{"id":1870,"date":"2022-08-16T10:31:28","date_gmt":"2022-08-16T10:31:28","guid":{"rendered":"https:\/\/torus-technology.com\/us\/?p=1870"},"modified":"2025-08-19T06:07:04","modified_gmt":"2025-08-19T06:07:04","slug":"the-rapid-rise-of-security-tech-adoption-and-what-the-future-holds","status":"publish","type":"post","link":"https:\/\/torus-technology.com\/beta\/the-rapid-rise-of-security-tech-adoption-and-what-the-future-holds\/","title":{"rendered":"The rapid rise of security-tech adoption \u2013 and what the future holds"},"content":{"rendered":"<p>After COVID-19 emerged and we were ushered indoors, people and workplaces had to rapidly adapt. Luckily, we didn\u2019t have to do it alone.<\/p>\r\n<p><\/p>\r\n<p>Technology became our fallback \u2013 and our key to unlocking new heights of productivity and flexibility.<\/p>\r\n<p><\/p>\r\n<p>Today, our understanding and adoption of security-tech solutions are only accelerating. Here we explore why, and what it means for the security world at large.<\/p><h2 class=\"wp-block-heading\">The remote revolution<\/h2><p>Recent studies indicate that both remote and hybrid work arrangements are here to stay.<\/p><p>A 2021 report by <a href=\"https:\/\/www.bluejeans.com\/resources\/analyst-report\/embracing-the-hybrid-workplace\" target=\"_blank\" rel=\"noreferrer noopener\">Frost and Sullivan<\/a> found that only 4% of companies plan to discontinue remote work in the future.<\/p><p>Interestingly though, companies are continuing to invest in their physical workspaces \u2013 <em>more than ever<\/em>.<\/p><p>Access control solutions, for instance, are becoming an integral part of organisations\u2019 security efforts. An<a href=\"https:\/\/torus-technology.com\/wp-content\/uploads\/2022\/08\/Brivo-trends-report-2022.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"> ASIS and Brivo survey <\/a>found that 65% of respondents said access control has been \u201cvery important or extremely important\u201d in enabling hybrid work.<\/p><p>Upgraded access control came in at the second-most common tech investment. Visitor management systems came in at number one.<\/p><p>The cloud is the key player, here. Unlike on-premise solutions, cloud-based PropTech and security solutions allow companies to operate more efficiently and more securely <em>without<\/em> the need to be onsite.<\/p><h2 class=\"wp-block-heading\">Technology begets technology<\/h2><p>At USD $9 billion in 2019, the global PropTech market was already expanding <a href=\"https:\/\/gcaglobal.com\/market-insights\/market-update-proptech-2019-year-end-review\/\" target=\"_blank\" rel=\"noreferrer noopener\">before the pandemic<\/a>. Lockdowns and remote work only <em>necessitated<\/em> immediate adoption that might otherwise have taken years.<\/p><p>This growth is predicted to <a href=\"https:\/\/www.globenewswire.com\/en\/news-release\/2022\/06\/03\/2456096\/0\/en\/PropTech-Market-Size-is-predicted-to-be-valued-at-US-86-5-Billion-by-2032-Future-Market-Insights-Inc.html\" target=\"_blank\" rel=\"noreferrer noopener\">drive the global PropTech market<\/a> from USD $18.2 billion in 2022 to USD $86.5 billion by 2032.<\/p><p>Now that people are using these technologies, they\u2019re beginning to <em>understand<\/em> them more deeply. That\u2019s leading to further adoption of solutions that integrate with their new or upgraded technology.<\/p><p>Access control and remote video monitoring, for example, are a logical pairing. Improved surveillance and CCTV adds another layer to an organisation\u2019s access control. When the two are integrated, they create a foolproof system.<\/p><p>As people delve deeper into the world of security tech, they\u2019re likely to discover the full breadth of solutions available. For that reason, this knock-on effect is likely to continue.<\/p><h2 class=\"wp-block-heading\">AI does what humans can\u2019t<\/h2><p>There is one major obstacle to this rapid progress: humans have limitations, and we\u2019re still the ones managing and responding to this new technology.<\/p><p>Surveillance illustrates the dilemma well: cameras offer round-the-clock visibility, but it\u2019s <em>people<\/em> who respond to unusual activity.