Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical SecurityVideo Surveillance

How Security System Automation Can Help Tackle Operator Fatigue

By Jean-Marc Robillard
guard-enews
February 26, 2019

The days of a security officer spending their shift watching a few rows of grainy video footage are long gone. Operators today are being asked to actively monitor events from hundreds of video cameras, while also overseeing countless alarms from other devices such as door readers, intrusion panels, perimeter detection sensors, building automation controls and more.

Operators working in mission-critical environments such as airports, cities or public utilities can be alerted to thousands of events per minute. This could include a door that was accidentally bumped open, a bag that was left behind for a few minutes, a camera that dropped offline, an animal that triggered a perimeter breach, or a real event that requires their urgent attention.

Every day, these operators must stay on top of each event, decipher which ones are priorities versus false alarms, and know how to handle every scenario according to compliance standards or company policies. In many cases, these operators are still sifting through paper-bound binders to find out exactly what steps need to be taken to reach resolution.

To say it’s an overwhelming task is an understatement. It’s humanly impossible to actively monitor all these events and take necessary actions without becoming overburdened and stressed.
 

Keeping a New Generation of Operators Engaged

The demographics of people stepping into these positions are also changing. While control room chairs used to be filled with trained security officers, retired police officers and ex-military personnel, there’s a new wave of younger, tech-savvy operators now sitting beside them. Whether Gen-Xers or Millennials, these operators have essentially grown up with technology in the palms of their hands. Some even have computer science backgrounds. They engage with security technology in different ways than their predecessors. Between them, they share tips and tricks on online forums, looking for new ways to optimize the system to simplify their tasks. Their biggest challenge often stems from the frustration of working with what they might perceive to be outdated technology.    

For these reasons, organizations are taking a closer look at how more automated solutions can help streamline workflows, reduce operator fatigue and keep younger operators engaged and motivated. One such solution is a collaborative decision management system.
 

How Decision Management Systems Reduce the Operator Load

A modern collaborative decision management system can provide organizations with new levels of situational intelligence and incident management. It allows security personnel to make the right decision when faced with routine tasks or unanticipated situations by ensuring a timely flow of information.

A decision management system moves beyond simple event and alarm management. Instead, the solution provides greater levels of automation by collecting and quantifying data from thousands of sensors and devices. Through an advanced rules engine, the system can spot complex situations by correlating various events from all sensors and classify them into individual incidents. The system will then alert operators to the most urgent priorities, while guiding them in their response following organization-specific processes and compliance requirements.

With a common operating picture, prioritized incidents and guided response, operators can confidently handle any situation. For example, based on pre-defined rules, the system would be able to decipher the difference between someone leaning up against a door and a door being forced open. While each event would be bookmarked and recorded, the system would bring the operator’s attention to the forced entry incident, displaying video of what’s happening while providing step-by-step instructions to reach resolution. In the background, the entire incident – from the moment the alarm was triggered through all the steps the operator took to resolve the situation – is automatically logged in the system. This takes a huge load off the operator who can then quickly jump to the next task and diffuse other potential vulnerabilities.

For events deemed less urgent, such as a camera falling offline, the system can automatically trigger a maintenance request without requiring operator intervention. For instance, an organization can implement a rule that tells the security system to send an email or SMS to maintenance crew when a camera goes down. The task is handled by other specialized personnel, while the control room operator can concentrate on issues that require more hands-on intervention or investigation.
 

Taking the Benefits of System Automation Further

What’s even more interesting is seeing how control room managers and supervisors are using this incident data to review internal policies and processes. On a monthly basis, they can pull incident reports, compare how common scenarios were handled, and then potentially identify improvements. For instance, they might notice that their operators need additional training or that certain response processes should be updated. They can also use these reports during compliance audits to show industry or government organizations how their team is working in accordance with new laws or standards. And, all that information is available to them at the click of a mouse button.

The automation of tasks even extends into the secure transfer of evidence and flexible reporting. There is no longer a need for an operator to spend time copying files to USB sticks and hand-delivering evidence to law enforcement. Instead, everything that gets classified and logged within an incident can be transferred over to a digital evidence repository. From there, the operator can securely email digital files to authorized individuals in other agencies. Any time a permitted user views or downloads a file, the action is logged, ensuring chain of custody is always retained.

 

Making Sure Operators Are Better Prepared

Operators are overwhelmed and tired. When there are hundreds of cameras to watch, thousands of sensors to manage, and alarms sounding at every turn, there is little reason to wonder why.

A collaborative decision management system helps to automate tasks and streamline workflows, ultimately empowering operators to quickly and confidently handle any situation. So whether an operator is a trained security officer who has been on the job 10 years or a tech-savvy Millennial fresh out of university, an organization can ensure that their security team is better prepared to handle stressful situations, and that their security operations always remain efficient and compliant.  

KEYWORDS: operator fatigue security management system security system automation security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jean-Marc Robillard is Product Marketing Manager of Mission Control and the SDK Program, at Genetec and is responsible for the marketing, sales, and channel support for both product lines. Since March 2018, he has brought 18 years’ worth of experience in start-ups and large organizations alike, such as Oracle and Kronos, and performed a variety of roles including system administration, technical training, product management, business development, and digital marketing. He has degrees in both marketing and computer science and plays guitar and keyboard in his spare time.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • vendor selection

    Many Vendors, Many Decisions: How Safeguarding your Vendor Selection Practices Can Help Reap Rewards for your Security Enterprise

    See More
  • school-enews

    How Security Professionals Can Help Create Positive School Memories

    See More
  • Elementary school supplies

    How Schools Can Use Strategic Communication to Tackle Rising Cyber Threats

    See More

Related Products

See More Products
  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • 9780367667887.jpg

    Surveillance, Privacy and Security

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

See More Products

Events

View AllSubmit An Event
  • March 8, 2012

    iSecurity Virtual Tradeshow

    iSecurity is a FREE online event designed to put the information you need, the people you want to network with and the solution providers you want to hear from at your fingertips.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!