A New State of Security
Key findings from the 2025 SOPS
BY MATTHEW FABIAN
Genetec™ recently published its 2025 State of Physical Security (SOPS) report based on input from more than 5,600 security industry professionals. As facility managers grow collaborations with security teams to protect their organizations, several key findings from the report give significant insight into how these teams conduct security operations and a look at potential future trends.
Throughout the report, organizations offered a glimpse of how facility and security teams are maximizing their investments to improve security, efficiency and collaboration.
Hybrid-cloud adoption gaining traction
According to the SOPS report, 43 percent of end users envision hybrid deployments as their preferred approach within the next five years. This is compared to just 18 percent favoring fully cloud-based implementations. Only 17 percent planning to remain fully on-premises. This data reflects the rising demand for adaptable deployment models and highlights a measured approach to cloud adoption as the industry matures.
An open, hybrid deployment allows businesses to make technology investment decisions based on their needs and move to the cloud at their own pace. They can adopt cloud solutions at their facilities or sites where it makes sense and keep other activities on-premises.
For example, archiving directly to the cloud is a great option for some organizations. However, depending on the amount of data to transfer and the quality and stability of the internet connection, this might not be a practical choice for others.
Access control is always at least partially on-premises because of the locking and unlocking hardware. While these decisions are made close to the door, the data can synchronize in the cloud for analysis, audits, or to dynamically adjust cardholder rules and permissions.
Cloud-managed appliances are also key for organizations that want to bring their existing hardware to the cloud. They will save time on deploying systems and save on the costs of changing non-compatible cameras or access control hardware – making the transition to the cloud easier.
No matter how many systems are running on local devices or connected to the cloud, organizations can bring them all back to a central headend. This allows them to streamline monitoring, response and maintenance tasks across their operations to boost efficiency. To the user, it is a seamless experience.
1.
Privacy & data governance
Do the datasets respect relevant data protection regulations? Does the solution treat datasets with the utmost care and keep data protection and privacy top of mind?
2.
Trustworthiness & safety
When using AI models, always think about how to minimize bias. Ensure the AI models are rigorously tested and the accuracy is continuously improved. Finally, when AI algorithms deliver an outcome, FMs should be able to see exactly how it reached that conclusion.
3.
Keep humans in the loop
AI models cannot make critical decisions on their own. A human should always be in the loop and have the final say. In a physical security context, prioritizing human-centric decision-making is critical. Machines simply do not grasp the intricacies of real-life events like a security operator. Relying solely on statistical models is not the answer.
Organizations are prioritizing data privacy & regulation compliance
As cybersecurity threats and regulatory requirements grow, compliance has become a primary concern for security leaders. According to recent data, the cost of a data breach reached a record high in 2024, underscoring the need for robust compliance measures. Key regulations like GDPR, NIS2 and HIPAA are shaping how organizations approach data protection, especially as more security systems rely on interconnected networks and cloud storage.
In 2025, organizations are strengthening cyber hygiene practices, improving data encryption and aligning with international and industry-specific regulatory requirements. This commitment extends to partnering with vendors who have technical knowledge and resources to ensure compliance across various security systems. Organizations subject to stringent regulations are not only prioritizing data protection but also investing in compliance-focused solutions to avoid penalties and protect their reputations.
When deploying new systems, security teams should choose ones with built-in data protection and privacy tools. Look for systems that have the latest certification such as SOC 2 Type II, ISO 27001 and ISO/IEC 27017. Cloud and hybrid-cloud solutions can also be helpful since upgrades and fixes are automatically pushed to the physical security system — including new cybersecurity and privacy features.
Cross-departmental collaboration is increasing between security, IT teams & others
A decade ago, personnel in specialized security departments managed the physical security systems at large organizations. However, the increasing adoption of cloud solutions, the rise in cybersecurity threats and the need to align physical and digital security have led IT teams to take an increasingly prominent role. They now have a stronger influence on the acquisition and deployment of physical security systems.
According to the report, 77 percent of end users say physical security and information technology (IT) departments now work collaboratively. Also, IT departments are taking on an increasing role in the buying process, with over 50 percent of end users, systems integrators and consultants reporting that IT teams are actively involved in physical security purchasing decisions.
Collaboration between other departments is also becoming essential for effective security management. Organizations are implementing workforce optimization tools that empower team members across departments to take a more active role in security tasks, streamline workflows and eliminate bottlenecks.
By equipping departments with greater information and autonomy, organizations can further reduce stress for security teams and improve operational efficiency. With these solutions, team members — regardless of their role or location — can take greater initiative in completing tasks, boosting productivity and overall organizational output.
Stakeholders are demanding more from service providers
Choosing physical security solutions is no longer solely the responsibility of security professionals. IT teams, security operations and facility management teams are increasingly involved in decision-making processes. This shift means that end users are expecting more from service providers, including channel partners, consultants and technology vendors.
One of the primary advantages of collaborating with a partner is their depth of local knowledge. They have experience navigating regulatory frameworks, industry standards and regional nuances. After all, they are the ones who are in the field dealing with various challenges and who find solutions to optimize security systems within the environment.
When new technology and innovations emerge, such as software as a service (SaaS) solutions, systems integrators serve as helpful guides, offering recommendations on how to benefit in different industries and regions. Having insights into the particularities of varying deployment types means that systems integrators can help smooth transitions and ensure organizations receive the greatest possible value from their investments.
Look for providers who demonstrate a comprehensive understanding of cybersecurity, operational efficiency and data governance. They should also be able to offer cohesive guidance that addresses unique needs.
As organizations continue to prioritize security and digital transformation, the role of systems integrators only becomes more critical in maximizing security potential and enabling organizational success. With trusted partners, FMs can concentrate on core responsibilities and business strengths while allowing security experts to support the system’s capabilities.