Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalPhysical SecurityVideo Surveillance

Better together: Humans and tech scale physical security capabilities

By Tomy Han
Security guard UNSPLASH.png

Image via Unsplash

August 22, 2024

Private security staff help protect communities, businesses, public services, events, VIPs, residences and infrastructure. And the need is growing. Global spending on private security is projected to double from $241B in 2016 to $496B in 2028. In the United States, more than 1.2 million individuals work as security guards; globally, nearly 7.9 million do. 

However, there’s a significant shortage of these trained professionals, and it’s unlikely to get better. Precise information is hard to come by, but many companies say they’re unable to hire as many professionals as they need and are experiencing 100%-300% turnover yearly, meaning there is no opportunity to get ahead of the curve. While salaries certainly play a factor in retaining staff, employees may also feel unsafe and depart for jobs in less risky industries, such as e-commerce or food service. 

Physical security companies can use technology to augment human capabilities, helping meet the rising need for talent, skills and services. Technology can help scale the capabilities of small teams, minimize the risks security guards encounter on the job and empower them to do their jobs more efficiently and effectively. It could also help security companies attract and retain staff, as employees feel more protected as they work and can defend themselves against unwarranted accusations. 

Physical security companies that may have paused IT investments should rest assured that hardware is no longer as expensive as it once was, due to fast-paced development, market competition, global supply chains, and innovative SaaS pricing models. Meanwhile, software can help drive recurring revenue, providing rapid ROI and boosting margins.

Capabilities every physical security company should have 

If they haven’t already, security company leaders will want to consider:

Equipping guards with body cameras

Widely used by police forces, body cameras provide high-definition video and audio footage, even in low-light conditions, such as in dark buildings. They’re also being adopted by security companies and industry firms, such as retailers, experiencing more conflictual encounters with the public. Employees wearing body cameras are more accountable for their actions, which they know are being recorded. Body cameras also help de-escalate conflicts, as would-be aggressors know their footage can be used for criminal cases. They further help prevent or end lawsuits, as a visual audit trail with time and date stamping and an audio narrative vanquish spurious claims.

Deploying AI-powered surveillance

It may not always be practical to deploy human talent for monitoring and surveillance. For example, organizations with large campuses or remote locations may not be able to field a full security field force — or want to. Commercial development projects may require protection but may not provide the needed infrastructure for on-site staff. And at concerts or sporting events, a small team may be responsible for the safety of tens of thousands. AI-powered surveillance capabilities can expand security’s reach. These systems apply image recognition and computer vision to video feeds from stationary cameras, such as unauthorized intrusions, suspicious behavior or other incidents. With these capabilities, lean teams can focus on the highest risks and threats while leaving routine monitoring to technology. 

Integrating hardware and software

Integrated hardware and software enable security companies to gain the best new features as functionality and upgrades are rolled out over the air. SaaS-like upgrades also extend hardware lifespans, improving their ROI. 

Replacing and augmenting human roles

Extending human talent may not always be an option if companies can’t hire enough staff, maintain continuity across shifts and accounts or work in extremely high-risk areas. In these instances, replacing humans with technology may be the best option. Security companies are:

Deploying drones and robots

Drones provide an eye in the sky, patrolling airspace over facilities, which can be invaluable for military installations, remote physical infrastructure such as oil rigs, and companies with valuable intellectual property or those that support national security missions. Drones with thermal imaging cameras can patrol large areas and detect intruders in poor-visibility conditions, such as at night. Teams monitoring their feeds can then direct security teams to the affected areas with pinpoint precision.

Enabling remote monitoring and control

Many organizations operate valuable unmanned physical infrastructure, such as utility substations, telecommunication cable stations, bridges and more. Leaders may want to protect these assets but not deploy local security forces. They can leverage 24/7 AI-powered monitoring services. For example, at utility substations, remote monitoring extends access controls and searches for unauthorized intruders; it rapidly detects emergency conditions such as smoke, fire, arcing or potential overheating events, alerting first responders.  

Navigating ethical and legal considerations

As security companies adopt more technology, they must consider ethical and legal considerations. Technology such as body cameras, drones, and robots capture and store real-time, extended video and audio footage of individuals, crowds, and actions in various locations. While individuals at large-scale public venues and events likely expect to be monitored, individuals working on the job or residing in communities may not.

Addressing privacy concerns

Organizations using security technology should consider placing public notices that sites are under surveillance and caution that individuals entering accept those conditions. If securing private areas, leaders will likely want to communicate in writing with residents and other community members. These communiques should include how technology is used and how video and audio footage is stored, accessed and secured. 

Data auditability

Technology should be kept in good working order, providing clear video and audio feeds and date and time stamps. Leaders will want to define video monitoring and archive policies, such as whether humans and AI or only AI review footage and how long footage is stored. Security companies serving high-conflict or litigious industries will want to preserve footage longer for court cases, while those in residential areas may delete footage within 30 days. 

Working together to protect communities and businesses 

Technology can free security teams from the drudgery of foot patrols while directing their talents to issues that do need investigation. Similarly, technology can help small teams make a bigger impact. And as legal risks and threats grow, videotaping events can often be the best defense: helping defray tense situations and reminding all parties involved that there is a true record of what transpired. 

KEYWORDS: compliance physical security systems security guards security officers technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tomy han headshot

Tomy Han is Partner at Volition Capital. Image courtesy of Han

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Glowing puzzle piece

    Better Together: How MFA and Strong Password Practices Can Help Bolster Security

    See More
  • access-control-freepik1170x658.jpg

    Physical security leaders embrace new tech

    See More

Related Products

See More Products
  • Physical Layer Security in Wireless Communications

  • Physical Security and Safety: A Field Guide for the Practitioner

  • The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • October 16, 2025

    Stronger Together: Elevating Security Through Strategic Partnerships

    ON DEMAND: In the complex and rapidly evolving threat landscape of today, no campus stands secure in isolation. Success in safeguarding our institutions depends on the strength of our partnerships — internally across departments and externally with community stakeholders, vendors and law enforcement.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing