Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Keys to Managing Security Across Growing Organizations & Cities

By Kevin Wine
city_enews
December 8, 2015

The world we live in today is filled with a wide variety of threats, from terror attacks and bombings to active shooters and corporate theft. The security marketplace is changing, as is the nature of risk, and the evolution of security management has come a long way from years past. Security professionals must devise plans that encompass a number of technologies, processes and solutions in order to ensure a high level of safety.

Buildings and cities come in various architectural and geographic layouts, which means there can be no one-size-fits-all solution. Business and municipalities must also protect huge amounts of data and assets across a wide network of facilities, some that are local and some that are a world away.

Evolution of Security Management

As organizations have evolved, threats have evolved as well, challenging security and business leaders to stay one step ahead. In years past, the responsibility of the security leader was to develop and build a robust technology infrastructure of video surveillance, access control and other systems to physically protect from potential threats and risks.

Today, security is a much larger issue — so important that the C-suite is taking note of what is being done by both physical security and IT leaders. Senior leaders recognize the potential costly and damaging disruptions if security risks are not mitigated properly. As a result, IT, physical and cyber security often collaborate to manage risk and ensure security across the entire organization.

It is obvious that the lines between various once-siloed departments are blurring. This is a positive change that drives stronger response to today’s evolving risk environment. Today, security leaders must not only evaluate technology; they need to develop programs and initiatives that help increase situational awareness while helping drive new levels of efficiency.

Technology plays a key role in the evolution of security and risk management.  Strategic investment in a variety of systems and sensors helps security leaders collect and make sense of various data points that drive actionable intelligence. But often times, these systems do not communicate with each other — leading to a time consuming and cumbersome process of manually correlating data together.

Situational awareness is achieved by leveraging critical information from multiple security, risk and business solutions into a single view to expose trends, anomalies or intersections and quickly identify potential vulnerabilities. Situational awareness solutions integrate once-separate technologies into a single, centralized platform, allowing security professionals to improve real-time responsiveness and drive effective security planning.

As the nature of threats evolves, technology continues to evolve as well. New innovations are smarter and faster, and enabling various security agencies, personnel and the general public, to speak to one another through numerous lines of communication to drive higher levels of data capture. Centralized solutions are also able to help maximize analysis and evidence gathering for investigations, incident reconstruction and debriefing, and enable security personnel to plan better, as well as coordinate and share data as necessary.

Sharing information across devices through the use of social media has become habitual for most people around the world, and a way of life for future generations. By engaging the general public, as well as employees within an organization, security personnel can gain a comprehensive picture of incidents as they occur. Civilians can report on suspicious activities, crime or vandalism — anonymously, if desired — in a convenient and accessible way by using their smartphones.

Keys to Proactive Security Management

With data pouring in from all directions and through various sources, an emergency can be cumbersome to manage. Access to timely and relevant information allows for greater efficiency while allowing supporting resources to stay focused on critical responsibilities. A comprehensive picture of an incident should be presented in a step-by-step manner to streamline operator response and minimize the opportunity for human error during an emergency. Reports and audit trail information can benefit enterprises and cities by providing the most relevant information needed to identify and analyze trends, and incidents after they have occurred.  This insight is highly valuable to help identify future threats and trends.

To fully manage security operations, security leaders must place a high premium on preventive intelligence. Given the global threats received against various countries, cities and organizations on an almost daily basis, critical, captured data is a necessity to gain insight into discernable behavior patters and establish evidentiary standards for law enforcement.

Through integration of new technology solutions and big data analysis, security leaders and public safety personnel are able to achieve a greater level of situational awareness to drive actionable intelligence. Once actionable, this intelligence enables security professionals and responders to act quickly and efficiently, enhancing their overall effectiveness and thereby transforming the nature of safety throughout an organization. Through implementation and deployment of these solutions, cities and organizations around the world are realizing the true benefits of situational awareness and actionable intelligence through lowered crime rates, reduced operational and planning costs, and systemized and timely responses to potentially harmful and threatening situations. 

KEYWORDS: citywide security predictive security security management tools security technology Situational Awareness

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kevin Wine, Vice President Marketing - Video and Situation Intelligence Solutions, Verint Systems

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Web Exclusive Logo

    What’s Key to Managing your Keys?

    See More
  • Cox Enterprises

    Managing Security for a Growing Corporate Campus

    See More
  • SEC

    Managing Risk Across the Enterprise

    See More

Related Products

See More Products
  • Hospitality-Security.gif

    Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing