Security Solutions Today: May-Jun 2018

Page 55

TOP TECH TRENDS FOR THE SECURITY INDUSTRY IN 2018 AND BEYOND | INSIDE LOOK

Gartner estimates that AI is about two-five years away from mainstream adoption, for instance, and 75% of executives polled by the Economist Intelligence Unit think AI is so important they plan to implement in their business within the next three years.

“Connect, Collect, Compute and Create” will be the confluence of enhanced connectivity options with edge computing and cloud analytics. Enhancements in IoT connectivity, such as low-power wireless access (LPWA) will drive growth. Moreover, technologies adjacent to the IoT will become increasingly sophisticated. Machine video and ubiquitous video will empower new types of visual analytics. AI, the cloud and virtualisation will help develop critical insights sourced from data at the so-called “edge” of computing networks. Applying AI techniques to data will drive monetisation in the form of cost savings, greater efficiencies and a transition from product- to service-centric business models. Security companies have grasped this opportunity by developing biometric and facial recognition cameras, digital locks, remote sensors alarm, etc. But with security system being controlled remotely, cyber security becomes a critical risk. The security industry is shifting its focus from the physical defence and hardware to the software and encryption of communication.

security solutions and data protection problems make it easy for them, but there have also already been discovered huge botnets that consist of IoT-like devices that implemented DDoS attacks to such a frightening extent.

Cloud and Virtualisation Cloud services will pave the way for technologically immature companies to utilise machine learning (ML) and AI, radically transforming their usage and understanding of data. However, a weakness in physical security can be just as dangerous as any vulnerability in cyberspace. An improperly protected or suboptimally located data center can put important information and operations at severe risk of disruption. In addition to thieves and natural disasters, enterprises face possible danger from unauthorised employees having access to loosely secured server rooms. Accordingly, it is imperative that organisations approach cloud security holistically and devote adequate attention to both protecting data and securing the physical locations in which it resides.

The omnipresent networking via IoT will keep us busy in the future, as IoT products are entering more and more areas of life, creating new security gaps that criminals discover very quickly, of course. Inadequate

May / June 2018 • Security Solutions Today

53


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.