Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

How to Use Video and Voice for Training and Security

By Bill Zalud
March 1, 2015

Organized retail crime. Crowd management. Emergency preparedness. Disaster recovery. Active shooter.

Welcome to retail shopping these days. But, on the other hand, the emerging use of video and audio technologies can also now emphasize such elements as training of sales associates and after-sale needs to provide a better experience. No surprise. Many security incidents are rare compared to serving customers and bottom line sales.

No doubt, security video and patrolling officers play an important role in loss prevention. Still, a growing number of retail establishments are using video and audio surveillance in order to train staff, to set quality assurance levels as well as better settle disputes. Retail is the nation’s largest private sector employer, supporting one in four U.S. jobs – 42 million working Americans. And it contributes $2.6 trillion to annual gross domestic product in the U.S.

Of course, there are losses due to theft. But a larger potential loss area covers service, safety and quality challenges.

“We have 150 to 200 deployments of cameras and microphones in retail and fast food in facilities and drive-throughs for quality of service and food,” says Nick Grace of LMI Systems, which has been serving contractors and building owners in metro Atlanta and national-wide since 1962. Adds Scott Goodwin of LMI, “Live video and accompanying audio can best show how people respond to service requests as well as provide interactive response” at the point of maximum effectiveness during a transaction, for example.

Typically the company provides ceiling mounted microphones and the backroom gear, often from Louroe Electronics, which can integrate with security video. And, just like security video, the shift is to IP-based gear when it comes to audio surveillance. But, unlike cameras, audio can have unique sensitivity when it comes to such elements as wiretapping and eavesdropping concerns. While federal, state and local laws can vary, when audio is implemented, in some situations, clear and posted signage can accommodate any concerns. In other placements, such as employee-only areas, concerns are minimized through employment disclosure.

“Analytics is another retail trend,” says Goodwin. Security video and audio can provide data regarding traffic flow, time of day information, goods purchased, service provided and other details.

Interactive audio and video has been in place for a number of year, with Westec Interactive (now Digital Wireless by Interface of Dallas, Texas) with its application in the convenience store arena.

Today, Louroe Electronics is a major player in audio monitoring technology within the security industry. Its Verifact line of microphones, complementing base stations and communication accessories, provide line level output to interface with numerous security technologies. Speakers and microphones can connect directly to IP cameras, turning them into an IP-based intercom with hands-free capability. Such products are compatible with a wide range of DVRs, both analog and IP Network video systems, VMS software and computer-based recorders.

One audio/video example is the UPS Store in Northridge, California. Because UPS stores are individually owned, each manager must identify the best security solution for his store. Moe Kishawi, store manager at this UPS location, realized he needed to install a new system after a security breach occurred and property was damaged.

Kishawi contacted Northridge-based integrator Wilson Security Systems for help in selecting a security system. Cameras were placed throughout the store while the Verifact A was mounted on the ceiling above the main cash register. The omnidirectional microphone is encased in an ABS dome designed for ceiling mounting and can pick up sound from 15 feet away. The store manager usually uses the audio recordings when there is a conflict. If there is a dispute between an employee and customer, Kishawi will download and review the audio file from the computer and determine the appropriate action.

In one instance, a customer claimed that an employee promised them a refund. To resolve the issue, Kishawi downloaded the audio file and listened to it with the customer. The audio verified that the employee did not promise a refund. This is just one example of many where the audio verified what really happened. “Audio is a must,” says Kishawi. “I believe in audio because video by itself is not ongoing to show you what exactly happened and the interaction that took place. I would not install another security system without integrating audio.” 

KEYWORDS: security education Security Return on Investment (ROI) video monitoring

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • How to Use Surveillance beyond the Security Department

    See More
  • Nearly Half of Americans Likely to Use Voice Recognition for Personal Verification

    See More
  • How to Use Social Media for Better #Security

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing