Safety & Security Landscape Overview and The Road Ahead

physical security control room

The physical security industry is undergoing continuous transformation influenced by advances in technology, evolving regulatory requirements and the increasing convergence of cyber and physical domains.

Organisations are adopting more intelligent edge‑based analytics, integrating UAVs into operational workflows and enhancing detection accuracy through LiDAR and RADAR. At the same time, identity management practices are shifting toward mobile credentials, hybrid cloud is becoming the preferred architectural model, and the ongoing skills shortage is prompting a renewed focus on training and competency development.

Here we outline the key trends shaping how organisations modernise their estates and improve safety, compliance and operational resilience. This reflects discussions across the industry and insights from real‑world deployments, offering a grounded understanding of where the sector is heading.

1. Edge Analytics Become the Standard for Smart Video Surveillance

The Video Surveillance sector is undergoing a significant shift as AI-enabled chipsets and system-on-chip architectures move intelligence from central servers directly into cameras and sensors. Historically, analytics depended on backend infrastructure while cameras acted purely as image capture devices. Modern processors now support multiple neural networks running locally, enabling real-time classification, behaviour analysis, safety monitoring and scene interpretation at the edge.

This shift from centralised to distributed intelligence reduces bandwidth requirements, lowers infrastructure overhead and improves responsiveness. These advantages are particularly relevant for large, complex or geographically dispersed estates where backhaul costs and latency can be significant. AI capabilities are increasingly viewed as baseline functionality across mid-tier and advanced devices.

On-device intelligence also enables richer automation workflows, allowing Video Surveillance to integrate deeper with access control, incident management and operational platforms. Cameras can now trigger event-driven actions that support safety, efficiency and situational awareness, reducing operator workload.

As more capability shifts to the edge, servers become increasingly storage optimised while cloud management layers centralise updates, health monitoring and configuration. The same chipset innovations are also powering autonomous patrol units, robotics and UAV technologies. Intelligent edge devices are becoming the foundation of modern, scalable Video Surveillance strategies across many sectors.

2. UAVs Become Integrated Operational Tools Rather Than Experimental Add-ons

UAV adoption has accelerated, moving from pilot projects into practical, embedded tools that complement Video Surveillance. UAVs provide rapid, flexible visibility over wide areas and are proving valuable for organisations with extensive perimeters, remote assets, critical infrastructure or industrial facilities.

Drone in a box platforms have driven much of this growth by automating take-off, landing and charging, enabling scheduled patrols or rapid deployment triggered by Video Surveillance or analytic events. This automation reduces reliance on manual piloting and strengthens operational response.

Integrating UAV feeds into Video Surveillance and incident management systems creates consistent workflows and unified evidence handling. Aerial views combined with edge analytics significantly enhance situational awareness and verification.

Regulatory frameworks have matured in the UK, EU and US, providing clearer guidance for permissions such as beyond visual line of sight and structured risk categories. UAVs support alarm verification, lone worker protection, perimeter screening and incident response without placing staff at risk.

UAVs do not replace fixed Video Surveillance but extend coverage, mobility and operational reach. They are becoming a recognised and established component within multi-sensor security environments.

3. LiDARs and RADARs Become Essential Components of Multi-Sensor Security Architectures

LiDAR and RADAR have rapidly advanced and are increasingly fundamental within modern security designs. While Video Surveillance provides evidential context, LiDAR and RADAR deliver accuracy, consistency and performance in environments that challenge optical sensors.

LiDAR generates detailed 3D point clouds, enabling precise detection of people and vehicles, perimeter protection, space mapping and restricted zone monitoring. Advances in solid-state LiDAR have delivered smaller, more resilient and more cost-effective units designed for continuous security operation.

RADAR excels in conditions such as rain, fog, dust, smoke or low visibility, offering long-range movement detection, multi-target tracking and day or night reliability. Many modern RADARs integrate directly with Video Surveillance and incident platforms.

When used together, LiDAR, RADAR and Video Surveillance significantly improve detection confidence and reduce false alarms. LiDAR provides positional and shape detail, RADAR offers movement and range data, and Video Surveillance supports visual confirmation.

This multi-sensor combination enables advanced automation. LiDAR alerts can drive PTZ tracking or initiate UAV dispatch, while RADAR enhances trajectory analysis and early warning. Network native devices now support open protocol integration with VMS and PSIM platforms, with many sensors performing preprocessing locally to reduce bandwidth use.

LiDAR and RADAR adoption continues to grow as organisations strengthen multi-layer security postures.

4. Cyber Physical Convergence Driven by Regulation and Governance

Cyber and physical security convergence has moved firmly into the mainstream. Regulatory frameworks across Europe and the UK increasingly acknowledge that Video Surveillance, access control, intercoms and alarms operate within connected digital ecosystems and must meet IT-grade governance and cybersecurity expectations.

NIS2 expands regulatory scope across the EU and increases accountability around authentication, firmware processes, segmentation and supply chain integrity. The UK Cyber Security and Resilience framework aligns closely with these principles.

Zero trust approaches and hardened device configurations are becoming standard practice, with encrypted communications, certificate-based authentication and secure boot mechanisms increasingly common in modern products.

Convergence also reshapes incident management processes, with physical security events being correlated with cyber alerts and cyber anomalies validated through physical data. This reinforces the shift toward unified operational response across both domains.

Skills development remains a challenge as physical security professionals strengthen IT and cyber competencies. Evolving regulation will continue to influence procurement, design, integration and governance practices in the years ahead.

5. Mobile Credentials Become Mainstream for Identity and Access

Mobile credentials are now widely adopted due to their alignment with digital identity ecosystems, robust security properties and operational efficiency. Users are familiar with mobile-based authentication in everyday applications, making mobile access an intuitive extension.

Mobile credentials integrate seamlessly with cloud identity platforms and HR systems, enabling efficient onboarding, offboarding and entitlement management. Biometric unlock, secure enclaves, and encrypted communication offer stronger protection than traditional cards, which can be lost or cloned.

Organisations reduce costs associated with card printing and replacement while also lowering environmental impact. Hybrid deployments remain common, with mobile credentials introduced alongside physical cards during transition phases.

BLE, NFC and QR technologies are now standard features across modern access control ecosystems, and cloud-based issuance enables large-scale deployments with minimal infrastructure.

Mobile credentials continue to gain traction as part of modern identity strategies.

6. Hybrid Cloud Becomes the Default Architecture for Physical Security

Hybrid cloud has become the natural choice for organisations seeking resilience, scalability and governance across physical security systems. Local recording and access control ensure operational continuity and compliance, while cloud layers provide centralised visibility, licence and firmware management and consistent configuration control.

This blended architecture allows organisations to adopt advanced analytics without redesigning their infrastructure. It also supports phased modernisation as end-of-life components are replaced with cloud-optimised alternatives, aligning with procurement cycles and budget planning.

Hybrid cloud models enhance cybersecurity through consistent policy enforcement, more regular firmware processes and enhanced auditability. When combined with segmentation and device hardening, they offer a strong balance between operational resilience and cyber protection.

Hybrid cloud continues to be the most practical and widely adopted model across modern security estates.

7. Skills Shortages Drive Structured Competency and Training Initiatives

The skills gap continues to shape the industry as systems become more interconnected and software-driven. Modern Video Surveillance and access control environments require knowledge spanning networking, cybersecurity, scripting, cloud management and traditional installation skills.

Apprenticeship pipelines remain insufficient to meet demand, and experienced engineers often move into broader technology roles. This places increased emphasis on structured training, capability frameworks and retention strategies.

Manufacturers and integrators are expanding certification programmes to cover product expertise, cybersecurity, network fundamentals and best practice system design. Training providers are updating curricula to reflect cloud-managed platforms, converged architectures and IT-aligned workflows.

Digital guidance tools are helping to reduce complexity, but long-term workforce development remains a critical priority across the sector.

Written by Mehul Gusani, Principal Consultant – Security Design & PM