Video is everywhere. From repurposed imaging sensors in bird feeders to the seamless integration of internet-connected doorbells, the addition of video to everyday devices is fundamentally changing surveillance. As a result, video is no longer a primary feature but a secondary attribute that permeates the Internet of Things (IoT).
The impact of this transformation is profound, forcing the security industry to adapt to an environment in which surveillance cameras are distributed across devices with a variety of capabilities. This change will usher in a new era of consumer demand, driving product innovation and evolving market opportunities. Of course, with the proliferation of cameras in modern homes and offices, navigating this trend safely requires careful consideration.
Let’s take a look at five key insights about the IoT video revolution and what the path forward for security professionals might be.
The evolution of surveillance
We’ve come a long way from CCTV. In the early days of surveillance, fixed cameras were single, analog tools. Advancements brought digital multiplexing and gave rise to motion recorders and time lapse capabilities. Times moved on and the market continued to innovate. Today, surveillance includes everything from Internet Protocol (IP) cameras to cloud-based storage, remote alerts, and smart interconnectivity.
This story is not static, and the emergence of video-enabled IoT is the next chapter. Surveillance is increasingly coming in different shapes and sizes through upcycling video sensors from old cell phones. This opens up a world of possibilities for surveillance, automation, and connectivity that will hopefully redefine the coming years.
Beyond the Camera
Surveillance devices are no longer just cameras: smart doorbells, pet cameras, baby monitors, etc. Conversely, regular devices are now equipped with surveillance capabilities, making the market more diverse and profitable.
Their first product, the smart doorbell, is an example of this in action. Combining surveillance and convenience, this product does much more than alert residents to the arrival of visitors; it monitors their front yard, enables two-way communication, and enhances home security. Ten years after they arrived on the market, smart doorbells are valued at over $3 billion. In ten years, the sector is expected to grow 17% annually, reaching a valuation of $11 billion.
The expansion of surveillance to devices represents a growing market opportunity for security companies. For example, the global surveillance market is expected to grow to $54 billion by 2026, more than double what it was in 2019. So, for companies willing to pivot, this is a lucrative opportunity. But to pivot successfully, they need to focus on research and development (R&D) and have versatile skills.
Skill Fusion
Technically, delivering a video-enabled device poses important considerations: incorporating video into a device requires more than simply adding a camera, but rather developing an all-in-one system that not only captures the image stream but also processes the data on-board.
Companies in this space quickly realize that creating such devices requires specialized components. For example, real-time operating systems can have difficulty efficiently processing and transmitting video data, often necessitating a move to a higher-end operating system such as Linux. However, this move can raise energy considerations, especially for battery-powered devices.
Additionally, encoding and compressing video is not a trivial task. Videos involve a significant increase in data volume, forcing developers to include chipset add-ons to encrypt the images and transmit them securely. In essence, creating a video-enabled device is a daunting task that poses a multitude of software, hardware, and development challenges.
In addition to these hurdles, companies must also develop companion apps and platforms that facilitate user interaction with the device while prioritizing data transfer, security, and privacy, which adds another layer of complexity. These obstacles highlight the need for companies developing devices in this direction to have generic skills (and plenty of patience).
The Vendor’s Dilemma
Security companies must therefore consider whether this evolution is right for them. Of course, not all operators will deem the development of video-enabled devices necessary or feasible. Leaders must carefully evaluate the relevance of this transition within the context of their existing product lines. This evaluation process includes consideration of specific use cases and the flexibility to adapt as needed. Incorporating video into devices should not be a hasty response to a passing trend; rather, it must be aligned with a well-founded business and technology strategy.
It is also important to recognize that “device vision” does not necessarily mean the incorporation of a traditional camera. Alternative technologies such as LiDAR sensors, which can use laser targeting to determine distance and measure the return time of reflected light, offer viable options. These sensors can be cost-effective and less invasive for certain use cases. Ultimately, the field must remain adaptable and insightful to meet the ever-changing demands of the market.
Changing security
Finally, we must address the big issue of cybersecurity. When everything has cameras and those devices are connected to the internet, the reality is that the attack surface that hackers can exploit expands — and is a particularly sensitive one. Unfortunately, hackers can and will target businesses that don’t adequately protect themselves and their customers. We saw this happen earlier this year when the security camera manufacturer recalled about 5 million cameras because they had easy-to-guess passwords.
Security companies entering the connected video device space face a two-fold responsibility. First, they must enable robust user authentication. This can be achieved by employing solutions such as Public Key Infrastructure (PKI) for cryptographic key-based security. This approach helps to strengthen resistance to brute force attacks and eliminate shared secret vulnerabilities in the event of a breach. Additionally, secure data transfer is essential. Peer-to-peer connections that avoid intermediate servers and have end-to-end encrypted transmissions are ideal for achieving this. This connection type not only enhances cybersecurity, but also saves costs by avoiding cloud service fees based on file size, a crucial detail when dealing with high-quality video.
The IoT video revolution is transforming surveillance and security, providing new opportunities for growth. As video sensors become integral to a wide variety of devices, executives must carefully consider the benefits. This expansion requires a blend of hardware and software skills, robust cybersecurity, and significant research and development. Flexibility and adaptability are essential to meet evolving market demands. This is a big change, but one that must be approached carefully to ensure both success and safety.