We have identified new trending topics for speaking sessions, networking events and technology showcase to support business of global brands in Russia.
A growing number of businesses in Russia is showing a great enthusiasm for using biometrics for authentication, verification and identification purposes. In retail environments, demand is rising for time and attendance systems to save money and eliminate the frustrations of a manual process. Withing the banking sector, biometric technology provides an extra layer of security as an authentication tool.
The National Biometric Platform is being launched to enable banks in Russia to identify customers digitally. The platform will not only improve operational performance, but also reduce fraud risks.
Digital Business Transformation
Digital transformation stands for the use of technology to radically improve performance enterprises. Executives in various industries are using digital advances such as data analytics, mobility, social media, smart embedded devices and cloud services to improve capabilities of traditional technologies such as ERP and change customer relationships, internal processes, and value propositions.
The Internet of Things (IoT)
Channel partners see opportunities in deploying integrated building automation systems and bringing the IoT into the realm of facilities management. The transition from isolated systems operated from a computer in the basement to connected systems accessed from a phone is well underway. The greatest advantages of this revolution are mobility, improved ease of use and operational efficiency. Internet connectivity also allows the correlation of a variety of data sources (security systems and engineering infrastructure of buildings) and the coordination of controls across disparate devices enabling increasingly sophisticated systems.
Neural networks are changing the notions of video surveillance and video analytics. Basically, there are two main ways to grow revenues for CCTV vendors.
1. Way one is a race to the bottom as a result of cutthroat competition, scale effect, and cutting costs. Meaning doing business on most popular IP products and solutions.
2. Way two is leveraging new advanced technology. Meaning doing business on High-End solutions and learning a more complex sales process.
Hardware acceleration gives significant improvements in video rendering performance for middle-sized and large installations and greatly cuts the cost of the hardware. Due to increased computation power, the number of video recording servers is reduced. With hardware accelerated video motion detection video decoding is shifted from the software CPU to the hardware GPU. This means running more cameras per server and using fewer servers per installation or lower spec servers, resulting in a lower total system cost. But more importantly, hardware acceleration gives way to more basic adoption of artificial intelligence and deep learning.
In a couple of years, revenues that vendors get from beyond security applications will surpass revenues from security applications many times. Vendors will just have to move beyond the current notion of security and inspire their sales partners and customers to do the same. Here's how to get started on developing business cases where customers can generate revenue and profit from security installations.
Identity and Access Management
The identity management (IAM/IDM) market opens up great business opportunities for technology vendors. The Russian IAM/IDM market is growing and characterized by low competition and a wide range of solutions: expensive and budget-friendly, global and local, entry-level and high-end/sophisticated, open and proprietary. Russian businesses identify two main reasons to deploy IAM solutions: improved security (access privileges are granted according to one interpretation of policy and all individuals and services are properly authenticated, authorized and audited) and cost reduction.
The business IT environment is ever evolving and the difficulties have only become greater with trends like BYOD, cloud computing, mobile apps and an increasingly mobile workforce. As employees migrate through different roles in an organization, it becomes more difficult to manage identity and access. IAM solutions integrated with physical security systems should automate the initiation, capturing, recording and management of user identities and their related access permissions for any, even most complicated scenarios.
It is rather ironic that physical security systems which provide for the safety and security of people and assets in buildings are perceived as having the highest level of risk of all types of building elements, according to Memoori. The main reason for this is cameras and data recorders from some manufacturers that have proven easy to compromise. So concerns about vulnerability in this area is understandable and also a backdoor to attacking integrated building control systems and other IT networks and devices. Physical security will therefore be one of the big spenders on installing cyber security systems particularly in smart buildings.
A miniaturization trend has been established in many areas of electronics. Within a short time, smaller-sized PCs became possible; in the meantime, the industry saw the introduction of single-board computers. The camera electronics became more compact and the cameras successively smaller. On the way to even higher integration, small cameras without housings are now offered, which can be easily integrated into compact systems. Embedded vision architectures enable smaller, more efficient vision solutions optimized for price and performance.
Integration makes security systems more useful in a wider array of applications and use cases as well as provides a better user experience. There are two ways available for security vendors:
1) offering proprietary end-to-end solutions – those are not cheaper, but easy to install and get running;
2) offering interoperable or open systems that can work together with other systems, and get integrated into a complex solution.
Options for system integrators include:
1) installing end-to-end solutions which are easy to set up and run, and require minimum maintenance;
2) bringing together component subsystems into a whole which is more difficult, requires more knowledge, systems are more expensive, and sales are more complicated. But each installation brings a bigger revenue due to added value from a system integrator.
The same works for end-users. They can:
1) either choose relatively inexpensive end-to-end solutions that are easy-to-install, set up and run, and require less maintenance;
2) or integrated systems that have a fancy price, require knowledge to be installed and maintained but offer a totally different return – a higher level user experience, and functionality not available with end-to-end solutions.