Korea. In 2015,their Video cybersurveillance:
defences. market their cyber defences.
provided a snapshot
trends and of systems
expectations7% provided a snapshot of systems
With this in mind, some of our findings onWith pagethis 6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinning
around
SERVICE PROVIDERS: the world,
8%
Yes DO the
YOU factors
- regularly INSTALL, underpinning
interesting reading. interesting reading.
d how control procurement
rooms useddecisions
RECOMMEND OR29%SELL
10% Yes and how35%
VGA/HDMI
- sometimes control
31% rooms used
ENCODERS? 25%
surveillanceCCTVReport systems.
2016: The video Yes - but rarely
surveillance Report 2016:
security needs and 11%
and play, meanwhile,
ations, the security
focusedneedson upgrade motivations,
No - never
CONTENTS
plug and play, meanwhile,
the security needs 75%
CONTENTS
29%
19%
shaped by the of physical
surveillance systems as shaped 26%by the physical
osed to people,
environment,
data Yes
and the
- regularly
Yes - sometimes
threats 26%1. Introduction
posed to people,........................................
Service providers: Do you install, recommend or sell VGA/HDMI encoders?
40%
data and 1. Introduction 2 ........................................ 2
29%

ssionals thought
assets,about
what plug-
security
Yes - but rarely
professionals
26%
thought about plug-
No - never 26%19%
ch cutting-edgeand-play
features
systems they and which
Pie chart 2. The cutting-edge
29% rise of open features they
platforms ...................
2. The rise of 4 open platforms ................... 4
April May June
valued most highly. July August September
ne subject in particular
This time round
that we’d
there was one subject in particular that we’d
3.- regularly
Cybersecurity in the age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been
Information
neglectful to Yes
ignore: cybersecurity. Information
erent world altogether
security once
to the
seemed a Yes
convergence
Yes
7%- sometimes
different
..........................................
world altogether to the
convergence 6 .......................................... 6
- but rarely
security professionals.
realm inhabited 8%
But anyby physical
No - security
never professionals. But any
35%
wo disciplinesdemarcation
has now been between
10% the 4.
twoCutting-edge technologies
disciplines has now been ..................
4. Cutting-edge 9 technologies .................. 9
tegration withemphatically
other buildings
demolished. 19%Integration with other buildings
11% 26%
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
networkinauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14
29%
26%
A trend report from IFSEC Global29% 11 Sponsored by IDIS
m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Sponsored by A trendSponsored
report fromby A trend report from

VGA/HDMI encoders allow operators to view


and control multiple applications that have a VGA
or HDMI output from a single monitor, such as
cameras and recorders to access control, building
management, intruder, fire and point of sale (POS)
systems. The result is an integrated application
that is displayed and recorded as if it were a
camera within the surveillance system.

VGA/HDMI video encoders are widely used for


a variety of purposes, with 44% using them to
provide audit trails and/or for compliance, 33%
for training purposes and 33% as a video stream
within their VMS to integrate and monitor security
or other applications. Of those that do have VGA/
HDMI monitoring and recording screens from
other applications, four in five (80%) believe them
to be ‘very useful’.
Installers, consultants and distributors have
recognised the depth of demand for VGA/HDMI
encoders, with 58% installing, recommending or
selling VGA/HDMI encoders and 31% professing
to do so ‘regularly’.

IDIS insight

ion 1.“Many
Introduction
in the industry are yet
to realise the benefits of using
encoders within surveillance systems.
The End
port 2017 builds Video
on users
the are still paying
Surveillance Report
– and the forspectre
2017 expensive
builds on thepunitive fines for
of more – and
datathe
breaches
spectre of more punitive fines for data breaches
ports in 2015 success
and 2016
of two
on previous reports
under the
and bespoke integration to control andin 2015
forthcomingand 2016
EU on
data protectionunder
law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
onsored, likethethissame
report,
monitor subject
by – alsoapplications
multiple issponsored,
sharpeningfrom like this
minds report,
a across theby
supply chain
is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global manufacturer
surveillance leader IDIS,
installers the
and
single user interface. The IDIS VGA/HDMI largest
security manufacturer
professionals scramble
installers
to strengthen
and security professionals scramble to strengthen
in Southmarket
ideo surveillance: Korea. In 2015,their Video
cybersurveillance:
defences. market their cyber defences.
Video Encoder is not only delivering cost
provided a snapshot
trends and of systems
expectations provided a snapshot of systems
savings; it’s reducing Withrisk
thisthrough
in mind, greater
some of our findings onWith pagethis6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinning
around the world, the factors underpinning
situational awareness interesting
and reading.
control and by interesting reading.
d how control procurement
rooms useddecisions and how control rooms used
surveillanceCCTV closing
Report security
systems.
2016: gaps surveillance
The video caused by the need2016:
Report
and play, meanwhile,to switch
wellneeds
ations, the security
focused
between
as providing
on
CONTENTS
disparate
security needs and plug and play, meanwhile,
an audit trail
upgrade motivations,
systems
thetosecurity
as
ensure needs
CONTENTS
shaped by the standard operating
of physical
surveillance systems asprocedures
shaped by the andphysical
validate
osed to people, compliance.” James Min, managing........................................
environment,
data and the threats 1. Introduction
posed to people, data and 1. Introduction 2 ........................................ 2
ssionals thought
assets,about
what plug-
security
director, IDIS Europeprofessionals thought about plug-
ch cutting-edgeand-play
features
systems
they and which cutting-edge
2. The rise of open features they
platforms ...................
2. The rise of 4 open platforms ................... 4
valued most highly.
ne subject in particular
This time round
that we’d
there was one subject in particular that we’d
3. Cybersecurity in the age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been
Information
neglectful to ignore: cybersecurity. Information
erent world altogether
security once
to the
convergence ..........................................
seemed a different world altogether to the
convergence 6 .......................................... 6
security professionals.
realm inhabited
But anyby physical security professionals. But any
wo disciplinesdemarcation
has now been between the 4.twoCutting-edge
disciplines has nowtechnologies
been ..................
4. Cutting-edge 9 technologies .................. 9
tegration withemphatically
other buildings
demolished. Integration with other buildings
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
networkinauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14

A trend report from IFSEC Global 12 Sponsored by IDIS


m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Yes 16%
No – but we intend to 52%
No – and we have no plans to do so 32%

Pie chart
Sponsored by A trendSponsored
report fromby A trend report from

Yes
No – but we intend to
standard systems tend to look at pixel values for
DEEP LEARNING-
No – and we have no plans to do so
Do you currently use deep-learning video analytics (VA)?
Yes
No – but we intend to
16%
52%
input data, deep learning systems can also harness
edges, vector shapes and a plethora of other visual
POWERED VIDEO
No – and we have no plans to do so 32%
16%
32% elements to ‘recognise’ objects.
Pie chart

ANALYTICS 52%
The replacement of CPUs with GPUs (graphics
processing units), which can manage thousands
Yes of data processes simultaneously, was a game-
No – but we intend to
changer. The GPU can not only process images but
DO YOU No – and we have
CURRENTLY no plans to do so
USE DEEP-LEARNING VIDEO
ANALYTICSYes
(VA)? undertake transcoding, pattern matching, image
No – but we intend to analysis and recognition, signal processing and
No – and we have no plans to do so
16% more besides.
32%
16% Deep learning algorithms can handle larger datasets,
32% including unlabelled data, in less time, all while
reducing the burden on data centre infrastructure.
52% They are accelerating, and being enabled by,
52% migration to open and integrated platforms.

The upshot, in theory, is systems that perform tasks


Yes more effectively and learn about their environment
No – but we intend to
No – and we have no plans to do so overthat
Do you believe time. For instance,
deep-learning VA offers the deployed in an airport
following improvements over traditional VA?

a deep
Better at spotting learning VA system might learn how
false alarms 41% to

Video analytics (VA) has eased the burden distinguish


Reduces manpower costs
passengers
Better for high security environments
monitoring departure
36%
36%

on control rooms by partly 16% automating the screens from genuinely


Improves accuracy of facial recognition
suspicious
Can be more trusted to trigger actions without approval of human operato
loitering.
30%
26%

monitoring and analysis 32% of CCTV footage. In fact,Flags anomalies/trends sooner or more accurately 25%
Makes the previously impossible possible 21%
VA applications have made possible a breadth and DON'T KNOW
DO YOU BELIEVE THAT DEEP-LEARNING VA 27%
NONE OF THE ABOVE 3%
depth of analysis that was hitherto impossible. OFFERS THE FOLLOWING IMPROVEMENTS OVER

ion 1. Introduction
They even provide operational benefits beyond Bar chart TRADITIONAL VA?
asset and people protection 52%– with many, such
as dwell time, queue-management and heat 50%
port 2017 builds mapping,
The Video
on of particular
theSurveillance benefit
Report
– and 2017
the tobuilds
the of
spectre retail
on the
more sector.
punitive fines for – and
datathe breaches
spectre of more punitive fines for data breaches
ports in 2015 success
and 2016 of twoon previousunder
reportsthein 2015 and 2016
forthcoming EU dataonprotection 38% under
law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
onsored, likethe But if
thissame VA
report, performs
subject tasks that
by – alsoissponsored, are
sharpening likesimply beyond
thisacross
minds report,thebysupply chain is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largesthuman
global operators,leader
manufacturer
surveillance then the
IDIS,
installerslatest paradigm
the largest
and security shift – scramble
manufacturer
professionals installers
to strengthen
and security professionals scramble to strengthen
in‘deep
ideo surveillance:Southmarketlearning’
Korea. In –2015,
is giving
Video
their them
cyber greater capacities
surveillance:
defences. market 25%their cyber defences.
still byand
provided a snapshot
trends mimicking
of systems human
expectations intelligence.
provided Such of systems
a snapshot
systems are becoming With
morethis effective
in mind, someat of our findings onWith
filtering pagethis 6 make
in mind, for some of our findings on page 6 make for
, the factors installed
underpinning around the world, the factors underpinning 13%
and processing interesting
data –and nothow reading.
just control
throughrooms
periodic interesting reading.
d how control procurement
rooms useddecisions used
surveillanceCCTV software
Report systems.updates but through self-learning.
2016: The video surveillance Report 2016: A
majorityneeds
and play, meanwhile,
security
powered
of end
on by
users
and plug(…%)
deep learning
and either CONTENTS
algorithms
already use VA
play, meanwhile,
or atneeds
leastBetter
0%
at CONTENTS
spotting false alarms DON'T KNOW
Better at spotting false alarms

Reduces manpower costs

Better for high security environments

Improves accuracy of facial recognition


Can be more trusted to trigger actions
without approval of human operator (eg:
automatically barring someone from a sports
stadium based on facial recognition)
Flags anomalies/trends sooner
or more accurately

Makes the previously impossible possible

DON’T KNOW

NONE OF THE ABOVE

ations, the security


focused needs upgrade motivations, the security
shaped by the ofintend
physical to at some
surveillance systemspoint.
as shaped by the physical
osed to people, data and the threats1.
environment, Introduction
posed to people,........................................
data and 1. Introduction 2 ........................................ 2
But how does deep learning work exactly?
ssionals thought
assets, about
whatplug-security professionals thought about plug-
Well it takes its name from the tightly packed
ch cutting-edge and-play
features systems
they and whichThe cutting-edge features they
layers of thousands or 2. rise ofofopen
even millions densely platforms ...................
2. The rise of 4 open platforms ................... 4
valued most highly.
interconnected processing nodes, known as
neural
timenetworks, therewhich
ne subject in particular
This round
that we’d
3.are
was one roughly
subject modelled
in particular
Cybersecurity in that
theonwe’d
age of 3. Cybersecurity in the age of
the been
ore: cybersecurity.
have human
Information brain. to ignore: cybersecurity. Information
neglectful
erent world altogether
security once to the
convergence ..........................................
seemed a different world altogether to the
convergence 6 .......................................... 6
Deep
security professionals. learning
realm inhabited systems can continuously calibrate
But anyby physical security professionals. But any
weighting assignedthetotwo
various inputshasin now
order
wo disciplinesdemarcation
has now been between 4. Cutting-edge
disciplines technologies
been ..................
4. Cutting-edge 9 technologies .................. 9
tegration with to better
emphatically
other buildings understand their environment. While
demolished. Integration with other buildings
– including the
systems,
hijacking a spate
of of breaches – including the hijacking of
2017 presidential
network inauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14

A trend report from IFSEC Global 13 Sponsored by IDIS


m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Sponsored by A trendSponsored
report fromby A trend report from

Discount respondents who admitted to assume that systems are ‘intelligent’ enough to
ignorance of the technology’s pros or cons (24%) configure themselves, but behaviours must still
– understandable given its relative novelty and be defined by the manufacturer or integrator.
complexity – and we see that deep learning VA is And with humans still involved, mistakes and
widely believed to offer a plethora of compelling misjudgements are always possible. Multiple site
benefits. Each of six operational benefits we put visits might be necessary to optimise configuration
to them were endorsed by at least one in three of of detection zones, masks, camera angles or
those who did express an opinion. Even the more perspective settings.
generic statement ‘makes the previously impossible
Benchmark magazine recounted a conversation
possible’ – a bold claim – was recognised as true by
with a leading manufacturer, who told them
one in five (21%) respondents.
that one customer had been unhappy with their
The top two most frequently cited benefits – investment in around 1,000 channels of video
‘reducing manpower costs’ and being ‘better analytics. Keen to uncover the problem, the
at spotting false alarms’ – can both reduce costs manufacturer visited the site and discovered that
– and nothing makes a boardroom pitch for only about 150 channels had been implemented
investment more convincing than demonstrating – just 15% of their investment. The problem, it
operational efficiencies. The costs of false alarms transpired, was labour costs.
can be particularly eye-watering in, say, an airport,
That all said, with deep learning VA can be
with shutdowns caused by unattended bags or
deployed with much less incident-specific
suspicious persons running into tens of thousands configuration than its predecessors and is
of pounds per minute. arguably simpler and quicker overall to get up and
No surprise then to see that almost as many running.
respondents (36%) agreed that deep learning VA Today’s facial recognition algorithms, which
was suitable for high security environments. An are already 100 times more accurate than they
ability to quickly categorise and interpret large were in 1995 (National Institute of Standards
ion 1. Introduction
volumes of data is invaluable when monitoring
particularly ‘busy’ scenes classified as a high
and Technology), are now being supercharged
by neural networks. Some 30% of those polled
security risk. Human operators are limited in how agreed that deep learning enhances the accuracy
port 2017 builds comprehensively
The Video
on theSurveillance theyReport
– can
and thegrasp
2017 what’s
builds
spectre happening
on
of more thepunitive fines for
– and
of facialdata the
breaches
spectre ofBiometrics
recognition. more punitive fines for data
specialist Herta breaches
ports in 2015 inand
crowded
success 2016
of twoonpublic
previous squares,
reports
under sports
the in stadiums,
2015
forthcoming EUtrain
and 2016 onprotection
data Security – a technology partner of this report’s GDPR),
under
law (the
the GDPR),
forthcoming EU data protection law (the
onsored, likethe stations,
thissamereport,airports
by – and
subject alsoisthe like – andlike
sponsored,
sharpening in this
mindsdeciding
report,
across theby
supplysponsor,
chain
is sharpening
as vendors,
IDIS – usesminds across
deep the supply
learning chain
in its as vendors,
intelligent
IDIS, the largest
global
what manufacturer
surveillance
activity warrantsleader IDIS,inspection.
installers
closer the largest
and securitymanufacturer
professionals scramble installers
to strengthen
and security professionals
video analytics, which includes facial recognition.scramble to strengthen
in Southmarket
ideo surveillance: Korea. In 2015,their Videocybersurveillance:
defences. market their cyber defences.
Such innovation has huge potential for identifying
provided a snapshot
trends
Great ofexpectations
and systems
expectations provided a snapshot of systems
With this in mind, some of our findings serial
onWithshoplifters
pagethis6 make who
in mind, account
for some of ourfor moston
findings theft
pagein 6the
make for
, the factors installed
underpinning around the world, the factors underpinning
interesting reading. retailinteresting
sector. reading.
Increasingly able to identify people
d how control procurement
rooms
The terms used decisions
‘smart’ andand how control
‘intelligent’ haverooms
longusedbeen
surveillanceCCTV Report systems.
2016: The video in surveillance Report 2016: from awkward angles and as they move through a
bandied about liberally the security industry.
and play, meanwhile,
security
However,
ations, the security
focused
needs
needs
bothand
onwith
upgrade
vendorsCONTENTS
plug and andplay,
motivations,
meanwhile,
end users have
the security
CONTENTS
site, it can also potentially bar blacklisted people
entry from a particular area.
done so no single, commonly agreed needs
and
shaped by the of physical
surveillance systems as shaped by the physical
understood definition1. of Introduction
what these terms actually This is1.one way in which deep learning systems
osed to people,
environment,
data and the threats posed to people,........................................
data and Introduction 2 ........................................ 2
mean. But deep learning is more closely aligning can take decisions without authorisation of human
ssionals thought
assets, about
whatplug-
security professionals thought about plug-
ch cutting-edge those
and-play words
features systems
theyto their
and whichmeaning when applied
cutting-edge featuresto they personnel. It’s interesting to note that so many of
people. 2. The rise of open platforms ...................
2. The rise of 4 open platforms ................... 4
those polled – 28% – believe deep learning VA
valued most highly.
‘can be more trusted to trigger actions without the
Nevertheless,
ne subject in particular
This time round
that we’d expectations
there was one subject of a technology
in particular that we’d
3. Cybersecurity in the age of approval3. Cybersecurity
of a human operator’ in the age of note that
(although
alsobeen
ore: cybersecurity.
have described
Information more
neglectful hyperbolically
to ignore: as ‘artificial
cybersecurity. Information
erent world altogether
security once
to theseemed
convergence ..........................................
convergence
the statement ..........................................
said6‘more’ trusted than traditional 6
intelligence’ or ‘AI’acan different world altogether
be unrealistic. The to the
security professionals.
realm inhabited
But any systems – a rather different emphasis than saying
technology isby physical
still security and
in its infancy professionals.
we’re a longBut any
they ‘should’ be trusted.)
way from AI computer4.
wo disciplinesdemarcation
has now beenbetween the two Cutting-edge technologies
disciplines
HAL 9000 depicted has now inbeen ..................
4. Cutting-edge 9 technologies .................. 9
tegration withemphatically
other buildings demolished. Integration with other buildings
the film 2001: A Space Odyssey. Users might
– including the
systems,
hijackinga spate
of of breaches – including the hijacking of
2017 presidential
network inauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14

A trend report from IFSEC Global 14 Sponsored by IDIS


m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
25%
25%
66%
Sponsored
April by May
66%
June A trendSponsored
report fromby A trend report from
July August September
66%

The internet of things and video analytics, which


SYSTEM FAULTS
7% April May June
April 8% May June
July August Septemberenables operators to extract commercial and
May June July10% August 35% September

AND CRITICAL
August September operational value as well as security intelligence
11% from visual data, makes critical failover

FAILOVER 8%
7% functionality more necessary.
7%
7% 8% 29% 35%
8% 35%
10% Essentially, CCTV systems are becoming more
10%
0%
35% useful and effective to businesses and law
11%
HOW SERIOUSLY WOULD YOU REGARD THE LOSS enforcement. As the risks and costs of downtime
11%
CHART:OF FOOTAGE,
Q12 DUE TO A SYSTEM FAILURE,
1% Very
HOWEVER
seriously 29% rise in tandem, manufacturers are developing back-
ModeratelyRARELY seriously AND BRIEFLY IT OCCURS?
It’s a minor problem
29%
– chances offault? up contingencies
missing something important are miniscule that keep systems operational
How often29% is there a break/gap in footage captured (however brief) due to a system
NeverHow
- Notoften
awareisofthere
it everahappening
break/gap in footage captured (however brief) due
Never - Not aware of it ever happening
1-2 times a year 23%
23%to a system fault?
42%
when there are system faults.
1-2 times
3-5 times a yeara year 21%42%
3-5 times a year 9% 3%21%
6-10 times
More 6-10
a year
than times a year
10 times a year Very seriously 11% 3% Some sectors have a particularly pressing need for
More than 10 times a year 11%

25%
Very seriously Moderately seriously back-up systems. For instance, in football stadia
ously Moderately seriously It’s a minor problem – chances of missing something important are miniscule
Bar chart
ely seriously
Bar chart
incidents
It’s a minor problem – chances of missing something important are occur with comparative regularity. In a terror-
miniscule
66%
or problem – chances of missing something important are miniscule stalked world, high availability matters in crowded
50%
9%
50% 9% places like public squares and train stations too, as
25% well as other critical national infrastructure (CNI).
38% 25%
38%
Only a minority of respondents would not take
66% In an interconnected world, security experts
a break in footage
66% caused by a system fault at
66%
25%25% increasingly talk of ‘resilience’: minimising
least ‘somewhat seriously’ (…%), with the most
economic disruption from cyber-attacks, terror
common
13% response being ‘very seriously’ (…%).
13% attacks and natural disasters. Failover systems
reflect a recognition among manufacturers that
0%0%
Never - Not
Never aware
- Not of it
aware ofever happening
it ever happening
they must build resilience into products if they’re
HOW OFTEN IS THERE A BREAK/GAP IN FOOTAGE toWhich
winhardware
contracts
tends toin government,
fail/malfunction transport,
most often in your opinion?
CAPTURED (HOWEVER BRIEF) DUE TO A SYSTEM Cameras 20%
FAULT? banking,
Storage healthcare, utilities
19% and other high-
security
NVR/DVR
environments. 16% 16%

ion 1. Introduction
Software
PoE or other connecting cable 14%
PSU 7%
11%
11% DON'T KNOW 8%
3%3% 23%
23% WHICH HARDWARE TENDS TO FAIL/MALFUNCTION
Never
Never- Not aware
- Not awareofof
it ever happening
it ever happening
1-21-2
times a year
MOST
Bar chart OFTEN IN YOUR OPINION?
times a year
port 2017 builds
The
21% 21%Video
on theSurveillance Report
–3-5
andtimes
3-5 2017
the
times a year builds
spectre
a year of on
more the
punitive fines for– and
data the
breaches
spectre of more punitive fines for data breaches
ports in 2015success
and 2016of two
on previousunder
reports
6-10
6-10
More
the
times
times
than
in
a a2015
year and 2016
forthcoming
year EU on
data protection
20% under
law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
More than 1010 times
times a year
a year
onsored, likethe
thissame
report,
subject
by – alsoissponsored,
42%
42% sharpening like mindsthisacross
report,
theby
supply chainis sharpening
as vendors,minds across the supply chain as vendors, DON’T KNOW
IDIS, the largest
global manufacturer
surveillance leader IDIS, and
installers the largest
securitymanufacturer
professionals scramble
installers
to strengthen
and security professionals scramble to strengthen
in Southmarket
ideo surveillance: Korea. In 2015,their Videocybersurveillance:
defences. market 15%their cyber defences.
CONNECTING CABLE

provided a snapshot
trends of systems
and
For smaller expectations
businesses withoutprovidedcontrola snapshot
rooms,of systems
With this in mind, some of our findings onWith pagethis
6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinning around the world, the factors underpinning
POE OR OTHER

CCTV cameras traditionally interestingact reading.


first as a deterrent 10%
interesting reading.
d how control procurement
rooms
and useddecisions
second, to furnishand how control
evidence for therooms used
NVR/DVR

Software

surveillanceCCTV Report systems.


2016: The thousands
video surveillance
of hoursReport 2016:
Cameras

courtroom. From
CONTENTSof footage
CONTENTS
Storage

5%
and play, meanwhile,
security needs and plug and play,
captured throughout the year, security personnel meanwhile,
PSU

ations, the security


focused
might needson upgrade
extract motivations,
and examine onlythe security
a few needs
minutes
shaped by the ofofphysical
surveillance systems as shaped by the physical 0%
material – perhaps even none at all. Therefore
osed to people, data and the threats1.
environment, Introduction
posed to people,........................................
data and 1. Introduction
Cameras 2 ........................................
Software DON'T KNOW 2
the chances of an incident being missed during Contingencies are needed for a range of faults since
ssionals thought
assets, about
whatplug-
security professionals thought about plug-
downtime – which happens at least once or twice according to our survey, cameras, storage NVRs/
ch cutting-edge and-play
featuressystems
they and which 2. Thecutting-edge features they
a year for 73% of our end usersrise
andofmoreopen platforms
than 10 ...................
DVRs, 2.software
The rise andof open
4PoE platforms
or other ...................
cables are all prone 4
valued most highly.
times a year for 11% – is probably slim. to failure with comparative frequency (with a range
ne subject in particular
This time round
that we’d
there was one subject in particular that we’d between them of only 14-20% in the table below).
Nevertheless, 3. Cybersecurity
if antoincident is missed because in the age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been
Information
neglectful ignore: cybersecurity. Information Chosen as the most common source of failure by
of a system
erent world altogether
security once
to the fault then
seemed
convergence
the consequences
a different
..........................................
world altogether cantobethe
convergence 6 .......................................... 6
only 7%, only PSUs stand out as more reliable.
grave.
security professionals.
realm And
inhabited
But anythe
byindustry is taking
physical security downtime But
professionals. more any
seriously
wo disciplinesdemarcation
has now been now it hasthe
between powerful
two tools
disciplines to exploit
has now the
4. Cutting-edge technologies ..................
been 4. Cutting-edge 9 technologies .................. 9
tegration with rich
otherpotential
emphatically
buildings of the footage
demolished. captured
Integration by cameras.
with other buildings
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
network inauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14

A trend report from IFSEC Global 15 Sponsored by IDIS


m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Sponsored by A trendSponsored
report fromby A trend report from

But “the hardware seldom fails,” according to a


Sweden-based security distributor who says the
In addition, with average industry warranties
“lack of knowledge with those who install and
ranging from three to five years, we wanted to
configure the systems […] is the single largest
give our customers additional peace of mind.
reason” for system faults. “Setting up a system
Last year, we announced the IDIS Ultimate
incorrectly is also the single largest reason for Warranty, which offers a five-year warranty as
support-calls to our technical support,” they add. standard, plus an extended two-year warranty
across our entire range of H.265 network video
recorders (NVRs) covering the IDIS DirectIP
IDIS insight series and multi-format HD-TVI, DirectCX, TVRs
– so in essence we offer end users an industry-
“Full redundancy of every
leading seven-year warranty.” James Min,
component in your infrastructure
managing director, IDIS Europe
is prohibitively expensive and adds
unnecessary complication in most cases,
and manual recognition and resolution costs
precious time and risks gaps in footage. If any
part of video surveillance infrastructure fails,
it’s critical to first recognise the failure and then
initiate appropriate alternative or redundant
technologies to minimise loss of data. IDIS
Critical Failover reduces both issues, through a
multi-layered collection of capabilities spread
across the devices in your infrastructure.

ion 1. Introduction
port 2017 builds
The onVideo
theSurveillance Report
– and the2017 builds
spectre on thepunitive fines for
of more – and
datathe
breaches
spectre of more punitive fines for data breaches
ports in 2015 success
and 2016of two
on previousunder
reports
thein 2015 and 2016
forthcoming onprotectionunder
EU data law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
onsored, likethethissame
report,
subject
by – alsoissponsored,
sharpening like thisacross
minds report,
theby
supply chain
is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global manufacturer
surveillance leader IDIS, and
installers the largest
securitymanufacturer
professionals scramble
installers
to strengthen
and security professionals scramble to strengthen
in Southmarket
ideo surveillance: Korea. In 2015,their
Video
cybersurveillance:
defences. market their cyber defences.
provided a snapshot
trends and of systems
expectations provided a snapshot of systems
With this in mind, some of our findings onWith pagethis6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinning
around the world, the factors underpinning
interesting reading. interesting reading.
d how control procurement
rooms useddecisions and how control rooms used
surveillanceCCTVReport systems.
2016: The video surveillance Report 2016:
and play, meanwhile, CONTENTS
security needs and plug and play, meanwhile,
ations, the security
focusedneedson upgrade motivations, the security needs
CONTENTS
shaped by the of physical
surveillance systems as shaped by the physical
osed to people, data and the threats1.
environment, Introduction
posed to people,........................................
data and 1. Introduction 2 ........................................ 2
ssionals thought
assets,about
whatplug-
security professionals thought about plug-
ch cutting-edgeand-play
features
systems
they and which cutting-edge
2. The features
rise of open they
platforms ...................
2. The rise of 4 open platforms ................... 4
valued most highly.
ne subject in particular
This time round
that we’d
there was one subject in particular that we’d
3. Cybersecurity in the age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been
Information
neglectful to ignore: cybersecurity. Information
erent world altogether
security once
to the
convergence ..........................................
seemed a different world altogether to the
convergence 6 .......................................... 6
security professionals.
realm inhabited
But anyby physical security professionals. But any
wo disciplinesdemarcation
has now been between the 4.twoCutting-edge
disciplines has nowtechnologies
been ..................
4. Cutting-edge 9 technologies .................. 9
tegration withemphatically
other buildings
demolished. Integration with other buildings
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
networkinauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14

A trend report from IFSEC Global 16 Sponsored by IDIS


m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Sponsored by A trendSponsored
report fromby A trend report from

Are you more concerned about data breaches and cyber-attacks than you were two years ago?
More concerned 65%
No sector is immune, certainly not video
CYBERSECURITY
About the same 27%
Less concerned 8%

Pie chart
surveillance given that 86% of end users who
responded to this survey have network-connected
systems. A story broke in February 2018 that laid
Are you more concerned about data breaches and cyber-attacks than you were two years ago?
ARE YOU MORE CONCERNED ABOUT DATA
More concerned 65%
More
BREACHES AND
About the same
concerned
LessCYBER-ATTACKS THAN
concerned
27%
8% YOU WERE bare the risks: four British schools were among
About the same
TWO YEARS AGO?
Less concerned Pie chart
hundreds of public spaces, businesses and private
What do you think is the biggest security threat to surveillance systems? homes whose camera feeds were streamed on a
The PHYSICAL threat: Theft of NVRs/DVRs/SD cards/cameras
8%
The CYBER threat: Hacking or phishing
35%
65%
Russian website because they weren’t protected
by passwords.
27% More concerned
Pie chart
About the same It’s perhaps surprising against this background
65% Less concerned
that as many as one in four (27%) should claim
to be neither more nor less concerned about
What do you think8% the
is the biggest security threat to surveillance
The PHYSICAL threat: Theft of NVRs/DVRs/SD cards/cameras
cybersecurity threat, while 8% professed
systems?
35%
What do you think is the biggest security threat to surveillance systems?
The PHYSICAL threat: Theft of NVRs/DVRs/SD cards/cameras
The CYBER threat: Hacking or phishing
35%
The PHYSICAL threat: Theft of NVRs/DVRs/SD cards/cameras
What do you think is the biggest security threat to surveillance systems? 65%
to actually
What do you think is the biggest security threat to surveillance systems?
The CYBER threat: Hacking or phishing 65%
35%
be less concerned. There are several
WHAT DO YOU THINK IS THE27% BIGGEST SECURITY
The CYBER threat: Hacking or phishing
The PHYSICAL threat: Theft of NVRs/DVRs/SD cards/cameras 35%
possible reasons other than sheer complacency.
65%
The PHYSICAL threat: Theft of NVRs/DVRs/SD cards/cameras
The CYBER threat: Hacking or phishing
Pie chart 65%
THREAT TO SURVEILLANCE SYSTEMS?
The CYBER threat: Hacking or phishing
Pie chart
Pie chart Some may attribute the rise in media coverage
Pie chart 65%
of cybersecurity breaches, rightly or wrongly, to
improved detection and more frequent reporting.
The PHYSICAL threat: Theft of NVRs/DVRs/SD Others may have hardened their systems and
cards/cameras
35%
The PHYSICAL threat: Theft of The
TheTheCYBER threat: Hacking or phishing
CYBER threat:
NVRs/DVRs/SD Hacking or phishing
cards/cameras
The PHYSICAL threat: Theft of NVRs/DVRs/SD procedures in the last two years, possibly as part
cards/cameras
PHYSICAL threat: Theft of NVRs/DVRs/SD
The CYBER threat: Hacking cards/cameras or phishing
The CYBER threat: Hacking or phishing of efforts to comply with GDPR (although one
65%
might also expect them to be more concerned
35%
35%
35%
because of anxiety over punitive fines being
35% 65% introduced by the GDPR).
65%
Around two thirds of respondents 65% (65%) were more
65%
concerned about data breaches than they were
“Frequent changes of
ion 1. Introduction
two years ago. Exactly the same proportion also
considered the cyber threat to be a bigger security password to NVR/DVR
risk than the physical threat. A distributor based in and cameras can go
port 2017 builds Spain
The Video
on observed
the Surveillance that even – andifthe
Report someone
2017 spectrebuilds steals
of on the
more apunitive
NVR, fines for – and
datathebreaches
a spectre
long of more punitive fines for data breaches
wayEUtodata prevent
ports in 2015 success
and 2016of two
on previous reports
under
they still need to hack into it to obtain the data. the in 2015
forthcoming and 2016
EU data on protection under
law (the
the GDPR),
forthcoming protection law (the GDPR),
onsored, likethe thissame
One report,subject
consultant by –said alsothe issponsored,
sharpening
cyber threat like
minds isthis report,
across
the biggest theby supply chain is sharpening cyber threat.”
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global manufacturer
surveillance leader IDIS,
installers
concern because of the “invisibility of the attacker. the
and largest
security manufacturer
professionals scramble installers
to strengthen
and security professionals
Ghana-based installer scramble to strengthen
Who is typically the most complacent or least educated about cybersecurity?
in Southmarket
ideo surveillance: Korea. In 2015,their Video cyber surveillance:
defences. market their cyber defences.
Physical threats/vandalism are rare due to the End users 48%
22%
provided a snapshot
trends and expectations provided a snapshot of systems Installers
of systems
presence of cameras and Withthe thispossibility
in mind, some of storage
of our findingsConsultants
Vendors
onWithpagethis 6 make
8%
in mind,
8% for some of our findings on page 6 make for
, the factors installed
underpinning around the world, the factors underpinning
in a remote location.” interesting
However, reading.
a distributor based interesting
Manufacturers
WHO IS reading.
6%
TYPICALLY THE MOST COMPLACENT OR
d how control procurement
rooms useddecisions and how control rooms used NO OPINION 8%
LEAST EDUCATED ABOUT CYBERSECURITY?
surveillanceCCTV in Indonesia
Report 2016:said
systems. Thesome videoofsurveillance
their customers Report “were2016:
CONTENTS CONTENTS
Bar chart

not
and play, meanwhile, really concerned about
security needs and plug and play, meanwhile, securing the monitor
room.”needs
ations, the security
focused on upgrade motivations, the security needs 50%
shaped by the of physical
surveillance systems as shaped by the physical
osed to people, Cybersecurity
data and theisthreats
environment, certainly 1.posed
Introduction
a growing
to people, ........................................
concerndata and both 1. Introduction 2 ........................................ 2
38%
in the physical security space and in industry,
Manufacturers

ssionals thought
assets, about
what plug-
security professionals thought about plug-
NO OPINION

government and society


2. as a whole. According to
Consultants

ch cutting-edge and-play
features systems
they and which Thecutting-edge
rise of open features they
platforms ...................
2. The rise of 4 open platforms ................... 4
25%
a report
valued most byhighly.
the Identity Theft Resource Center and
Vendors
End users

Installers

ID theft protection firm CyberScout, the number of


ne subject in particular
This time roundthat we’d there was one subject in particular that we’d 13%
breaches soared 29% 3.
year Cybersecurity
on year for the infirst
thehalf age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been
Informationneglectful to ignore: cybersecurity. Information
of 2017.
erent world altogether
security toAnd
once theseemedin latea2017 convergence
different Cybersecurity
world altogether
..........................................
Ventures
to the
convergence 6 .......................................... 6
0%
forecast
security professionals.
realm that
inhabited
But anyglobal
by physical ransomware damages would
security professionals. But any End users Vendors Manufacturers
reachnow$11.5
wo disciplinesdemarcation
has been billion by
between the2019 two – 35.4
4. Cutting-edge technologies
disciplines times
has nowas high
beenas ..................
4. Cutting-edge 9 technologies .................. 9
tegration with the $325m
emphatically
other buildings total costs Integration
demolished. posted in 2015. with other buildings
– including the
systems,
hijackinga spateof of breaches – including the hijacking of
2017 presidential
network inauguration
cameras during the 5.2017Warrantiespresidential ........................................
inauguration 5. Warranties 14 ........................................ 14

A trend report from IFSEC Global 17 Sponsored by IDIS


m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Sponsored by A trendSponsored
report fromby A trend report from

Asked who they thought was most complacent With cloud storage ranking bottom, security
or least educated about cybersecurity in the professionals are perhaps becoming less wary
supply chain, only 6% of respondents chose about outsourcing control of their data and
manufacturers. It’s reassuring news for technology cybersecurity measures. Global spending on
developers, some of whom have drawn public cloud services and infrastructure is forecast
opprobrium for not forcing users to change to reach $277bn by 2021, at a compound annual
default passwords. Product developers have growth rate (CAGR) of 21.9%, according to IDC.
certainly in the last two years been noticeably
David Lithnicum, chief cloud strategy officer at
more active in championing the cyber resilience of
Deloitte Consulting, said back in 2014 that the
their products and educating customers, through
‘folded arms gang’ in enterprise IT were already
literature, roadshows and the like, on how to
gradually coming round to the cloud as it proves
harden their processes and systems.
its worth. Writing on TechTarget he pointed to
Vendors (8%) and consultants (7%) also got off Alert Logic’s Fall 2012 State of Cloud Security
lightly. Report, which said “the variations in threat activity
are not as important as where the infrastructure is
End users were seen as the most complacent/
located. Anything that can be possibly accessed
least educated about cybersecurity (48%), with
from outside – whether enterprise or cloud – has
installers well behind in second place (22%).
equal chances of being attacked, because attacks
Frequently entering the industry via the military
are opportunistic in nature.”
or police, physical security professionals have
had to broaden their skills to equip themselves The report found that web application-based
for the IP era. Similarly, many installers formed attacks hit on-site environments as well as service
their business models in the age of the analogue provider environments, albeit the latter happened
camera. The GDPR will perhaps prompt installers to a greater proportion of organisations (53%
to prioritise cybersecurity whether or not the end versus 44%). However, on-site environments
user has pushed for it. suffered a far higher average number of attacks:

ion 1. Introduction PLEASE RANK THESE RISK FACTORS FOR CYBER


61.4 attacks against just 27.8 for cloud systems.
Predictably, on-premises systems were also
BREACHES IN ORDER OF IMPORTANCE: subject to far more ‘brute force’ attacks. Lithnicum
port 2017 buildsThe onVideo theSurveillance Report– and the 2017 builds
spectre on thepunitive fines
of more suggested
for
– and
datathe that “those
breaches
spectre whopunitive
of more build cloud-based
fines for data breaches
ports in 2015 success
and 2016 of twoon previousunder reportsthein 2015 Order
and 2016
forthcoming of
EU data platforms
onprotection under
law (theforGDPR),
the enterprisesEU
forthcoming typically focus more
data protection on GDPR),
law (the
Importance
onsored, likethe thissamereport,
subject
by – alsoissponsored,
sharpening likemindsthisacross
report,thebysupplysecurity
chain asand
is sharpeninggovernance
vendors, minds acrossthanthethose
supply who build
chain as vendors,
IDIS, the largest
global manufacturer
surveillance
Manufacturer ‘back leader
doors’ IDIS,
installers
or otherthe largest
and securitymanufacturer
professionals scrambleinstallers
systems to strengthen
that and
will security
exist professionals
inside scramble
firewalls.” to strengthen
ideo surveillance: weak
in Southmarket security
Korea. measures
In 2015, Video
their cybersurveillance: 1ST
defences. market their cyber defences.
provided a snapshot
trends
Human oferror
and systems
expectations provided a snapshot of systemsIn its 2016 Cost of Insider Threats Study, Ponemon
during installation/
With this in mind, some 2NDof our findings onWith
pagethis
Institute 6 make
in mind,
revealed for some
that 568ofof
our874
findings on page 6 make for
cybersecurity
, the factors installed
underpinning around the
maintenance world, the factors underpinning
interesting reading. interesting reading.
d how control procurement
rooms useddecisions and how control rooms used incidents reported to it (about 65%) were
Incompetence or malicious attacks
surveillanceCCTV Report systems.
2016: The video surveillance Report 3RD 2016: caused by employee or contractor negligence or
and play, meanwhile,
by internal
CONTENTS
employees
security needs and plug and play, meanwhile,
ations, the security
Video data stored in the cloud
focusedneeds on upgrade motivations, the security 4THneeds
CONTENTS
criminality. And another study, by data security
company Clearswift, found that 74% of cyber
shaped by the of physical
surveillance systems as shaped by the physical
incidents originated 2 from within organisations.
osed to people,
environment,
Asked datatoandrank threats1.
thecybersecurity Introduction
posed factors........................................
to people,
risk data
in and
order 1. Introduction ........................................ 2
Nevertheless, respondents still considered
ssionals thought
assets, about
what plug-
security professionals
of importance, respondents overall considered thought about plug-
ch cutting-edge and-play
features
“manufacturersystems
they ‘back
and which 2. The
doors’ cutting-edge
orrise
other features
of weak
open they “incompetence
platforms
security ...................
2. The to rise
or malicious attacks by internal
of
4 open platforms ................... 4
valued most highly. employees” be a less significant threat than
measures” as the biggest risk factor – reassuring,
“human error during installation or maintenance”
then,timethat
ne subject in particular
This thatmanufacturers
round there was oneshould
we’d subjectbe seen as the
in particular
3. Cybersecurity in that
the we’d
age of 3. Cybersecurity
or systems that are unsecure in the byage of
design.
most
ore: cybersecurity.
have beenreliable
Information part to
neglectful of ignore:
the supply chain when
cybersecurity. it
Information
erent world altogether
security
convergence ..........................................
convergence 6 .......................................... 6
comesonce to theseemed a different
cyber-vigilance. world altogether
Human error during to the
security professionals.
realm inhabited
installationBut anyorby physical security
maintenance wasprofessionals.
seen as, on But any
wo disciplinesdemarcation
has now beenbetween
average, the second biggest the 4. Cutting-edge
two disciplines
risk factorhas of
nowtechnologies
been
four that ..................
4. Cutting-edge 9 technologies .................. 9
tegration withemphatically
other buildings demolished. Integration with other buildings
we put to survey respondents.
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
network inauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14

A trend report from IFSEC Global 18 Sponsored by IDIS


m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Sponsored by A trendSponsored
report fromby A trend report from

In the age of the YouTube tutorial security


TECHNICAL professionals still appear to prefer traditional

SUPPORT methods of technical support. Asked to rank five


forms of support in order of preference, end users
most favoured “talking through a problem on the
The video surveillance hardware market remains phone”, followed by an on-site technician visit.
fragmented and fiercely competitive even after It’s clearly quicker to explain a problem verbally
several major acquisitions in recent years. The than by typing it online – and you can get real-
dramatic rise to dominance of Chinese giants time feedback as you grapple with the issue. The
Hikvision and Dahua over the past 15 years has positive experience of most security professionals
only intensified pressure on competitors to either surveyed suggests that manufacturers are
squeeze costs or find value-adds in innovation delivering the goods when it comes to these
and service. If our survey is any barometer, preferred methods.
many manufacturers have fulfilled the latter goal Classroom-based training might rank only fourth
commendably by offering first-class technical
How do you rate your vendor's technical support? out of five, but it clearly hasn’t been rendered
support
Top class
Very good
to customers. 16%
43% obsolete by video tutorials, which ranked
Adequate 36%
Poor
Appalling
4%
1%
marginally behind at the foot of the table. This is
HOW DO YOU RATE YOUR VENDOR’S
Bar chart despite the travelling time and expenses involved
TECHNICAL SUPPORT? and the fact that it’s hardly a viable solution when
50%
the customer needs to urgently remedy a system
fault. Clearly, classroom-based training has its
place when it comes to learning how to get the
TOP CLASS

38%
most out of security systems.
VERY GOOD

25%
ADEQUATE

APPALLING
POOR

13%

ion 1. Introduction
0%
Top class Very good Adequate Poor Appalling
The vast majority (95%) of end users rated their
port 2017 builds
The Video
on
vendor’stheSurveillance Report
– and the
technical support 2017
as builds
spectre
at least on thepunitive fines for
of‘adequate’
more – and
datathe
breaches
spectre of more punitive fines for data breaches
ports in 2015 success
and 2016
of two
on previous reports
under the in 2015 and
forthcoming
with 57% opting for ‘very good’ or better, and a 2016
EU on
data protectionunder
law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
onsored, likethethissame
report,
subject
by – alsoissponsored,
sharpening like this report,
minds by
still decent chunk – 16% – calling it ‘topacross
class’.the supply chain
Less is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global manufacturer
surveillance leader IDIS, and
installers the largest
securitymanufacturer
professionals scramble
installers
to strengthen
and security professionals scramble to strengthen
than 1% thought the service they’d received was
in Southmarket
ideo surveillance: Korea. In 2015,theirVideo surveillance:
cyber defences. market their cyber defences.
‘appalling’.
provided a snapshot
trends andof systems
expectations provided a snapshot of systems
With this in mind, some of our findings onWith pagethis6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinningaround the world, the factors underpinning
interesting reading. interesting reading.
d how control procurement
rooms
PLEASE used decisions
RANK and OF
IN ORDER how control rooms
USEFULNESS used
THESE
surveillanceCCTVReport systems.
FORMS 2016: The video surveillance Report 2016:
OF TECHNICAL SUPPORT:
and play, meanwhile,
security needs and plug and play, meanwhile,
ations, the security
focusedneeds
CONTENTS
on upgrade motivations, the security Order needs
of
CONTENTS
importance
shaped by the of physical
surveillance systems as shaped by the physical
osed to people,
environment,
data andthrough
Talking the threats 1.posed
a problem Introduction
to people,........................................
data and 1. Introduction 2 ........................................ 2
on the phone 1ST
ssionals thought
assets, about
whatplug-
security professionals thought about plug-
ch cutting-edgeand-play
featuressystems
they and which 2. Thecutting-edge
rise of openfeatures they
valued mostOn-site technician visit
highly. 2ND platforms ...................
2. The rise of 4 open platforms ................... 4

ne subject in particular
This time round
that we’d
there was one subject in particular
3. Cybersecurity
Troubleshooting guides/FAQs 3RD in that
the we’d
age of 3. Cybersecurity in the age of
ore: cybersecurity.
have been
Information
neglectful to ignore: cybersecurity. Information
erent world altogether
security once
to the
convergence ..........................................
seemed a different world altogether to the
convergence 6 .......................................... 6
Manufacturer’s classroom training
security professionals.
realm inhabited 4 TH
But anyby physical security professionals. But any
Video tutorials 4. Cutting-edge technologies ..................
4. Cutting-edge 9 technologies .................. 9
wo disciplinesdemarcation
has now been between the two disciplines has now been
tegration withemphatically
other buildings 5 TH
demolished. Integration with other buildings
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
networkinauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14

A trend report from IFSEC Global 19 Sponsored by IDIS


m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS
Sponsored by A trendSponsored
report fromby A trend report from

ion 1. Introduction
port 2017 builds
The onVideo
theSurveillance Report
– and the2017 builds
spectre on thepunitive fines for
of more – and
datathe
breaches
spectre of more punitive fines for data breaches
ports in 2015 success
and 2016of two
on previousunder
reports
thein 2015 and 2016
forthcoming onprotectionunder
EU data law (the
the GDPR),
forthcoming EU data protection law (the GDPR),
onsored, likethethissame
report,
subject
by – alsoissponsored,
sharpening like thisacross
minds report,
theby
supply chain
is sharpening
as vendors,minds across the supply chain as vendors,
IDIS, the largest
global manufacturer
surveillance leader IDIS, and
installers the largest
securitymanufacturer
professionals scramble
installers
to strengthen
and security professionals scramble to strengthen
in Southmarket
ideo surveillance: Korea. In 2015,their
Video
cybersurveillance:
defences. market their cyber defences.
provided a snapshot
trends and of systems
expectations provided a snapshot of systems
With this in mind, some of our findings onWith pagethis6 make
in mind,
for some of our findings on page 6 make for
, the factors installed
underpinning
around the world, the factors underpinning
interesting reading. interesting reading.
d how control procurement
rooms useddecisions and how control rooms used
surveillanceCCTVReport systems.
2016: The video surveillance Report 2016:
and play, meanwhile, CONTENTS
security needs and plug and play, meanwhile, CONTENTS
shaped by the THE
ations, the security
focusedneeds
of physical
on upgrade motivations, the security needs
surveillance systems as shaped by the physical
data and the threats1. Introduction
to people,........................................
1. Introduction 2 ........................................ 2
VIDEO
osed to people,
environment,
ssionals thought
assets,about
whatplug-
posed data and
security professionals thought about plug-
ch cutting-edge
SURVEILLANCE
and-play
features
systems
they and which
valued most highly.
cutting-edge
2. The features
rise of open they
platforms ...................
2. The rise of 4 open platforms ................... 4

REPORT3. Cybersecurity in the age of 3. Cybersecurity in the age of


ne subject in particular
This time round
that we’d
there was one subject in particular that we’d

2018 convergence ..........................................


ore: cybersecurity.
have been
Information
neglectful to ignore: cybersecurity. Information
erent world altogether
security once
to the
convergence
seemed a different world altogether to the
6 .......................................... 6
security professionals.
realm inhabited
But anyby physical security professionals. But any
wo disciplinesdemarcation
has now been between the 4.twoCutting-edge
disciplines has nowtechnologies
been ..................
4. Cutting-edge 9 technologies .................. 9
tegration withemphatically
other buildings
demolished. Integration with other buildings
– including the
systems,
hijacking
a spate
of of breaches – including the hijacking of
2017 presidential
networkinauguration
cameras during the 5.2017
Warranties ........................................
presidential inauguration 5. Warranties 14 ........................................ 14
Sponsored by A trend
Sponsored
report from
by A trend report from
A trend report from IFSEC Global 20 Sponsored by IDIS
m IFSEC Global
2 A trend report from IFSEC Global Sponsored by IDIS Sponsored by IDIS

You might also like