Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Keys to Managing Security Across Growing Organizations & Cities

By Kevin Wine
December 8, 2015

The world we live in today is filled with a wide variety of threats, from terror attacks and bombings to active shooters and corporate theft. The security marketplace is changing, as is the nature of risk, and the evolution of security management has come a long way from years past. Security professionals must devise plans that encompass a number of technologies, processes and solutions in order to ensure a high level of safety.

Buildings and cities come in various architectural and geographic layouts, which means there can be no one-size-fits-all solution. Business and municipalities must also protect huge amounts of data and assets across a wide network of facilities, some that are local and some that are a world away.

Evolution of Security Management

As organizations have evolved, threats have evolved as well, challenging security and business leaders to stay one step ahead. In years past, the responsibility of the security leader was to develop and build a robust technology infrastructure of video surveillance, access control and other systems to physically protect from potential threats and risks.

Today, security is a much larger issue — so important that the C-suite is taking note of what is being done by both physical security and IT leaders. Senior leaders recognize the potential costly and damaging disruptions if security risks are not mitigated properly. As a result, IT, physical and cyber security often collaborate to manage risk and ensure security across the entire organization.

It is obvious that the lines between various once-siloed departments are blurring. This is a positive change that drives stronger response to today’s evolving risk environment. Today, security leaders must not only evaluate technology; they need to develop programs and initiatives that help increase situational awareness while helping drive new levels of efficiency.

Technology plays a key role in the evolution of security and risk management.  Strategic investment in a variety of systems and sensors helps security leaders collect and make sense of various data points that drive actionable intelligence. But often times, these systems do not communicate with each other — leading to a time consuming and cumbersome process of manually correlating data together.

Situational awareness is achieved by leveraging critical information from multiple security, risk and business solutions into a single view to expose trends, anomalies or intersections and quickly identify potential vulnerabilities. Situational awareness solutions integrate once-separate technologies into a single, centralized platform, allowing security professionals to improve real-time responsiveness and drive effective security planning.

As the nature of threats evolves, technology continues to evolve as well. New innovations are smarter and faster, and enabling various security agencies, personnel and the general public, to speak to one another through numerous lines of communication to drive higher levels of data capture. Centralized solutions are also able to help maximize analysis and evidence gathering for investigations, incident reconstruction and debriefing, and enable security personnel to plan better, as well as coordinate and share data as necessary.

Sharing information across devices through the use of social media has become habitual for most people around the world, and a way of life for future generations. By engaging the general public, as well as employees within an organization, security personnel can gain a comprehensive picture of incidents as they occur. Civilians can report on suspicious activities, crime or vandalism — anonymously, if desired — in a convenient and accessible way by using their smartphones.

Keys to Proactive Security Management

With data pouring in from all directions and through various sources, an emergency can be cumbersome to manage. Access to timely and relevant information allows for greater efficiency while allowing supporting resources to stay focused on critical responsibilities. A comprehensive picture of an incident should be presented in a step-by-step manner to streamline operator response and minimize the opportunity for human error during an emergency. Reports and audit trail information can benefit enterprises and cities by providing the most relevant information needed to identify and analyze trends, and incidents after they have occurred.  This insight is highly valuable to help identify future threats and trends.

To fully manage security operations, security leaders must place a high premium on preventive intelligence. Given the global threats received against various countries, cities and organizations on an almost daily basis, critical, captured data is a necessity to gain insight into discernable behavior patters and establish evidentiary standards for law enforcement.

Through integration of new technology solutions and big data analysis, security leaders and public safety personnel are able to achieve a greater level of situational awareness to drive actionable intelligence. Once actionable, this intelligence enables security professionals and responders to act quickly and efficiently, enhancing their overall effectiveness and thereby transforming the nature of safety throughout an organization. Through implementation and deployment of these solutions, cities and organizations around the world are realizing the true benefits of situational awareness and actionable intelligence through lowered crime rates, reduced operational and planning costs, and systemized and timely responses to potentially harmful and threatening situations. 

KEYWORDS: citywide security predictive security security management tools security technology Situational Awareness

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kevin Wine, Vice President Marketing - Video and Situation Intelligence Solutions, Verint Systems

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • What’s Key to Managing your Keys?

    See More
  • Managing Security for a Growing Corporate Campus

    See More
  • Managing Risk Across the Enterprise

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing