Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Incorporating The Human Element Into Security Systems

By Drew Levine
July 27, 2010

Technology is changing the practice of security but still hasn't diminished the importance of the human element. Technologies such as video surveillance, access control, video analytics and command and control software can make companies and institutions more secure largely by providing better information about security threats and events to enable security personnel to respond.

The fact is, real-time response by a human being is the desired outcome of even today's latest technology innovations. That means that security officers continue to be a critical element of every security system. And yet our industry has historically considered these two disciplines – technology and manpower – as completely separate entities. The sales channels are separate, and the markets have evolved almost completely independently.

We have all seen examples of gadgetry that was developed with little regard for usability or the level of expertise needed by the user. Alternatively, one could question whether the guard services market – largely cost-driven – has sufficiently addressed the need for training to ensure a workforce that can fully leverage the benefits of technology. New technology continues to provide tools to enable security officers to do their jobs more effectively. It follows, therefore, that the security officer should be considered an integral part of a client's security system and a strategic part of the client's business.

For example, video cameras can put additional ‘eyes’ on possible security threats, but a qualified and attentive officer must be available to respond if something happens. Video can extend the ‘range’ of an officer's attention, but only if it makes that useable information available to the officer without interfering with his other duties. Clearly, an officer should not have to sit and view a roomful of video monitors instead of, say, patrolling a site. Rather, in case of an alarm, he should have access to that video on a handheld device. Return on investment comes not only from employing fewer security officers with the latest technologies. It also comes as a benefit of the greater productivity made possible by an overarching approach encompassing both.

It is at the critical interface of manpower and technology that the greatest cost efficiencies related to security management can be gained. Products must be designed to fulfill the information needs of the workforce. Personnel training and recruitment should be designed to provide the skill sets security officers need to interface effectively with security systems and to expand their duties to better leverage the efficiency advantages of technology innovation. Familiarity and expertise with both disciplines create the greatest opportunities to maximize the overall effectiveness of a security practice.

Suppliers can best serve the security market by broadening their approach to include not only the need for interoperable products, but the need for interoperability between products and people, between technology and manpower. This has been a missing element of the familiar convergence of products and services being offered by today's security manufacturers and providers. The approach needs to extend beyond interoperable products, and G4S is leading the industry in making this shift.

G4S is building on Wackenhut's legacy as the premier supplier of security manpower; beginning by acquiring several companies related to security technology including Nuclear Security Services Corp., Touchcom, Inc., Adesta and AMAG Technology. Also contributing to the new approach are internally developed innovations such as a software platform that can operate on a range of hand-held devices and a new state-of-the-art remote video monitoring center in Burlington, MA. G4S' expanded range of services also includes security consulting, design and engineering; compliance and risk management; and facilities management.

In the future, security officers will be equipped with more and more technology, which will contribute as a force multiplier and a productivity tool. Using technology to extend and enhance the reach of a protection system beyond security officers acting alone can impact a business's risk factors in a positive way. Advances in wireless and advanced video will enable security officers to do more with less. They will have access to more and more information, often using hand-held devices. The information must be presented in a way that is understandable and actionable by the security officers, and their interface with systems should be as simple as possible, so as not to interfere with important duties. Powerful technologies can work to supplement the effectiveness of security officers, providing access to real-time event monitoring, situation management and business intelligence.

The future of security innovation is the delivery of carefully integrated solutions, incorporating both manpower and technology, and customized to meet a client's specific needs. The time has come for a broad-based approach to deliver the next generation of security productivity and success.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sec0612 virtual inbody2 150px

Drew Levine is president of G4S Secure Solutions 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • human-security-freepik1170x658.jpg

    The importance of the human element of security

    See More
  • facialrecognition

    In the Age of Facial Recognition, The Human Element is Still Necessary

    See More
  • Keys to Employee Cybersecurity

    The Human Element of Cybersecurity

    See More

Related Products

See More Products
  • SSCP.jpg

    SSCP Systems Security Certified Practitioner Practice Exams

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing