Skip to content Skip to sidebar Skip to footer

Editor Introduction

Six months can go by in the blink of an eye. In 2022, it almost seems as if it has. Here we are already at mid-year after what has been an eventful six months for the security marketplace. There is still a lot ahead in 2022 for the industry, and our Expert Panel Roundtable has been considering what the coming months might hold in terms of technology change. We asked this week’s panelists: 

chris garner

For the second half of 2022, I see three areas of development, each driven by the need to provide customers with an easier way to cover more of their environment, without requiring more operators, and continue to support a remote workforce. 

The first is that analytics availability and reliability have increased over the years and are now integrating with platforms such as video management systems (VMS). Customers are looking to use best-of-breed analytics in their deployments to help monitor situations around operational efficiency and life safety without having to replace their VMS platform.
The second is the drive to provide reliable and secure remote access and management for systems. The cloud is one way to achieve remote access and management, but it does not have to be the only way.
The third area of development is with system density. Camera resolutions continue to increase, and customers want to use the highest frame rate of cameras to get the most out of their video systems.

Editor Summary

Will the remainder of 2022 be a turning point for video surveillance? Will the next six months see the integration of AI and analytics into every aspect of video and security? Will we see big steps for touchless biometrics? These are just a few of the technologies our Expert Panel Roundtable mentions as likely to be dominant forces in the second half of the year. The observations of our panel suggest a need for continuing vigilance as security professionals strive to stay abreast of the latest fast-moving developments in technology.

Read the full article on SecurityInformed.com!

Go to Top