The 2026 Security Roadmap: An Interview with Steve Van Till on SIA’s Latest Megatrends

Like many in our industry, we wrapped up 2025 by digging into the Security Industry Association’s (SIA) annual megatrends report. Rather than just another predictions list, the 2026 SIA Security Megatrends report offers a strategic roadmap from industry trailblazers who have mapped out the specific shifts in physical security trends we can expect in 2026.

As we enter the early days of a fresh year, we sat down with Brivo Founder and President Steve Van Till, who had a hand in shaping this year’s topics, to get his insider take on the findings. Read the full interview below.

The “Invisible Trend”: The Surge in Security Software Revenue

Q: What is your headline reaction to the 2026 SIA Security Megatrends report?

I am really pleased that we were able to discuss the “invisible trend,” which is the fact that software is becoming an increasingly larger part of the product dollar spent in security. While this might not surprise everyone, our research on exactly how much of the budget it consumes is new information that indicates where the industry is heading. We are becoming more of a software industry, which allows us to create additional value for our customers.

Q: By 2030, software is projected to make up 45% of industry revenue. What does this shift mean for the traditional security integrator who is used to making margin off hardware?

The shift toward software is actually good news for integrators because software generally offers higher margins than hardware. However, it means their salespeople must be able to sell the value of software rather than just individual pieces of hardware. Instead of focusing solely on locks, control panels, and readers, they need to talk about the holistic problems the software solves for the customer.

AI in the Security Industry: Threat or Tool?

Q: There is a fear that AI will replace software functionality. Do you see AI as a threat to security software providers, or is it simply the new interface for how we interact with that software?

There is an old idea that “software is eating the world,” but the update to that is “AI is eating software.” This refers to the fact that traditional software, which was handcrafted by thousands of developers, can now often be developed very quickly on top of a generative platform. For example, a group recently created the rough functionality of Slack in about 30 hours using the Claude platform.

Does that apply to the security industry? I would say it does around the edges, particularly with standalone AI analytics. However, the security industry has tremendous moats. First, we are a very physical industry. Replicating a messaging platform is one thing; integrating dozens of devices with hardware and firmware is much harder for an LLM to figure out and test on its own. Second is distribution. We rely on systems integrators to make these systems work in a given building for a given customer. That method of deployment is a significant moat that prevents the “AI eats software” scenario from developing here to the same extent it might in other industries, at least for now.

Walled Gardens vs. Open API Security Strategy:

Q: Regarding the rise of “Single-Logo Platforms”: Is the “Walled Garden” model risky for an enterprise buyer planning for the future compared to an open approach?

The fight between “walled gardens” and “open platforms” is at least as old as the PC era. The walled garden model offers a single logo and the assurance that everything will work together, which appeals to some mid-market or smaller businesses.

However, the walled garden model can cut people off from the choices they want regarding third-party hardware and software. This is particularly important at the enterprise level.

At Brivo, we offer a hybrid. You can choose a single-logo experience by using all Brivo components if you want that simplicity. But because we have an open API and hundreds of integrations, you can also bring in outside technology and still have it operate inside the Brivo Security Suite. We believe that the ability to choose where you land on that spectrum is more effective than being locked into a single provider’s roadmap, which might not move as fast as your business needs.

Q: How does an open API strategy protect a security director from technology going obsolete compared to buying a complete closed solution?

The software world is always changing, and new business systems constantly need to be integrated into access control and video. Without open APIs, you are boxed into the technology that was current when you first deployed your system. Open APIs provide the foundation to connect to any new system that comes along, allowing you to expand functionality as your business needs grow.

Proving Security ROI to the CFO

Q: How does a security director walk into their CFO’s office this year and prove that their system is a business intelligence tool or ROI driver, rather than simply a cost center?

Because more of the security budget is going toward software, security directors are in a better position to make a case for ROI based on functionality. Modern security platforms can integrate with hundreds of business systems, such as HR, CRM, and logistics.

A simple example is a gym using access control tied to membership status. The system allows people in if they are current and keeps them out if they are expired. It is very clear to any CFO that this is a necessary business function that protects revenue. As we accelerate the ability to develop business features that improve customer experience, it becomes much easier to make the case that security is an ROI driver, not just a cost.

Q: The report also notes that buyers are seeking multi-use technology for operational insights. What other ways are you seeing enterprise customers leverage their security infrastructure to solve logistics, HR, or operations problems?

One of our large retail customers uses a strategy called “dark delivery” to move their trucks at night when roads are less crowded. They connected their logistics scheduling system to our identity API to automatically manage credentials for their drivers. This allows them to maintain an accurate list of who is allowed in which store, even as drivers and schedules change daily.

That is a prime example of using access control not just for security, but to manage a dynamic workforce and solve a core logistics problem. We recently published, From Cost Center to Competitive Advantage: 5 Ways Physical Security Drives Enterprise Transformation, which is filled with stories like this.

The Evolution of the Value Chain

Q: This year’s report focuses on the evolution from a channel model to a value chain, which requires a “build with” mindset. Why is this collaboration necessary today?

The industry has realized that we must be outcomes-focused. Integrators are going to customers and asking, “What outcomes do you expect?” That focus has to propagate back to manufacturers so we are building things that work in that outcomes-driven framework.

It is about selling the problem you are solving rather than just the tool. This collaboration ensures that products are developed in a context that customers truly understand and value.

Q: How does the relationship between the manufacturer and the integrator change?

Integrators are under more pressure to find solutions for specific business problems. In the past, the industry focused on micro-enhancements like more video in the matrix or read ranges for unlocking doors. Now, customers are coming in with broader needs. They want a single platform that provides a complete experience, such as combining multifamily building management with smart apartment capabilities across an entire portfolio of apartment complexes. They expect fully integrated business solutions that happen to also be security solutions. This demands a higher level of integration and collaboration between the manufacturer and the integrator to deliver a simple, comprehensive business solution.

Q: Looking at this report as a whole, is there one trend that you think is currently overhyped or underhyped?

As a committee, we groom the list to remove anything overhyped or past its prime. For example, cloud is now considered a “foundational” technology rather than an up-and-coming one. AI is currently on the ascendancy, but in a few years, it will also be a foundational part of how we do things. While there is still some public skepticism or fear, AI is already in most products we use online, and it will soon be everywhere in the security industry as well.

We use AI in about six different ways, starting with machine learning for anomaly detection to find deviations in normal traffic patterns. We just announced Brivo Genius Mobile Agent, a natural language capability that allows users to interact with their security system via voice or text. This is a major improvement for security because, in an emergency or panic situation, you may not remember how to use a complex software command. Being able to simply tell your phone to “lock down” provides a much better and more accessible implementation of critical security features.

Want to go deeper into these trends?

Download the full SIA Report or read our guide: From Cost Center to Competitive Advantage.


We’re sharing videos from our interview with Steve on LinkedIn, so follow Brivo and Steve Van Till for more 2026 industry analysis.