Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Keys to Managing Security Across Growing Organizations & Cities

By Kevin Wine
December 8, 2015

The world we live in today is filled with a wide variety of threats, from terror attacks and bombings to active shooters and corporate theft. The security marketplace is changing, as is the nature of risk, and the evolution of security management has come a long way from years past. Security professionals must devise plans that encompass a number of technologies, processes and solutions in order to ensure a high level of safety.

Buildings and cities come in various architectural and geographic layouts, which means there can be no one-size-fits-all solution. Business and municipalities must also protect huge amounts of data and assets across a wide network of facilities, some that are local and some that are a world away.

Evolution of Security Management

As organizations have evolved, threats have evolved as well, challenging security and business leaders to stay one step ahead. In years past, the responsibility of the security leader was to develop and build a robust technology infrastructure of video surveillance, access control and other systems to physically protect from potential threats and risks.

Today, security is a much larger issue — so important that the C-suite is taking note of what is being done by both physical security and IT leaders. Senior leaders recognize the potential costly and damaging disruptions if security risks are not mitigated properly. As a result, IT, physical and cyber security often collaborate to manage risk and ensure security across the entire organization.

It is obvious that the lines between various once-siloed departments are blurring. This is a positive change that drives stronger response to today’s evolving risk environment. Today, security leaders must not only evaluate technology; they need to develop programs and initiatives that help increase situational awareness while helping drive new levels of efficiency.

Technology plays a key role in the evolution of security and risk management.  Strategic investment in a variety of systems and sensors helps security leaders collect and make sense of various data points that drive actionable intelligence. But often times, these systems do not communicate with each other — leading to a time consuming and cumbersome process of manually correlating data together.

Situational awareness is achieved by leveraging critical information from multiple security, risk and business solutions into a single view to expose trends, anomalies or intersections and quickly identify potential vulnerabilities. Situational awareness solutions integrate once-separate technologies into a single, centralized platform, allowing security professionals to improve real-time responsiveness and drive effective security planning.

As the nature of threats evolves, technology continues to evolve as well. New innovations are smarter and faster, and enabling various security agencies, personnel and the general public, to speak to one another through numerous lines of communication to drive higher levels of data capture. Centralized solutions are also able to help maximize analysis and evidence gathering for investigations, incident reconstruction and debriefing, and enable security personnel to plan better, as well as coordinate and share data as necessary.

Sharing information across devices through the use of social media has become habitual for most people around the world, and a way of life for future generations. By engaging the general public, as well as employees within an organization, security personnel can gain a comprehensive picture of incidents as they occur. Civilians can report on suspicious activities, crime or vandalism — anonymously, if desired — in a convenient and accessible way by using their smartphones.

Keys to Proactive Security Management

With data pouring in from all directions and through various sources, an emergency can be cumbersome to manage. Access to timely and relevant information allows for greater efficiency while allowing supporting resources to stay focused on critical responsibilities. A comprehensive picture of an incident should be presented in a step-by-step manner to streamline operator response and minimize the opportunity for human error during an emergency. Reports and audit trail information can benefit enterprises and cities by providing the most relevant information needed to identify and analyze trends, and incidents after they have occurred.  This insight is highly valuable to help identify future threats and trends.

To fully manage security operations, security leaders must place a high premium on preventive intelligence. Given the global threats received against various countries, cities and organizations on an almost daily basis, critical, captured data is a necessity to gain insight into discernable behavior patters and establish evidentiary standards for law enforcement.

Through integration of new technology solutions and big data analysis, security leaders and public safety personnel are able to achieve a greater level of situational awareness to drive actionable intelligence. Once actionable, this intelligence enables security professionals and responders to act quickly and efficiently, enhancing their overall effectiveness and thereby transforming the nature of safety throughout an organization. Through implementation and deployment of these solutions, cities and organizations around the world are realizing the true benefits of situational awareness and actionable intelligence through lowered crime rates, reduced operational and planning costs, and systemized and timely responses to potentially harmful and threatening situations. 

KEYWORDS: citywide security predictive security security management tools security technology Situational Awareness

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kevin Wine, Vice President Marketing - Video and Situation Intelligence Solutions, Verint Systems

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • What’s Key to Managing your Keys?

    See More
  • Managing Security for a Growing Corporate Campus

    See More
  • Managing Risk Across the Enterprise

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products

Events

View AllSubmit An Event
  • May 21, 2026

    From Referral to Response: Managing Domestic Violence Threats in the Workplace

    Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.
  • April 21, 2026

    The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

    ON DEMAND: Organizations monitor their networks and systems for risk, yet people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing