Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

How to Use Video and Voice for Training and Security

By Bill Zalud
At a point of sale, monitoring by video and audio can assist in staff training but also in resolving disputes.  Photo courtesy Louroe Electronics

At a point of sale, monitoring by video and audio can assist in staff training but also in resolving disputes.

 Photo courtesy Louroe Electronics 

At a UPS Store, the store manager usually uses the audio recordings when there is a conflict.

At a UPS Store, the store manager usually uses the audio recordings when there is a conflict.

 Photo courtesy Louroe Electronics 

Audio integrated with video provides retail businesses with the ability to monitor,  measure and react to service interactions

 Audio integrated with video provides retail businesses with the ability to monitor,  measure and react to service interactions, says Scott Goodwin and Nick Grace of LMI Systems. Photo courtesy of LMI Systems 

At a point of sale, monitoring by video and audio can assist in staff training but also in resolving disputes.  Photo courtesy Louroe Electronics
At a UPS Store, the store manager usually uses the audio recordings when there is a conflict.
Audio integrated with video provides retail businesses with the ability to monitor,  measure and react to service interactions
March 1, 2015

Organized retail crime. Crowd management. Emergency preparedness. Disaster recovery. Active shooter.

Welcome to retail shopping these days. But, on the other hand, the emerging use of video and audio technologies can also now emphasize such elements as training of sales associates and after-sale needs to provide a better experience. No surprise. Many security incidents are rare compared to serving customers and bottom line sales.

No doubt, security video and patrolling officers play an important role in loss prevention. Still, a growing number of retail establishments are using video and audio surveillance in order to train staff, to set quality assurance levels as well as better settle disputes. Retail is the nation’s largest private sector employer, supporting one in four U.S. jobs – 42 million working Americans. And it contributes $2.6 trillion to annual gross domestic product in the U.S.

Of course, there are losses due to theft. But a larger potential loss area covers service, safety and quality challenges.

“We have 150 to 200 deployments of cameras and microphones in retail and fast food in facilities and drive-throughs for quality of service and food,” says Nick Grace of LMI Systems, which has been serving contractors and building owners in metro Atlanta and national-wide since 1962. Adds Scott Goodwin of LMI, “Live video and accompanying audio can best show how people respond to service requests as well as provide interactive response” at the point of maximum effectiveness during a transaction, for example.

Typically the company provides ceiling mounted microphones and the backroom gear, often from Louroe Electronics, which can integrate with security video. And, just like security video, the shift is to IP-based gear when it comes to audio surveillance. But, unlike cameras, audio can have unique sensitivity when it comes to such elements as wiretapping and eavesdropping concerns. While federal, state and local laws can vary, when audio is implemented, in some situations, clear and posted signage can accommodate any concerns. In other placements, such as employee-only areas, concerns are minimized through employment disclosure.

“Analytics is another retail trend,” says Goodwin. Security video and audio can provide data regarding traffic flow, time of day information, goods purchased, service provided and other details.

Interactive audio and video has been in place for a number of year, with Westec Interactive (now Digital Wireless by Interface of Dallas, Texas) with its application in the convenience store arena.

Today, Louroe Electronics is a major player in audio monitoring technology within the security industry. Its Verifact line of microphones, complementing base stations and communication accessories, provide line level output to interface with numerous security technologies. Speakers and microphones can connect directly to IP cameras, turning them into an IP-based intercom with hands-free capability. Such products are compatible with a wide range of DVRs, both analog and IP Network video systems, VMS software and computer-based recorders.

One audio/video example is the UPS Store in Northridge, California. Because UPS stores are individually owned, each manager must identify the best security solution for his store. Moe Kishawi, store manager at this UPS location, realized he needed to install a new system after a security breach occurred and property was damaged.

Kishawi contacted Northridge-based integrator Wilson Security Systems for help in selecting a security system. Cameras were placed throughout the store while the Verifact A was mounted on the ceiling above the main cash register. The omnidirectional microphone is encased in an ABS dome designed for ceiling mounting and can pick up sound from 15 feet away. The store manager usually uses the audio recordings when there is a conflict. If there is a dispute between an employee and customer, Kishawi will download and review the audio file from the computer and determine the appropriate action.

In one instance, a customer claimed that an employee promised them a refund. To resolve the issue, Kishawi downloaded the audio file and listened to it with the customer. The audio verified that the employee did not promise a refund. This is just one example of many where the audio verified what really happened. “Audio is a must,” says Kishawi. “I believe in audio because video by itself is not ongoing to show you what exactly happened and the interaction that took place. I would not install another security system without integrating audio.” 

KEYWORDS: security education Security Return on Investment (ROI) video monitoring

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • warehouse

    How to Use Surveillance beyond the Security Department

    See More
  • Security newswire default

    Nearly Half of Americans Likely to Use Voice Recognition for Personal Verification

    See More
  • Deltek

    How to Use Social Media for Better #Security

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×
At a point of sale, monitoring by video and audio can assist in staff training but also in resolving disputes.  Photo courtesy Louroe Electronics 
At a UPS Store, the store manager usually uses the audio recordings when there is a conflict.  Photo courtesy Louroe Electronics 
 Audio integrated with video provides retail businesses with the ability to monitor,  measure and react to service interactions, says Scott Goodwin and Nick Grace of LMI Systems. Photo courtesy of LMI Systems 

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!