securitylinkindia

Siddharth

What’s Next for the Security Industry in 2026? Key Trends, Plans and Focus Areas

Siddharth DahiyaCEO, Peregrine Guarding As we move into 2026, the security industry is going through a major shift. Earlier, security was mostly seen as guarding buildings, managing entry points, and responding to incidents. Today, the role of security has expanded much beyond that. It is becoming smarter, more technology-driven, and deeply connected to how businesses function. With growing urbanisation, digital operations, and rising expectations around safety, the industry is now focused not just on protection, but on prevention, planning, and continuity. Technology is playing a very important role in this change. Tools like intelligent cameras, remote monitoring systems, and automated alerts are becoming part of everyday security operations. These systems help detect unusual activity early, support faster responses, and reduce dependence on manual processes. Security teams are increasingly working in environments where technology and manpower go hand in hand. The presence of trained professionals on the ground remains essential, but their effectiveness is being strengthened by digital systems that offer real-time visibility and better control. At the same time, the nature of the security workforce is also evolving. The security professional is no longer expected to only patrol or stand at a gate. There is now a much stronger focus on training and upskilling. Personnel are required to handle smart devices, use mobile-based reporting tools, understand basic data, and interact more confidently with clients and employees. This shift is pushing the industry to invest more in continuous learning, structured development programs, and long-term career paths. Another important development is the growth of centralised and remote security operations. Instead of managing everything from individual locations, more organisations are moving towards command centres that monitor multiple sites at once. These centres bring together surveillance, incident management, and response coordination on one platform. This model is becoming far more common, helping businesses improve coverage, strengthen oversight, and respond faster to risks. It also allows on-ground teams to work with better information and support, making security operations more proactive rather than reactive. The way businesses look at security is also changing. Security is no longer being treated only as a cost or a support function. It is increasingly being seen as a critical part of business continuity, infrastructure planning, and risk management. Strong security frameworks help protect assets, ensure employee safety, support compliance, and maintain brand trust. Going forward, security leaders will be more involved in strategic discussions, contributing insights that go beyond day-to-day operations and into long-term planning. With the rise of digital systems, data is becoming a central part of security management. Access records, visitor information, camera analytics, and incident logs are now key decision-making tools. This makes data protection, transparency, and regulatory compliance extremely important. Organisations will place greater focus on building secure data practices, reliable reporting structures, and audit-ready processes. Trust, accountability, and responsible handling of information will become just as important as physical safety. Equally important is the growing attention on the people behind security services. The industry is recognising that a motivated and supported workforce is the foundation of strong security. Better healthcare support, mental well-being initiatives, stable working conditions, and timely recognition are becoming more central to workforce strategies. When security personnel feel valued and secure themselves, the quality of service improves naturally. This people-first approach will play a major role in shaping the industry’s future. Looking ahead, the security industry will be defined by its ability to adapt. The future belongs to organisations that can combine trained manpower, smart technology, and responsible practices into one integrated system. Security will no longer be limited to protection alone. It will stand for preparedness, resilience, and confidence in a fast-changing world.

Read More

Hikrobot Offers Bespoke Automotive Sector Solutions to Spur Growth and Productivity

Hikrobot provides safe, reliable mobile robot solutions to improve logistics efficiency and reduce labor costs. The system is applicable to scenarios including pressing, welding and assembling in main engine plants. With the software platform, the integrated solution enables production data flow, agile manufacturing and lean management. Challenges Automotive Sector Faces Solution Overview By introducing robots (including LMR and FMR), workers and components are separated in the entire process. Robots transfer components from platforms to production line automatically. RCS and iWMS are upgraded to match industry features, and support different operation modes including production cycle, call button and PDA etc. This solution reduces the risk of production interruption caused by improper manual operation, and helps to maximize the performance of JIT mode. Solution Components LMR Hikrobot’s Latent Mobile Robot (LMR) is a game-changer for environments where space is limited. Its unique design allows it to slide underneath shelves, pallets, and other carriers, lift them, and transport them with ease. This eliminates the need for bulky lifting equipment and opens up valuable floor space. Hikrobot’s LMR is part of their comprehensive portfolio of Autonomous Mobile Robots (AMRs), designed to optimize operations, reduce costs, and improve safety. Key Features: FMR Hikrobot’s Forklift Mobile Robot (FMR) is very important component for warehouse automation! These robots are designed to handle standard bins and pallets with ease, using advanced laser SLAM navigation and vision technology for precise movement and obstacle avoidance. Key Features: Popular Models: Hikrobot’s FMR series is designed to streamline your logistics and material handling processes, improving productivity and safety. CMR Hikrobot’s CMR (Conveyor/Heavy-duty Mobile Robot) solutions for the automotive sector are designed to boost logistic efficiency and curb labor costs. These robots handle tasks like material transferring, assembly, and welding in main engine plants, creating an operational ecosystem where production data flows freely. Key Features: Industry Benefits: Hikrobot’s CMR solutions are part of their broader IIoT, smart logistics, and smart manufacturing offerings. RCS 2000 Hikrobot’s RCS 2000 Robot Control System is tailored for the automotive sector, enhancing automation and efficiency. Key Features: Automotive Use Cases: Benefits: Hikrobot’s RCS 2000 combines robotics with smart logistics, ideal for smart factories. Solution Advantages Background The Foshan plant is FAW-Volkswagen’s 4th plant in China, which covers approximately 1.66 million m2. Currently it is the production base of FAW-Volkswagen with the most models on the same production line. During peak period, 2,400 cars are produced per day, involving tens of thousands of components. To handle complex picking tasks and improve efficiency and accuracy, the mobile robots solution was introduced. Solution The intelligent logistics system adopted at the Foshan plant is complicated, which integrated FAW-Volkswagen’s FIS and PLP, Hikrobot’s RCS and iWMS, along with 47 LMRs. It is the first “Supermarket 2.0” solution in the automobile industry, that made factory-level collaborative intelligent logistics system a reality. Customer Benefit Read More

Read More

ICISSM and TPCGSI Sign MoU to Jointly Organise SwaRaksha Mahotsav 2026

The International Council for Industrial Security, Safety & Management (ICISSM) and the Trade Promotion Council for Geospatial & Space Industry (TPCGSI) signed a Memorandum of Understanding (MoU) on 15 January 2026 to collaborate on the organisation of SwaRaksha Mahotsav 2026 – a global summit, exhibition and awards platform. SwaRaksha Mahotsav 2026 is scheduled to be held on 21-22 May 2026 at Vigyan Bhawan, Ahmedabad, Gujarat, and will focus on: The MoU was signed by Col. (Retd.) D. R. Semwal, Patron, ICISSM, and Sanjay Singh (Adv.), Director General, TPCGSI. The agreement broadly defines the areas of engagement and partnership between the two organisations for the successful organisation of SwaRaksha Mahotsav 2026. ICISSM is a purely non-commercial, apolitical and independent professional forum, operating without support from business groups or corporate sponsorships. The Council is founded on the principles of mutual knowledge sharing, professional growth and meaningful networking. It does not represent any pressure group or vested interest and brings together a strong network of senior security, safety and risk management professionals from industry, government, PSUs, infrastructure and critical installations, with deep expertise in industrial security, safety governance, crisis management and resilience planning. TPCGSI serves as the voice of industry, representing the interests of the Aerospace & Defence, Geospatial & Space, Marine, Unmanned Technologies and Homeland Security sectors in India. The Council works actively towards the advancement of these technologies and their applications through policy advocacy and sustained engagement with government and other stakeholders. ICISSM is a purely non-commercial, apolitical and independent professional forum, operating without support from business groups or corporate sponsorships. The Council is founded on the principles of mutual knowledge sharing, professional growth and meaningful networking. It does not represent any pressure group or vested interest and brings together a strong network of senior security, safety and risk management professionals from industry, government, PSUs, infrastructure and critical installations, with deep expertise in industrial security, safety governance, crisis management and resilience planning. The primary objective of this MoU is to foster a strategic partnership for strengthening India’s security ecosystem, while ensuring that government, industry, academia and society at large develop a deeper understanding of the evolving needs of these sectors and their contribution to the nation’s economic growth and development. Both organisations firmly believe that technology is a key driver of economic progress, and that consistent policy advocacy has helped establish a strong and effective industry voice within government corridors. Through this collaboration, ICISSM’s domain expertise and professional strength will add significant value to SwaRaksha Mahotsav, positioning it as India’s largest global platform for Aerospace & Defence, Industrial & Homeland Security, Safety, Geospatial, Space, Unmanned Technologies, Cyber Security and Marine Systems. Together, ICISSM and TPCGSI aim to foster meaningful engagement between government, armed forces, industry leaders, academia, startups and global experts, while strengthening India’s leadership in strategic and emerging technologies critical to national security and resilience. Read More

Read More

Protection Against Harm to Elections in all fairness

Co-author Introduction Our country’s election is a civilizational, cultural and even festive time where over a billion people come together in a shared national act. It is that crucial time when the Constitution places complete power in the hands of every adult citizen, regardless of wealth, status, caste, religion, or social privilege. As the Election Commission of India has often described in its post-election reports, the general elections are ‘the most diverse expression of popular will in human history.’ The sheer magnitude of the exercise is staggering, over 912 million voters1 thousands of political candidates, millions of polling personnel, and polling stations in terrain as remote as the Siachen base camp and the Sundarbans. In India, the right to vote is a statutory right, and elections are governed by Article 326 of the Indian Constitution, which establishes universal adult suffrage, allowing every citizen aged 18 or above to vote, subject to the qualifications prescribed by law. The detailed provisions relating to registration of voters, conduct of elections and disqualifications are laid down in the Representation of the People Act, 1950 and 1951, as the exercise of the right to elect depends entirely on statutory provisions. The Hon’ble Supreme Court of India has consistently held that the right to vote is not a Fundamental Right, but a right created by the Constitution and regulated by Parliament. The freedom to free and fair elections and express choice is protected under Article 19(1)(a) as part of freedom of speech and expression, a fundamental right. The Hon’ble Supreme Court held in the case of Jyoti Basu v Debi Ghoshal, 1982, that “the right to elect, fundamental though it is to democracy, is anomalously enough neither a fundamental right nor a common law right. It is pure and simple a statutory right.” Yet the vast and intricate mechanism of ‘election’ is fragile. Elections are susceptible to disruption, manipulation, distortion, or corruption through various means, including digital deception, psychological warfare, misinformation campaigns, and foreign influence. The Hon’ble Supreme Court held in Indira Gandhi v. Raj Narain (1975),2 “Democracy is meaningful only if elections are free and fair.” This principle was elevated to the level of the Basic Structure of the Constitution, meaning no law, no government, and no authority can dilute or compromise this requirement. Chapter IXA, ‘Offences Relating to Elections,’ was not part of the original Indian Penal Code (IPC)1860. It was introduced into the IPC by the Indian Elections Offences and Inquiries Act, 1920. Chapter IXA aimed to codify specific offences related to the electoral process within the main body of Indian criminal law to ensure free and fair elections and protect the free exercise of electoral rights. Before 1920, laws regarding election offenses were likely scattered or less formally defined. The 1920 Act brought these specific offences under one chapter (Sections 171-A to 171-I) of the IPC. The Indian Elections Offences and Inquiries Act, 1920 was enacted to provide punishment for malpractices related to elections and to establish procedures for conducting inquiries into disputed elections to legislative bodies constituted under the Government of India Act. It was passed by the Indian Legislative Council and received the Governor General’s assent on September 14, 1920. The Act extended to the whole of British India and aimed to address corrupt practices such as bribery, undue influence, personation, false statements, and illegal payments during elections. This Act also amended Indian Penal Code by inserting new provisions specifically dealing with election offenses, now found in Chapter IX-A (Sections 171-A to 171-I)3. It empowered authorities to take various actions for investigating election malpractices, including enforcing the attendance of witnesses, compelling document production, examining witnesses under oath, and conducting searches. The Act was significant because it laid down a legal framework for safeguarding the integrity of elections and provided a mechanism to punish electoral offenses systematically. The transition to the Bharatiya Nyaya Sanhita marked a historic shift. Enacted in 2023 and effective from July 1, 2024, the BNS replaced the IPC with a more modern, decolonized code. Electoral offences were consolidated into Chapter IX (Sections 169-177), retaining the core structure of the old provisions while enhancing clarity and penalties.4 These rules are made to keep our elections clean, fair and free from cheating. The law covers actions like giving money for votes, threatening or pressuring voters, using fake identities to cast votes, spreading false information about candidates, breaking spending rules, or misusing power at polling stations. Given this foundational role of elections in India’s constitutional arrangement, it becomes essential to understand what harms elections, how such harm has evolved, and how Indian law has tried, and often struggled, to keep pace with the changing nature of these threats. This article attempts to explore the journey in depth, through a detailed legal, social and national security analysis, it evaluates what ‘harm to elections’ truly means in today’s India; how past laws, particularly the colonial-era IPC, tried to address these harms; how the BNS modifies and modernizes the framework; and what gaps, challenges and opportunities remain. Background to offences related to elections under ipc The concept of offenses against elections in India traces back to the colonial era, when the British administration sought to regulate electoral conduct to maintain order in a nascent representative system. The Indian Penal Code of 1860 (IPC), enacted under British rule, laid the foundational legal framework by criminalizing acts like bribery (Section 171B), undue influence (Section 171C), and personation at elections (Section 171D), which were seen as direct threats to fair polling. These provisions were influenced by English common law and aimed at preventing corruption in limited franchise elections during the Raj. Post-independence, with the adoption of universal adult suffrage in 1950, election offenses evolved amid growing political competition. The Representation of the People Act (RPA), 1951, expanded on IPC by defining corrupt practices such as booth capturing, intimidation, and electoral fraud, making them punishable to ensure free and fair elections. The 1970s marked a dark chapter with the Emergency (1975-1977), when criminals began entering politics…

Read More

Building the Green Factory : How Smart Manufacturing Creates a Sustainable Future

The industrial sector is at a crossroads. As the engine of the global economy, it consumes 37% of global energy while facing tightening carbon regulations worldwide. Manufacturers must now contend with unstable energy costs, resource scarcity, and the urgent call for climate action. The pressure is no longer just to produce more, but to produce smarter, cleaner, and with true sustainability. The Hidden Cost of Traditional Operations For decades, factory operations were highly inefficient, struggling to fix problems only after they occurred. The old ‘run-it-till-it-breaks’ model created ‘energy black holes’ that drained resources and profits, placing a heavy burden on the environment. Equipment is typically maintained only after failure, causing severe downtime, but the real cost comes earlier. Consider an unmonitored motor running slightly above specification or an oven with undetected heat loss; these act as a constant energy drain and silently increase the carbon footprint. This reactive approach extends to infrastructure. Vast production floors keep lights and HVAC running around the clock for human workers – often the largest source of ‘non-production’ energy waste. Older systems lack visibility into these invisible inefficiencies, from air compression leaks, which alone can waste 20-30% of the energy output, to electrical cabinet overheating. Manufacturers remain blind to major cost-saving and sustainable transformation opportunities. In this data vacuum, the balance sheet and biosphere suffer. The Intelligent Pivot: From Blind Spots to Precision Power The future of manufacturing relies on intelligent technology to shift away from costly, reactive operations toward high-precision, proactive green practices. This transformation embeds AI and advanced sensing to optimize power use, eliminate waste, and minimize carbon footprints. Central to this shift is innovative equipment optimization. Low-power robotics, motors, and systems are managed by intelligent algorithms that dynamically adjust operations to match demand with minimal power use. AI-enhanced thermal monitoring provides 24/7 oversight, detecting signatures of inefficiency or failure to enable predictive maintenance and targeted green upgrades. Equally transformative is smart logistics and the “dark warehouse”. Recognizing that climate-controlled storage drains utilities, facilities now deploy automated guided vehicles and handling platforms that operate perfectly in darkness. This allows massive storage zones to transition to near-zero energy for lighting and climate control, proving productivity and environmental protection can become a unified goal. Technology in Action: Hikvision’s Green Manufacturing Transformation The commitment to smart, sustainable production is not abstract theory – it is integrated into real-world operations. At Hikvision’s manufacturing bases, the company has implemented these AIoT solutions to strengthen its green manufacturing and ESG performance, turning commitments into verifiable, industry-leading practices. For decades, factory operations were highly inefficient, struggling to fix problems only after they occurred. The old ‘run-it-till-it-breaks’ model created ‘energy black holes’ that drained resources and profits, placing a heavy burden on the environment Such a technology-driven initiative has delivered high-impact results: The Green Factory is where business growth meets environmental responsibility. As AI, automation, and thermal solutions become the backbone of sustainable manufacturing, more innovators are moving early to lead the low-carbon shift. Want the practical playbook? Explore our smart manufacturing white paper: how large-scale AI powered video intelligence transforms efficiency and accelerates smart manufacturing. Index: To see how Hikvision integrates green commitments into operations and broader value chain, please read our ESG Reports. [1] The International Energy Agency. (2023). IEA – Industry Energy System Overview [2] Future Market Insights. (2025). Compressed Air Leak Detection Market Report Read More

Read More
LiDAR

“Mission: Possible”–Stopping the heist before it happens with LiDAR

Martin VojtekBusiness Director 3D Surveillance at Hexagon’sSafety, Infrastructure & Geospatial division Seven minutes. That’s how long the recent Louvre heist took. In broad daylight, a group of thieves rode up on a construction platform, smashed display cases, stole several historical jewels tied to the Napoleonic dynasty and escaped on scooters before anyone in the control room even realised what was happening. It sounds like a scene straight out of ‘Mission: Impossible.’ Only this time, Tom Cruise wasn’t there. In movies, we often see tight webs of red laser beams guarding treasures, with the hero gracefully sliding between them. Reality, however, is far less cinematic. Most museums still rely on mechanical sensors, simple infrared barriers, cameras and the most fallible component of all – the human eye. But the human eye doesn’t measure space. A camera records an image, but it doesn’t know that a display case has shifted by three centimeters, or that a visitor’s hand just crossed an invisible boundary. That’s where a new kind of perception comes in – LiDAR. From Hollywood fantasy to real-world security Forget the tangled maze of laser beams you’ve seen in films. A modern 128-channel rotating LiDAR fires hundreds of thousands of laser pulses per rotation – and it does this up to 10 times per second. That’s millions of spatial measurements every second, creating an invisible web of light that maps the scene in 3D, without anyone ever noticing. What LiDAR builds is called a point cloud – a live three-dimensional model of the environment. The system constantly compares this ‘snapshot’ with the current scene. If anything changes – a hand moves closer to an artifact, a case is displaced or an object disappears – LiDAR detects it instantly. When technology sees in 3D LiDAR technology (such as LidarVision, developed by Hexagon), brings true 3D situational awareness into museums and galleries. It doesn’t just see that someone is moving; it knows where, how fast and in what trajectory. Each detected object is tracked with its precise dimensions, velocity and spatial position. If a visitor steps too close to a protected exhibit, the system triggers an alarm. Pan-tilt-zoom (PTZ) cameras automatically turn to the exact spot and start recording. The operator no longer has to stare at dozens of screens, hoping to catch the right moment. LiDAR data also serves as forensic evidence – allowing investigators to replay the incident as a full 3D reconstruction. They can see exactly how intruders moved, from entry to exit, with centimeter precision. Beyond thieves: Everyday situational awareness LiDAR isn’t just a tool against master criminals. It helps with daily operations, too – recognizing when someone lingers suspiciously near a sensitive exhibit, when an unauthorised object enters the room or even when a visitor collapses. The system can trigger a silent alert, notify security staff or automatically redirect nearby cameras. History that never comes back Art theft is not a cinematic rarity – it’s a recurring tragedy. In 1990, 13 paintings worth more than half a billion dollars vanished from Boston’s Isabella Stewart Gardner Museum. None have ever been recovered. Even Leonardo da Vinci’s Mona Lisa was stolen from the Louvre in 1911 – though it was miraculously found two years later. That case, however, remains the exception. Thieves often fail to realise that cultural artifacts are not commodities. When they melt them down for gold or strip them for gems, they don’t just destroy value – they erase history. Spatial understanding is the future of security No security system is flawless. But while cameras merely watch, LiDAR understands space. From a single compact device, it monitors the 3D environment in real time, detects anomalies and reacts immediately. Modern security is no longer about higher fences or better cameras. It’s about spatial understanding – knowing what is happening in the room right now. Read More

Read More
Security

The Coaching Revolution : Redefining Leadership in Physical Security

Major Paul DevassyCEO of IIRIS Knowledge,Vice Chairman of Asis APAC Board I have been a corporate security professional in various organisations spanning different states & types of organisations. The common approach that I had been applying was that of a salesperson. My entire being was being focused on providing a solution to any potential issue that might pop up. The issues would be anything under the sun – I had to give advice on how the elimination of Osama Bin Laden would affect the organisation, what would the affect be the death of a local politician be on operations in a state, the change of regime in the neighbouring country, when would the rains start, what would be the impact of the floods, what would be the affect of a strike in a state, would counting of votes in a general election affect the security situation, what would be the impact of the cyclone on the city. This, and myriads of other issues are thrown at the security fraternity and I over time become hard wired to respond to these queries. I morphed into a lean mean solution giving machine, and soon this permeated into all aspects of my life. This solution giving model was satisfying for me as I felt that I had completed my task & proved my worth. Did it work for the client? Maybe yes – especially while addressing a crisis. I do really think that it assisted in the short term. What about the long term? So, the role of being a solution provider became ingrained into my DNA. Jocularly I used to refer to myself being a living Aqua Regia for any risk focused query. I am sure all risk professionals would also be facing a similar predicament. About 36 months ago on the suggestion of a friend I embarked on the journey of becoming a life coach. Was it disruptive for me and my way of thinking? – Immensely! For starters the foundation of being a coach is too able to listen to empathetically to understand the clients’ challenges and what the client wants. Efficiently use open ended questions, understand what is it that the client wants which would be the contracting phase of the coaching session. Then move at the pace that the client wants to foster a sustainable growth while never be judgemental. All this was contrary to my practice as a corporate security professional. A mentor of mine had in the passing mentioned that we must sell security for our clients to buy security. That made me a proponent of a 24/7 full court press attack mode. It was a major exercise in self-control to override my instincts which had been forged with repetitive actions of being a solution provider. I had to mindfully stop being a salesman of Corporate Risk vertical. Selling as a Salesperson vs. Selling as a Coach A classical salesperson always walks onto the field like a quintessential soccer striker with only one thought in mind. The focus is always on scoring the goal. In the case of salesperson everything that is said and does is always concentrated in securing the sale. They always talk of features & benefits as if they were goods laid out on a stall. Salespersons’ words push & press, like a person leaning on a door until it opens. The measure of success is by the score on the board. The relationship is a trade – coin for goods, nothing more. The guiding question is simple – “How can I make them buy?” Their eyes stay on the short road, the one that ends at the cash register. They use all tools available in the craft – pitches, coaxes, cajoles, and do always keep bargaining, looks for connections that can be leveraged for the final push. So, when the proverbial dust settles, the salesperson walks away with a customer. In comparison, a coach is cut from another cloth. The archetypical coach is a gardener tending to the garden. They always think of the soil, of sunlight, of slow, steady & sustainable growth. Coach’s focus is not on the product, but on the person who is representing the organisation. The coach asks questions the way a gardener tests the texture of the earth. Always listening as a gardener who is connected to the earth for the faint stir of roots. The approach is open and gently perusing. In this mindset the success is not a number but a change – a lift in skill, a rise in confidence. The relationship is not a trade but a journey. It is built on trust, like a bridge that grows plank by plank. The question is different: “How can I help them grow?” Adopting a coach’s mindset changes the focus to following the seasons, not the day. The coach’s tools may appear to be small but in the end is mighty – listening, questioning, feedback, and understand their concerns and unique context. More importantly listen for the unsaid. Most importantly with this mindset inculcating a non-judgemental thinking approach assists in facilitating self-discovery, strategic thinking, and capability-building. All of this ends up in establishing a stronger and sustainable relationship which is built for the long run. Coaching Mindset vs. Sales Mindset: Who Prevails in Corporate Risk? I personally have been in the salesperson mindset all my life. But I believe as corporate risk professionals, we must evolve from having a salesman mindset to a coaching mindset for sustainable growth. A coaching outlook brings big advantages over the traditional sales approach. It builds real client ownership. Clients find solutions themselves empowered instead of just being told what to do by the salesperson. This creates stronger buy-in & commitment in the long run. A coaching mindset also has a long-term impact. Wherein it goes to builds skills & confidence in client teams. They become self-reliant & less dependent. This can be counter intuitive to being with but has a positive impact on the entire relationship chain. It…

Read More
PSI

Is India’s PSI Ready to Brace Global Quality Standards ?

Col Ashok Kumar Singh (Retd.) From Watchmen to Professionals:How New Labor Codes are Globalizing PSI The Private Security Industry (PSI) in India has long occupied a unique position as a critical bridge between public safety and private enterprise. Traditionally characterized by high labor intensity and a fragmented regulatory history under the PSARA (2005), the sector is currently undergoing a radical metamorphosis. This change is driven by the implementation of the four New Labor Codes – on wages, social security, industrial relations, and occupational safety, health, and working conditions. At the heart of this transition is the ‘Global Quality Standard’ imperative. As the Codes mandate increased formalization – through compulsory appointment letters, digitized payrolls, and stringent social security compliance – they effectively narrow the gap between Indian statutory requirements and international benchmarks such as ISO 18788 (Security Operations Management) and ISO 45001 (Occupational Health and Safety). For Indian security agencies, this legislative overhaul is a double-edged sword. While it introduces significant cost implications through a broader definition of ‘wages’ and mandatory social security contributions for a massive migrant workforce, it also offers a path to global competitiveness. By institutionalizing the ‘Quality-First’ approach, the New Labor Codes are decoding a future where the Indian private security guard is not just a ‘watchman’ but a ‘protected, trained & certified professional’ operating within a framework of global excellence. Here, I have explored, how these legislative reforms act as a conduit for global standards, transforming the PSI from a low-margin unorganized sector into a robust, quality-driven industry ready for the world stage. Key themes The three critical ‘Impact Pillars’ which have been given weightage here: To connect the Code on Wages with ISO 9001 (Quality Management Systems), one needs to focus on how legal compliance acts as the foundation for ‘Quality.’ In the ISO framework, a service cannot be considered ‘high quality’ if it does not meet the statutory and regulatory requirements of the land. The intersection of the Code on Wages and ISO 9001:2015 For a Private Security Agency (PSA), maintaining an ISO 9001:2015 certification is more than a badge of honour; it is often a mandatory requirement for high-value government and multi-national tenders. The core of ISO 9001 is Clause 8.2.2, which mandates that an organization must meet the ‘statutory and regulatory requirements’ related to its services. With the enforcement of the Code on Wages (2019/ 2020), the definition of quality in the Indian security sector has been recalibrated. Standardization of the ‘Wage Ceiling’ Under the old regime, fragmented definitions of wages allowed for creative accounting, which often led to non-compliance during audits. The New Code simplifies this by ensuring that ‘allowances’ cannot exceed 50% of the total remuneration. Risk-Based Thinking (Clause 6.1) ISO 9001:2015 emphasizes risk-based thinking. The New Labor Codes introduce stiff penalties for non-compliance, including higher arrears and potential imprisonment for directors. Documentation and Transparency The Code on Wages mandates digitized registers and electronic pay slips. This creates an ‘audit trail’ which is the backbone of ISO Clause 7.5 (Documented Information). When an ISO auditor reviews a security agency, the ability to produce instant, digital proof of fair wage distribution serves as primary evidence of an ‘effective management system. Summary Table: Compliance vs. Quality New Labor Code Provision ISO 9001:2015 Connection Impact on Global Standards 50% Allowance Cap Clause 8.2 (Service Requirements) Eliminates wage-parity disputes. Timely Wage Payment Clause 7.1.2 (People/Resources) Reduces turnover and improves guard vigilance. Digital Wage Slips Clause 7.5 (Documented Info) Ensures transparency for global client audits. Occupational Safety, Health, and Working Conditions (OSH) Code In the private security industry, the ‘product’ being sold is essentially ‘risk mitigation’. Therefore, the Occupational Safety, Health, and Working Conditions (OSH) Code is perhaps the most critical legislative link to global standards, specifically ISO 45001:2018 (Occupational Health and Safety Management Systems). At the heart of this transition is the ‘Global Quality Standard’ imperative. As the Codes mandate increased formalization – through compulsory appointment letters, digitized payrolls, and stringent social security compliance – they effectively narrow the gap between Indian statutory requirements and international benchmarks such as ISO 18788 (Security Operations Management) and ISO 45001 (Occupational Health and Safety) Aligning the OSH Code with ISO 45001: Safety as a Service While the Code on Wages handles the financial integrity of the industry, the OSH Code focuses on the physical integrity of the security force. In an industry where personnel are often deployed in hazardous environments – ranging from volatile industrial sites to high-traffic ATM cash loading – safety is not an elective; it is a core deliverable. Duty of Care: The Employer’s Mandate The OSH Code introduces a universal ‘Duty of Care,’ requiring employers to provide a workplace free from hazards. This mirrors ISO 45001 Clause 5.1 (Leadership and Worker Participation), which demands that top management take responsibility for preventing work-related injury and ill health. Hazard Identification and Risk Assessment (HIRA) A central pillar of ISO 45001 Clause 6.1 is the systematic identification of hazards. Traditionally, Indian security agencies treated safety as the ‘client’s responsibility.’ The New OSH Code shifts this burden, making the security agency legally responsible for the safety of its personnel, regardless of the site of deployment. Welfare Facilities and Working Hours The OSH Code provides strict guidelines on working hours, overtime, and the provision of basic welfare facilities (restrooms, drinking water, and first aid). Comparison: OSH Code vs. ISO 45001 OSH Code Requirement ISO 45001 Requirement Synergistic Outcome Annual Health Exams Clause 8.1.2 (Hazard Elimination) Proactive identification of guard unfitness. Mandatory Safety Training Clause 7.2 (Competence) Improved response to emergencies & fires. Overtime Regulation Clause 8.1 (Operational Planning) Reduced human error and liability. Workplace Welfare Clause 5.4 (Worker Participation) Higher retention and improved moral. The OSH Code effectively codifies the safety requirements that were previously only found in high-end international contracts. For a Private Security Agency in India, compliance with the OSH Code is no longer a legal chore – it is a pre-requisite for ISO 45001, transforming safety from a cost centre into a competitive advantage in the global market….

Read More
STQC

Why Trusted Cameras Will Define the Next Era of Video Surveillance

Gaurav TaywadeManaging Director, Vicon India For much of the last decade, innovation in video surveillance has been driven by visible capabilities – higher resolution, smarter analytics, faster alerts, and AI at the edge. These advancements have transformed cameras from passive recording devices into intelligent systems capable of real-time decision-making. But as we move into 2026, a new question is beginning to dominate serious conversations around surveillance deployments: Can these intelligent systems be trusted? As cameras become autonomous, connected, and deeply embedded into critical infrastructure, trust is no longer an abstract concept. It is becoming a fundamental requirement. The expanding role of the camera Modern surveillance cameras are no longer isolated endpoints. They are now: In effect, cameras have become edge computers with vision. This evolution brings enormous value – but it also expands the attack surface. A compromised camera is no longer just a blind spot; it can become an entry point, a data risk, or a system-wide vulnerability. Why software security alone is not enough Historically, cybersecurity in surveillance has focused on software password policies, network hardening, encrypted communication, and secure firmware updates. While these measures are necessary, they are no longer sufficient. Software can be altered, firmware can be replaced, and credentials can be stolen. True security must begin below the operating system, at the hardware level. This is where Trusted Platform Module (TPM) technology becomes critical. TPM: The silent foundation of trust TPM is not a feature users interact with, nor does it appear on dashboards or analytics reports. Yet it plays one of the most important roles in next-generation surveillance architecture. At its core, TPM provides a hardware root of trust – a secure, tamper-resistant foundation that ensures a device starts, operates, and updates only in a verified and trusted state. In simple terms, TPM ensures that: This trust is not assumed – it is mathematically and physically enforced. Why trust is becoming mission-critical As surveillance systems expand across cities, transportation networks, utilities, and industrial facilities, expectations are changing. Organizations now demand long device lifecycles, secure remote management, protection against supply-chain risks, confidence in firmware authenticity, and compliance with national and sector-specific cybersecurity norms. In such environments, a camera that performs well but cannot be trusted is a liability. TPM addresses this challenge by ensuring that intelligence, connectivity, and autonomy operate within a secure and verifiable framework. Edge intelligence needs a trusted core Edge AI is reshaping surveillance by enabling cameras to detect, classify, and respond locally. However, intelligence without trust introduces new risks. If an edge device is compromised – analytics results can be manipulated, alerts can be suppressed or falsely generated, video streams can be intercepted, and the device itself can be weaponized. TPM ensures that edge intelligence operates inside a trusted envelope, preserving the integrity of decisions made at the device level. This is especially important as cameras begin to take autonomous actions – triggering alarms, controlling PTZ movements, or integrating with safety and operational systems. Trust beyond cybersecurity: Operational confidence Hardware-rooted security is not only about protection from cyber threats. It also contributes to operational reliability and confidence. In large deployments, TPM enables secure commissioning and provisioning, confident remote updates without fear of corruption, faster fault isolation, reduced risk during long-term operation, and stronger compliance posture for audits and tenders. For organizations operating in regulated or high-risk environments, this confidence is becoming a decisive factor in technology selection. As cameras evolve into intelligent edge devices, they also become part of an organization’s digital trust framework. AI without integrity is a risk. Hardware-rooted security such as TPM ensures that intelligence operates on a foundation of trust, resilience, and long-term reliability. The direction of next-generation surveillance Looking ahead, the most advanced surveillance platforms will be defined by a combination of edge intelligence, rugged, purpose-built hardware, secure lifecycle management, and hardware-enforced trust. TPM is becoming a silent prerequisite for this evolution – often unnoticed, but absolutely essential. As intelligent sensors become more autonomous and more deeply integrated into critical operations, trust will no longer be optional or assumed. It will be designed into the device from day one. Conclusion The video surveillance industry is entering a new phase – one where intelligence, autonomy, and connectivity must be balanced with integrity and trust. While AI and analytics will continue to drive visible innovation, hardware-rooted security will quietly determine which platforms are truly ready for the future. In the coming years, the most valuable cameras will not only be the smartest – but the most trusted. Read More

Read More
Indian Security Industry

Indian Security Industry Pulse 25-26

The year 2025 marked a defining phase for the global and Indian security industry. Accelerated digitalisation, rapid adoption of artificial intelligence, rising geopolitical tensions, evolving terror threats, and growing concerns around cyber-physical vulnerabilities collectively reshaped the security landscape. For India, in particular, the convergence of smart city initiatives, critical infrastructure expansion, and heightened homeland security priorities pushed the industry into a new era of technological sophistication and strategic relevance. At the same time, the security sector witnessed a fundamental shift in expectations. Customers moved beyond conventional surveillance and access control solutions towards intelligent, integrated, and outcome-driven security ecosystems. Policymakers and law enforcement agencies increasingly emphasised predictive capabilities, data-driven decision-making, and resilience against emerging threats, while enterprises sought solutions that balanced security imperatives with privacy, compliance, and operational efficiency. As the industry steps into 2026, it stands at a critical crossroads. The coming year is poised to test the sector’s readiness to adapt to disruptive technologies, manage complex threat vectors, and respond to rapidly evolving regulatory frameworks. The strategic choices made today by – technology providers, system integrators, policymakers, and end-users – will determine not only the trajectory of the security industry but also the broader safety and stability of societies and economies. In this context, SecurityLinkIndia presents insights from leading voices across the security ecosystem to assess the industry’s performance in 2025 and decode the opportunities, risks, and priorities that will define 2026. Their perspectives offer a collective intelligence that reflects both the challenges faced and the possibilities ahead, making this compilation a vital reference for stakeholders shaping the future of security in India and beyond. Overall performance of the Indian security & surveillance industry in 2025 2025 has been a strong and transformative year for the Indian security and surveillance industry. The sector witnessed healthy growth driven by rapid infrastructure development, increased urbanisation, and heightened enterprise focus on risk management and compliance. There has been a visible shift from traditional manpower-led models to technology-integrated security solutions. Investments increased across AI-enabled surveillance, remote monitoring, access control, and command centre-based operations. Customers are no longer buying standalone products or guarding services; they are investing in outcome-driven, integrated security ecosystems. Overall, 2025 positioned the industry on a higher maturity curve with stronger adoption of digital platforms, analytics, and centralised operations. Most significant shifts in 2025 reshaping the industry The most significant shift in 2025 was the convergence of physical security, technology, and data intelligence. Enterprises moved from reactive security to predictive and preventive models. Key changes included: Security is now seen as a strategic business enabler, not just a support function. Technologies, verticals, and risks driving growth in 2026 In 2026, the growth of the Indian security industry will be driven by technologies that enable intelligence, integration, and real-time response. AI-powered surveillance, advanced video analytics, remote monitoring platforms, and integrated command-and-control systems will see accelerated adoption as enterprises look to move from manpower-heavy models to technology-led security ecosystems. The convergence of physical and digital security will also gain momentum, with organisations demanding unified platforms that bring together access control, surveillance, workforce monitoring, and incident management. From a market perspective, sectors such airports, logistics and warehousing, large manufacturing hubs, healthcare facilities, and smart infrastructure projects will continue to be major growth drivers. At the same time, rising concerns around business continuity, infrastructure resilience, insider threats, and operational disruptions will push security from a functional requirement to a strategic investment area, shaping both spending priorities and solution design across industries. Industry preparedness for 2026 and urgent gaps The Indian security industry is significantly better prepared today than it was even a few years ago. There is greater professionalism, stronger regulatory awareness, and a visible shift toward technology integration, centralized operations, and data-led security management. Many organisations have already begun investing in digital platforms, training frameworks, and scalable service models to address the evolving threat landscape. However, to truly meet the demands of 2026, the industry must urgently address a few structural gaps. Skill development and workforce upgradation remain critical, especially in areas such as technology operations, analytics, and advanced incident response. Standardisation of processes, compliance frameworks, and service benchmarks must also improve to build trust and consistency at a national level. Finally, deeper integration of technologies is required, as fragmented deployments limit impact. The next phase of growth will belong to organisations that invest in people, platforms, and process excellence simultaneously. Overall performance of the Indian security & surveillance industry in 2025 The year 2025 can be described as a year of consolidation and transition for the Indian security industry. While growth remained steady across key sectors such as infrastructure, manufacturing, logistics, healthcare, and public facilities, the real progress was visible in the industry’s evolving mindset. Security is no longer viewed purely as a manpower deployment function; it is increasingly recognised as a structured, accountable, and technology-supported service. Investments in surveillance, access control, command centres, and remote monitoring increased, but more importantly, customers began demanding professionalism, compliance, and measurable outcomes. For service providers like AP Securitas, 2025 reinforced the importance of combining trained manpower with technology, standard operating procedures, and governance. Overall, the industry moved up the maturity curve, even though adoption levels still vary across regions and sectors. Most significant shifts in 2025 reshaping the industry The most significant shift in 2025 was the change in customer expectations. Clients are no longer satisfied with headcount-based security models. They are asking sharper questions around effectiveness, compliance, training standards, response capability, and accountability. Regulatory focus on labour compliance, wage structures, and workforce formalisation also became more pronounced, compelling serious players to strengthen governance and operational transparency. At the same time, threats became more complex – ranging from theft and pilferage to insider risks, operational disruptions, and safety incidents – requiring better supervision, reporting, and escalation mechanisms. This combination of regulatory pressure and evolving risk profiles pushed the industry toward structured, process-driven, and technology-assisted security delivery models. Technologies, verticals, and risks driving growth in 2026 In 2026, growth will be driven by technologies that enhance…

Read More