<\/p><p>Cumberland County Schools in North Carolina, for instance, has cameras installed in every one of its 96 buildings. With 88 schools and 50,000 students, that\u2019s an awful lot of activity for security staff to watch. (Kevin Coleman, Cumberland County\u2019s Executive Director of Technology, explains more in <a href=\"https:\/\/torus-technology.com\/us\/security-tv\/episode-1\/?wchannelid=c7revve12u&amp;wmediaid=sohqzwuahy\" target=\"_blank\" rel=\"noreferrer noopener\">this episode of SecurityTV.<\/a>)<\/p><p>Anthony Hackett, Director of Smart Cities and Security, <a href=\"https:\/\/torus-technology.com\/us\/security-tv\/episode-1\/?wchannelid=c7revve12u&amp;wmediaid=17z8f5ggf7\" target=\"_blank\" rel=\"noreferrer noopener\">tells SecurityTV<\/a>, \u201cNobody can observe all the cameras in a school or retail store, all day, every day. It\u2019s physically impossible. So you have to rely on smarter systems to deliver data that you think is relevant.\u201d<\/p><p>Enter artificial intelligence (AI).<\/p><p>AI is significantly more accurate than humans when it comes to detecting unusual activity. It can learn the specific \u201crules\u201d of an organisation (like \u2018no one is allowed in this room after 5pm\u2019) and respond when they\u2019re broken. If it detects anything in CCTV footage, it will immediately alert staff.<\/p><p>That\u2019s just one reason AI is becoming a critical security ally.<\/p><p>The perfect time to adapt<\/p><p>This is a golden age for security technology. The pandemic necessitated a fast and dramatic adaptation to new systems, processes and solutions \u2013 and technology has enabled it.<\/p><p>As we continue to move forward, innovation will only intensify. At Torus, we\u2019re excited to be a part of this growing movement towards smarter security technology.<\/p><p><strong>Want to incorporate key control into your security strategy? Torus key cabinets integrate seamlessly with your existing access control solution.<\/strong><a id=\"_msocom_1\"><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>After COVID-19 emerged and we were ushered indoors, people and workplaces had to rapidly adapt. Luckily, we didn\u2019t have to do it alone. Technology became&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1876,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1870","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Rise of Security Tech Adoption &amp; Future Trends | Torus<\/title>\n<meta name=\"description\" content=\"Uncover the driving forces behind rapid security tech adoption and explore what the future holds for digital security solutions. Insights by Torus Technology.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/torus-technology.com\/the-rapid-rise-of-security-tech-adoption-and-what-the-future-holds\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Rise of Security Tech Adoption &amp; Future Trends | Torus\" \/>\n<meta property=\"og:description\" content=\"Uncover the driving forces behind rapid security tech adoption and explore what the future holds for digital security solutions. Insights by Torus Technology.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/torus-technology.com\/the-rapid-rise-of-security-tech-adoption-and-what-the-future-holds\/\" \/>\n<meta property=\"og:site_name\" content=\"Torus\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-16T10:31:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-19T06:07:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/torus-technology.com\/wp-content\/uploads\/2022\/08\/Tech.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"676\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"trent.loebel@cictechnology.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"trent.loebel@cictechnology.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Rise of Security Tech Adoption & Future Trends | Torus","description":"Uncover the driving forces behind rapid security tech adoption and explore what the future holds for digital security solutions. Insights by Torus Technology.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/torus-technology.com\/the-rapid-rise-of-security-tech-adoption-and-what-the-future-holds\/","og_locale":"en_US","og_type":"article","og_title":"The Rise of Security Tech Adoption & Future Trends | Torus","og_description":"Uncover the driving forces behind rapid security tech adoption and explore what the future holds for digital security solutions. Insights by Torus Technology.","og_url":"https:\/\/torus-technology.com\/the-rapid-rise-of-security-tech-adoption-and-what-the-future-holds\/","og_site_name":"Torus","article_published_time":"2022-08-16T10:31:28+00:00","article_modified_time":"2025-08-19T06:07:04+00:00","og_image":[{"width":1366,"height":676,"url":"https:\/\/torus-technology.com\/wp-content\/uploads\/2022\/08\/Tech.jpg","type":"image\/jpeg"}],"author":"trent.loebel@cictechnology.com","twitter_card":"summary_large_image","twitter_misc":{"Written by":"trent.loebel@cictechnology.com","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/torus-technology.com\/the-rapid-rise-of-security-tech-adoption-and-what-the-future-holds\/","url":"https:\/\/torus-technology.com\/the-rapid-rise-of-security-tech-adoption-and-what-the-future-holds\/","name":"The Rise of Security Tech Adoption & Future Trends | Torus","isPartOf":{"@id":"https:\/\/torus-technology.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/torus-technology.com\/the-rapid-rise-of-security-tech-adoption-and-what-the-future-holds\/#primaryimage"},"image":{"@id":"https:\/\/torus-technology.com\/the-rapid-rise-of-security-tech-adoption-and-what-the-future-holds\/#primaryimage"},"thumbnailUrl":"https:\/\/torus-technology.com\/beta\/wp-content\/uploads\/2022\/08\/Tech.jpg","datePublished":"2022-08-16T10:31:28+00:00","dateModified":"2025-08-19T06:07:04+00:00","author":{"@id":"https:\/\/torus-technology.com\/#\/schema\/person\/d1e94865231f21fe2289e6c6c3c7e4d2"},"description":"Uncover the driving forces behind rapid security tech adoption and explore what the future holds for digital security solutions. Insights by Torus Technology.","breadcrumb":{"@id":"https:\/\/torus-technology.com\/the-rapid-rise-of-security-tech-adoption-and-what-the-future-holds\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/torus-technology.com\/the-rapid-rise-of-security-tech-adoption-and-what-the-future-holds\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/torus-technology.com\/the-rapid-rise-of-security-tech-adoption-and-what-the-future-holds\/#primaryimage","url":"https:\/\/torus-technology.com\/beta\/wp-content\/uploads\/2022\/08\/Tech.jpg","contentUrl":"https:\/\/torus-technology.com\/beta\/wp-content\/uploads\/2022\/08\/Tech.jpg","width":1366,"height":676},{"@type":"BreadcrumbList","@id":"https:\/\/torus-technology.com\/the-rapid-rise-of-security-tech-adoption-and-what-the-future-holds\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/torus-technology.com\/"},{"@type":"ListItem","position":2,"name":"The rapid rise of security-tech adoption \u2013 and what the future holds"}]},{"@type":"WebSite","@id":"https:\/\/torus-technology.com\/#website","url":"https:\/\/torus-technology.com\/","name":"Torus","description":"Securely manage keys, cards and tags","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/torus-technology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/torus-technology.com\/#\/schema\/person\/d1e94865231f21fe2289e6c6c3c7e4d2","name":"trent.loebel@cictechnology.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/torus-technology.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/752e96cb12e29efb75bff70600acf2afbe77e1b3ed15132454f1576112ad7c4d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/752e96cb12e29efb75bff70600acf2afbe77e1b3ed15132454f1576112ad7c4d?s=96&d=mm&r=g","caption":"trent.loebel@cictechnology.com"},"url":"https:\/\/torus-technology.com\/beta\/author\/trent-loebelcictechnology-com\/"}]}},"_links":{"self":[{"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/posts\/1870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/comments?post=1870"}],"version-history":[{"count":4,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/posts\/1870\/revisions"}],"predecessor-version":[{"id":5459,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/posts\/1870\/revisions\/5459"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/media\/1876"}],"wp:attachment":[{"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/media?parent=1870"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/categories?post=1870"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/torus-technology.com\/beta\/wp-json\/wp\/v2\/tags?post=1870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}