1. An Expo
On November 1, 2019, the four-day 15th China International Public Safety Expo officially closed at the Shenzhen Convention and Exhibition Center. With the theme of “Opening a New Era of Smart Security”, Shenzhen Security Expo 2019 is the world’s first security exhibition. Thousands of security companies participated in the exhibition, attracting nearly 300,000 professionals from more than 150 countries and regions around the world. Visit the site for purchases. A gathering of tycoons and a fascinating gathering, many core products, advanced technologies and solutions were unveiled one by one at the exhibition, allowing the audience to feast their eyes and linger. The 2019 Shenzhen Security Expo has become a showcase for the latest security technologies and products in China and even the world, and continues to lead the future development direction of the industry.
2. Internet +
During the National Two Sessions this year, Premier Li Keqiang first proposed the formulation of the “Internet +” action plan in the government work report, and the concept and model of “Internet +” became popular in all walks of life. “Internet +” is not simply the addition of the Internet and traditional industries, but a form of transformation of traditional industries’ business models through the Internet.
In 2019 when the whole people are talking about “Internet +”, the security industry is naturally not far behind. The combination of “Internet +” in the security field is in various forms. Internet + security technology promotes the trend of IP, Internet + operation mode subverts sales concepts, etc. The integration of the Internet and the security industry can turn corruption into magic, and the subversive nature of the Internet It is almost impossible to measure with actual numbers. However, it is also necessary to clearly realize that “Internet+” is not a master key. If the company’s internal skills are not well practiced, the direction is uncertain, and easy “Internet+” will only accelerate the company’s demise.
3. Cross-border integration
Enterprise diversification and integration seems to be becoming a norm nowadays. In the IT field, cross-border integration is nothing new, and BAT’s tentacles have reached the smart home field early. Baidu and Zhongshi Jijiji launched the Xiaodu i Ear-Mu Cloud Camera, Alibaba and KDS launched the cloud security smart lock, Tencent Cloud and Anqi launched the smart surveillance technology cloud service… The cross-border integration of the Internet and security is a lively scene.
Why is there such a high level of enthusiasm for the IT communication field to enter the security industry? The increasing global emphasis on security is an important reason. Some organizations predict that in 2019, the scale of my country’s security industry will be close to 500 billion, ranking the forefront of the world, so vast The market prospects have prompted other industry giants to grab a share of the market. On the other hand, the internal competition in the security industry has intensified. Giants are still leading and beginning to build their own security ecosystem, while small and medium-sized enterprises seek cross-border integration with other fields to obtain a broader living space.
4. New OTC
The New Third Board refers to a national equity trading platform for non-listed joint stock companies mainly for small, medium and micro enterprises. On November 24, 2019, the National SME Share Transfer System Co., Ltd. drafted the “National Equity Transfer System Listed Companies Stratification Plan (Draft for Solicitation of Comments)” to solicit public opinions. The overall idea of the scheme design is “multi-level, step-by-step”. In the initial stage, the listed company is divided into a basic layer and an innovation layer. With the continuous development and maturity of the new third board market, the relevant levels will be optimized and adjusted. The solicitation of opinions on the proposal ended on December 8.
One of the biggest contributions of the New Third Board is to introduce strategic investors and intermediaries to help companies reorganize the value structure of the industry chain, re-examine the value scale of the industry in which the company is located, and capture new growth opportunities. As the dividends of the tiered system, the delisting system and the transfer mechanism were included in the regulatory construction plan in November, the confidence of market participants in the new third board market has been strengthened, and the willingness of small and medium-sized enterprises to list on the new third board has greatly increased. More security companies will be listed on the NEEQ. In 2019, the number of security companies listed on the New Third Board will exceed 80.
5. Cloud technology
Cloud technology and big data are the only way in the digital information age of the security industry. With the rapid development of information technology today, cloud technology has become a trend, which is a typical means of highly integrated and reused resources. With the popularization of high-definition technology, high-definition video data can easily reach several gigabytes to dozens of gigabytes of files, which puts forward higher requirements on the capacity, read-write performance, reliability, and scalability of storage devices. The most direct benefit of cloud storage It is the large memory capacity that can store more video data. In some respects, the large memory capacity promotes the high-definition of surveillance pictures. Cloud storage brings more possibilities for the future security industry, and the enthusiasm of cloud storage will continue. combustion.
For the security industry, big data is the direction that many security personnel have been working hard, especially in safe cities, intelligent traffic management, environmental protection, hazardous chemical transportation monitoring, food safety monitoring, and government agencies, large enterprise workplaces, etc. The equipment system connected to the network will be the largest data resource. Specific implementation can also integrate video surveillance, access control, RFID radio frequency identification, intrusion alarm, fire alarm, SMS alarm, GPS satellite positioning and other technologies through the “cloud” through cluster applications, grid technology, distributed file system and other functions. Work collaboratively, conduct information exchange and communication, and complete the security management of intelligent identification, positioning, tracking and monitoring. The cloud storage, cloud computing, big data, and cloud parking currently used are all manifestations of specific cloud security applications.
6. Acquisitions and mergers
In the first half of 2019 alone, more than a dozen security companies have implemented M&A plans in the industry, including: Jieshun Technology’s acquisition of Gordon Technology, Dongfang Netpower’s acquisition of Zhongmeng Technology, Huaqi Intelligent and Jiaqi Intelligent, and Zhongyingxin’s acquisition of Star Yuanjiye, etc., under the enthusiasm of the Internet of Things, big data, and smart cities, mergers and acquisitions in the security industry are heating up again, with overseas expanders and domestic layouts also.
Although news of M&A and reorganization of security companies frequently hits, mergers and acquisitions also represent numerous risks: whether financing funds can be in place in time, whether the asset evaluation of the merger is accurate, post-merger operations, and the placement of employees of the merged company , Often becomes the key to the success of corporate mergers and acquisitions.
Collection, transmission, display, and storage in the surveillance field have always been the most important components in the security industry chain, and the surveillance field has a long history of requirements for clarity. In 2019, 4K and H.265 have become more mature. Since 4K technology has been put into LCD TV screens very early, the ultra-high pixels have long been biased towards the ultra-high pixels of multi-lens stitching and the 12 million pixels of fisheye. For H.265, Hikvision’s SMART 265 is the most eye-catching performance; while ZTE Liwei, which has implemented similar technology as early as 2013, has calmed down a lot in H.265.
It is worth noting that HiSilicon’s overall upgrade of the H.265 chip performance, such as starlight, wide dynamic, ultra-low bit rate, ultra-high pixel processing and other technologies; as 4K and H.265 chip technology mature, the original large The brand’s advantages in the H.265 and 4K field by relying on its advancement and strong R&D capabilities will be broken with the arrival of this wave of chips. It is foreseeable that the 4K and H.265 situation in 2020 will be ” With the chip in hand, you have me and I have it”, and the technological accumulation advantages of mainstream brands have weakened.
It is undeniable that the prosperity of the security market has declined, but this does not prevent security intelligence from becoming one of the hottest topics in the industry. It can be seen from the application of security technology in intelligent transportation and safe cities that security intelligence has not only improved The benefits of users will gradually raise the barriers to entry for the security industry. At the same time, it is gradually expanding in subdivision fields such as vehicle detection, face detection, and people flow statistics, which is not too strong.
“Smart Security”, which has been in the concept stage a few years ago, has been implemented and applied on a large scale in 2019. In the field of security and intelligent defense, the application of “intelligent video analysis” technology is represented. In order for security applications to handle things more automatically and intelligently, the security system’s post-verification tool becomes a pre-warning weapon. The “intelligent video analysis” technology is the most outstanding in the “machine recognition” of Kodak, the ultra-sensing IPC2.0 of Univision, and the intelligent security 2.0 of Hikvision.
The competition in the security industry has long been not limited to the competition in brand, price and technology, but more and more is reflected in the competition of channels and terminals. From brand winning to channel competition, the result of the transformation of the form of competition has been significantly magnified in the terminal market, especially in the context of serious homogeneity of security products, lack of strong brands and core technologies, and the importance of channels is particularly prominent. Looking at the madness of Double Eleven and Double Twelve online, the security industry is equally greedy. However, because security equipment often has a certain degree of professionalism and has certain requirements for installation, debugging and post-service, the road to e-commerce for security in the past was not so smooth.
Compared with B2C and C2C, the core of the O2O model is very simple, which is to bring online consumers to real stores. Pay online to buy offline goods and services, and then go online to enjoy services. Take, for example, one of the more popular O2O same-city shopping. After placing the order online, it will be delivered within three hours. Buyers can also select the actual comparison online, locate their favorite products, and directly locate the offline physical store. In this way, the original purchase of an unknown package, the invisible product has been actually completed, has evolved into a visible and touchable product before the transaction. And later service is also guaranteed. The core of the O2O marketing model is online prepayment. Online payment is not only the completion of the payment itself, but also the only sign that a certain consumption can finally be formed, and it is the only reliable assessment standard for consumption data. Obviously, it is more suitable for security.
10. Home Security
If 2019 is the first year of the development of home security, then 2020 is a crucial year for the development of home security. Hikvision, a leading company in the security industry, is the first in the industry to launch a full-featured home security product C1 and supporting services: cloud video platform “Video 7″ website, mobile terminal APP compatible with IOS and Android systems. In addition, the traditional home appliance predator Haier launched U-HOME based on the “smart home” series of products, and the first domestic computer brand Lenovo launched the “cloud video”, and the new product “Housekeeping Bao”, which was the first cloud storage service in the country, was launched. , Users can watch home videos at any time through mobile terminals such as mobile phones and PAD.
It is worth noting that whether it is the smart home products of security manufacturers or the consumer cameras made by Internet companies, they all hope to use home security products to open up the ecological chain of the smart home market. Although for now, the characteristics of the consumer market determine that surveillance products are not a must for people’s lives, and the functions of the products do not have popular elements. There is a consensus that everyone has reached a consensus that home security equipment, such as smart cameras and biometrics, are the “golden keys” to access family life data in the Internet age, occupying a key entrance, and holding the spoon is still in possession of technology. The initiative is better in the hands.
Post time: Nov-27-2020