Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalPhysical SecurityVideo Surveillance

Better together: Humans and tech scale physical security capabilities

By Tomy Han
Security guard UNSPLASH.png

Image via Unsplash

August 22, 2024

Private security staff help protect communities, businesses, public services, events, VIPs, residences and infrastructure. And the need is growing. Global spending on private security is projected to double from $241B in 2016 to $496B in 2028. In the United States, more than 1.2 million individuals work as security guards; globally, nearly 7.9 million do. 

However, there’s a significant shortage of these trained professionals, and it’s unlikely to get better. Precise information is hard to come by, but many companies say they’re unable to hire as many professionals as they need and are experiencing 100%-300% turnover yearly, meaning there is no opportunity to get ahead of the curve. While salaries certainly play a factor in retaining staff, employees may also feel unsafe and depart for jobs in less risky industries, such as e-commerce or food service. 

Physical security companies can use technology to augment human capabilities, helping meet the rising need for talent, skills and services. Technology can help scale the capabilities of small teams, minimize the risks security guards encounter on the job and empower them to do their jobs more efficiently and effectively. It could also help security companies attract and retain staff, as employees feel more protected as they work and can defend themselves against unwarranted accusations. 

Physical security companies that may have paused IT investments should rest assured that hardware is no longer as expensive as it once was, due to fast-paced development, market competition, global supply chains, and innovative SaaS pricing models. Meanwhile, software can help drive recurring revenue, providing rapid ROI and boosting margins.

Capabilities every physical security company should have 

If they haven’t already, security company leaders will want to consider:

Equipping guards with body cameras

Widely used by police forces, body cameras provide high-definition video and audio footage, even in low-light conditions, such as in dark buildings. They’re also being adopted by security companies and industry firms, such as retailers, experiencing more conflictual encounters with the public. Employees wearing body cameras are more accountable for their actions, which they know are being recorded. Body cameras also help de-escalate conflicts, as would-be aggressors know their footage can be used for criminal cases. They further help prevent or end lawsuits, as a visual audit trail with time and date stamping and an audio narrative vanquish spurious claims.

Deploying AI-powered surveillance

It may not always be practical to deploy human talent for monitoring and surveillance. For example, organizations with large campuses or remote locations may not be able to field a full security field force — or want to. Commercial development projects may require protection but may not provide the needed infrastructure for on-site staff. And at concerts or sporting events, a small team may be responsible for the safety of tens of thousands. AI-powered surveillance capabilities can expand security’s reach. These systems apply image recognition and computer vision to video feeds from stationary cameras, such as unauthorized intrusions, suspicious behavior or other incidents. With these capabilities, lean teams can focus on the highest risks and threats while leaving routine monitoring to technology. 

Integrating hardware and software

Integrated hardware and software enable security companies to gain the best new features as functionality and upgrades are rolled out over the air. SaaS-like upgrades also extend hardware lifespans, improving their ROI. 

Replacing and augmenting human roles

Extending human talent may not always be an option if companies can’t hire enough staff, maintain continuity across shifts and accounts or work in extremely high-risk areas. In these instances, replacing humans with technology may be the best option. Security companies are:

Deploying drones and robots

Drones provide an eye in the sky, patrolling airspace over facilities, which can be invaluable for military installations, remote physical infrastructure such as oil rigs, and companies with valuable intellectual property or those that support national security missions. Drones with thermal imaging cameras can patrol large areas and detect intruders in poor-visibility conditions, such as at night. Teams monitoring their feeds can then direct security teams to the affected areas with pinpoint precision.

Enabling remote monitoring and control

Many organizations operate valuable unmanned physical infrastructure, such as utility substations, telecommunication cable stations, bridges and more. Leaders may want to protect these assets but not deploy local security forces. They can leverage 24/7 AI-powered monitoring services. For example, at utility substations, remote monitoring extends access controls and searches for unauthorized intruders; it rapidly detects emergency conditions such as smoke, fire, arcing or potential overheating events, alerting first responders.  

Navigating ethical and legal considerations

As security companies adopt more technology, they must consider ethical and legal considerations. Technology such as body cameras, drones, and robots capture and store real-time, extended video and audio footage of individuals, crowds, and actions in various locations. While individuals at large-scale public venues and events likely expect to be monitored, individuals working on the job or residing in communities may not.

Addressing privacy concerns

Organizations using security technology should consider placing public notices that sites are under surveillance and caution that individuals entering accept those conditions. If securing private areas, leaders will likely want to communicate in writing with residents and other community members. These communiques should include how technology is used and how video and audio footage is stored, accessed and secured. 

Data auditability

Technology should be kept in good working order, providing clear video and audio feeds and date and time stamps. Leaders will want to define video monitoring and archive policies, such as whether humans and AI or only AI review footage and how long footage is stored. Security companies serving high-conflict or litigious industries will want to preserve footage longer for court cases, while those in residential areas may delete footage within 30 days. 

Working together to protect communities and businesses 

Technology can free security teams from the drudgery of foot patrols while directing their talents to issues that do need investigation. Similarly, technology can help small teams make a bigger impact. And as legal risks and threats grow, videotaping events can often be the best defense: helping defray tense situations and reminding all parties involved that there is a true record of what transpired. 

KEYWORDS: compliance physical security systems security guards security officers technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tomy han headshot

Tomy Han is Partner at Volition Capital. Image courtesy of Han

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Glowing puzzle piece

    Better Together: How MFA and Strong Password Practices Can Help Bolster Security

    See More
  • access-control-freepik1170x658.jpg

    Physical security leaders embrace new tech

    See More
  • dogs

    Leveraging K-9 capabilities within security

    See More

Related Products

See More Products
  • Physical-Layer-Security.gif

    Physical Layer Security in Wireless Communications

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!