Skip to content

A camera is much more than security technology

Loihde-379

Advanced security technology solutions are here. Surveillance cameras no longer simply record—they now serve expanded purposes such as analytics and automation. Regulations like the CER directive are also accelerating the modernization of security technology.

According to Loihde’s Security Solutions Technology Director Pasi Tikkanen, security technology devices are often long‑term—and sometimes major—investments for organizations, so it is of course sensible to utilize them as broadly as possible.

“In the big picture, security technology still monitors, alerts, and helps prevent incidents, but at the same time, for example, camera performance and other capabilities have increased—let alone the possibilities brought by artificial intelligence,” Tikkanen says.

An intelligent camera sensor still ensures safety, but at the same time it also produces valuable data. According to Tikkanen, modern cameras have so much processing power that they enable entirely new types of applications.

“Of course, this also brings some negative side effects—for example, applications running on cameras may be used to launch denial‑of‑service attacks. That’s why cybersecurity is an essential part of modern security technology.”

Harnessing analytics to support operational development is one of the already familiar added benefits. For example, data generated by cameras can help make various calculations or perform recognition.

“For instance, camera surveillance can be configured to detect when a predefined number of people in a certain area is exceeded. The process can be further automated so that if this limit is breached, a direct alert is sent to security staff,” Tikkanen explains.

“The technology already exists”

While traditional tasks remain at the core of security technology, organizations should also take advantage of the additional benefits modern technology offers.

“Technology can help in many processes. It can not only increase safety but also streamline operations and reduce manual work. For example, camera surveillance can automatically summon an additional employee when it detects at least five people standing in a checkout line.”

Counting data can be used not only for similar automated alerts, but also for tasks like shift planning by identifying peak hours.

“Security technology can be used to streamline various processes, make access control smoother, improve reporting, collect data, and support data‑driven decision‑making. The technology already exists—it just needs to be utilized.”

The only real limitations are imagination and legislation, which sets boundaries for areas like facial recognition.

“In the past, systems had to be trained to recognize a specific object or person using tens of thousands of images. Today, integrated AI tools can perform the same task much more automatically,” Tikkanen notes.

CER Accelerates the Modernization of Security Technology

The CER Directive (Critical Entities Resilience Directive) applies to the same critical societal sectors as the NIS2 cybersecurity directive. In practice, CER guides organizations to view security as a combination of physical and digital safety and, for example, to make preparedness plans more concrete.

“Customers have clearly become more aware of CER requirements, which is also reflected in requests for proposals. Systems and processes need to meet regulatory standards.”

The CER directive came into force in 2023, and national legislation in Finland will be clarified during 2025. According to Tikkanen, organizations now recognize these requirements more clearly.

“Organizations are increasingly able to view security comprehensively. Even if they sometimes must focus on a specific area of security technology, the chosen solutions must support overall security.”

The tightening of CER requirements is directly reflected in the application of security technology.

“In the future, for example, access to a protected area will require identification and verification of both the vehicle and its occupants, which sets new demands for security technology,” Tikkanen says.

 

Let’s discuss further: