
October’s Cyber Security Month is a timely reminder that Europe’s approach to protection now spans both physical and digital frontiers. The convergence of cybersecurity and physical security is no longer optional; it is being driven by regulation, innovation, and a growing awareness that connected devices – whether cameras, readers or sensors – can become the first step in a serious breach.
Europe’s Regulations
The European Union is tightening the rules for all technology that connects to a network. The Cyber Resilience Act (CRA), which begins to take effect in late 2024, will make cybersecurity a design requirement for connected products, from smart locks to IP cameras. Manufacturers will need to demonstrate that their devices can withstand known vulnerabilities, be securely updated, and disclose any security risks. Meanwhile, the NIS2 Directive broadens the list of essential and important sectors – such as transport, healthcare and critical infrastructure – and holds them to stricter standards of incident reporting, governance, and supply chain oversight.
In parallel, EN 18031, under the CE Radio Equipment Directive, introduces mandatory cybersecurity standards for wireless and IoT products. This change means that European buyers can increasingly rely on independent verification of device security, ensuring that connected systems in surveillance and access control meet baseline protection levels. These developments are accelerating a shift in how manufacturers build and maintain devices: security is now part of the product lifecycle rather than an afterthought.
A New Layer of Defence: Managed Detection and Response
While device-level security is vital, Europe’s threat landscape also calls for proactive defence. This is where Managed Detection and Response (MDR) comes in. MDR combines automated monitoring with human expertise to detect, investigate, and respond to cyber threats in real time. Unlike passive systems that only flag incidents, MDR services actively hunt for anomalies across endpoints, networks, and cloud environments. For physical security, the implications are significant: a compromised camera, access reader, or sensor can be detected early before it becomes a gateway into a wider network.
The recent launch of MDR Detect by ON2IT illustrates how advanced detection is being made more accessible. It provides real-time visibility across IT, operational technology, and cloud environments, while giving users full control of their data and storage. By focusing on rapid deployment and transparent pricing, ON2IT is challenging the assumption that strong cyber defence must come at a premium. Its solution represents the next step in merging operational and cybersecurity visibility, aligning with Europe’s ambition for a secure digital ecosystem.
Manufacturers Step Up
In response to these pressures, physical security manufacturers are embedding cybersecurity principles deep into their product design. Hikvision has prioritised compliance with European standards such as EN 18031 and ETSI EN 303 645. Its recent certifications validate that its products meet rigorous requirements around data encryption, authentication, and secure firmware updates. The company has also introduced multi-layered protection strategies that address vulnerabilities across devices, networks, applications, and operations.
Hanwha Vision follows a secure-by-design approach, integrating trusted platform modules into its hardware and enforcing secure boot procedures to ensure firmware integrity. Its in-house S-CERT team manages vulnerabilities and oversees long-term firmware updates, helping customers maintain compliance long after installation.
At HID Global, cybersecurity and identity are converging through its new Integration Service platform. By linking digital identity management with physical access systems, HID enables organisations to control entry credentials and network permissions in a unified way. This aligns well with emerging corporate strategies for zero-trust security – where identity verification becomes continuous, not just at the perimeter.
Meanwhile, i-PRO is promoting cyber hygiene among end users and installers. The company publishes practical guidance for maintaining secure systems: assessing vendor risk, applying firmware updates promptly, conducting regular vulnerability scans, and backing up configurations. These foundational measures often make the difference between resilience and exposure.
Expanding the Cyber-Physical Conversation
Other key industry players are also shaping the cyber-physical agenda. Verkada, a relative newcomer, has built its reputation on cloud-managed security systems with cybersecurity as a core design principle. Its architecture encrypts data both in transit and at rest, employs zero-knowledge encryption for video, and uses regular third-party penetration testing. The company also enforces strict data retention policies and multifactor authentication to prevent unauthorised access.
Milestone Systems, known for its open-platform video management software, integrates cybersecurity at multiple levels. Its XProtect platform includes signed software packages, secure communication channels, and built-in encryption. Milestone also supports role-based access control and two-factor authentication, and regularly collaborates with cybersecurity specialists to ensure that its integrations meet evolving standards. By promoting openness without compromising security, Milestone reinforces the idea that interoperability and protection can coexist.
For Genetec, cybersecurity has long been a cornerstone of its corporate identity. The company’s Security Center platform incorporates its Cybersecurity Hardening Guide, which provides customers with detailed best practices for system configuration and maintenance. Genetec also emphasises digital trust through encrypted communications, digital certificates, and a “Privacy by Design” approach that limits data exposure. The company has been vocal in urging customers to treat physical security as an extension of IT policy rather than a separate domain.
Paxton, the British manufacturer best known for its Net2 and Paxton10 systems, has also elevated cybersecurity as a product differentiator. It uses secure cloud infrastructure, end-to-end encryption, and multi-factor authentication across its platforms. Paxton’s firmware undergoes regular third-party penetration testing, and its in-house security team continuously monitors and updates systems in line with the latest cyber standards. The company also invests heavily in training installers to understand both the physical and digital aspects of system protection, ensuring that cyber resilience extends beyond the factory floor to field deployment.
Why It Matters Now
The relationship between physical and digital protection is now inseparable. A single weak camera, door controller, or storage server can open pathways to ransomware, espionage, or operational disruption. European regulation is tightening, threat actors are growing more sophisticated, and customers are demanding transparency about how their data – and their premises – are protected.
For installers, integrators, and end users, success will depend on viewing security as a single continuum. Devices must be secure by design, supported by long-term firmware maintenance, and deployed within architectures that enable visibility, identity control, and real-time detection. The convergence of physical and cybersecurity is no longer a prediction; it is Europe’s present reality. As regulations harden and technologies evolve, organisations that bridge the gap between locks and firewalls will be best placed to safeguard both assets and trust.







