Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical SecurityVideo SurveillanceGovernment: Federal, State and Local

It’s Time to Get Smart About False Alarm Reduction

By Sudhi Sinha, Joe Oliveri
alarm responsive default
March 12, 2019

If there is anything the security industry has learned over the past few years, it’s that this industry is not static. There are constant changes in technology and threats which can range from worrying about a possible break-in to employee theft or protecting a facility, its assets and employees. Security professionals are having to stay up to date with the latest and greatest security system technologies and adapt existing solutions quickly in order to keep their assets and information safe.

In recent years, the industry has seen increased consolidation in solutions with the rise of integrated security systems. Video surveillance and access control are two examples of traditional security systems that are continuously being connected to other security and building systems to help strengthen security strategies. According to Johnson Controls second annual Smart Cities Indicator, systems integration is expected to have the biggest impact on the implementation of smart cities and buildings over the next five years. This shows the importance of systems integration in relation to not only the security industry, but also how it’s becoming a crucial component for buildings and cities to operate more efficiently. However, there is a new security issue that is plaguing systems and causing a $3.2 billion industry issue – false alarms.
 

False Alarms: A Rising Industry Problem

Since the first network alarms and central station were established in the 1870s, security professionals have continuously sought improvements in their systems to prevent loss, maximize safety and increase operational efficiency. In a national survey of police chiefs, officers and sheriffs, more than 90 percent acknowledged that alarms help deter burglary attempts and assist in apprehending suspects. It’s clear that when executed correctly, alarm systems work well, but as they start to play a more critical role in integrated security systems, many are finding that these traditional alarm systems are actually doing more damage than good with the increase of false or redundant alarms.

Traditional alarm systems are growing increasingly outdated when integrated with other IoT solutions. With the increased intelligence and data processing these alarm systems are actually creating a lot of irrelevant noise – both literally and figuratively – in the form of false or redundant alarms. It is estimated that over 90 percent of notifications are false alarms. This enormous rate of alarm activity can be caused by a variety of sources including policy updates, new system configurations, product changes, employee turnover, sensor functioning and even external influences like weather. For example, a lingering balloon after an office party can trigger a motion sensor, and result in having facility managers come to work after hours or call emergency responders to the scene wasting public resources time and energy. On top of that, hefty fines can be issued to organizations that are repeat false alarm offenders. Today, for example, Minneapolis charges $500 for the fifth false alarm within a year, and other cities are following suit with setting up fines and even legislation to hold organizations more accountable.

Its clear false alarms are having real implications on the function of today’s security systems. The stress they create is causing an unnecessary burden for facility owners, managers and building occupants, but also law enforcement and emergency responders. On top of that, these false alarms also can result in system overload and decreased function, impacting the overall safety and security of occupants and facilities while driving up operating costs.


What’s the Solution?

With more and more organizations completing digital transformations and adopting Internet of Things (IoT) platforms, security professionals are starting to realize that they can use data to improve their security systems and increase the efficiency of these systems. With these new platforms, there is a huge opportunity to implement new analytical software to decrease the number of false alarms that are currently plaguing security systems across a variety of industries including banking, retail, and energy, to name a few.

Enter analytics and machine learning. With a software solution that leverages these two technologies, the data these systems are collecting can be processed to identify alarm patters and provide insights and recommended actions to security professionals on how to prevent false alarms or de-trigger them once they’ve occurred.

While some of the benefits may be obvious like saving emergency responders time and energy, reducing false alarms also saves security professionals time, energy and money leading to increase productivity and operational efficiency since they are no longer bogged down with false alarms. As these technologies are integrated with existing security systems and adopted on a broader scale, public and private resources will be utilized more effectively, increasing safety and decreasing security costs. It will also help organizations transition from a reactive model to a proactive and preventive one.

 

Scalability and the Future of False Alarm Reduction

As more comes to light about this industry problem and the associated cost savings and ROI of data analytics in relation to false alarm solutions, increased adoption is bound to follow. Additionally, with more organizations continuing to implement digital solutions and IoT platforms, it will be crucial to educate security professionals about false alarms and the costliness of this industry problem. While no organization wants to hear that they have to rip and replace existing technology there are existing vendor agnostic solutions that can help achieve a smarter, safer workplace

It is important for facility managers to prioritize employee and asset safety, both physical and digital, and take steps now rather than later to bring their security into the 21st century by implementing digital solutions. It is an exciting time in the security and buildings industry, to be in the midst of such an important transformation. We can only go forward from here.

KEYWORDS: city security Internet of Things (IoT) public safety security technology smart city

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sudhi sinha headshot
Sudhi Sinha is the vice president and general manager of Digital Solutions at Johnson Controls, focusing on bringing value to customers by reducing costs, minimizing risk and failures, and improving the comfort, health and safety of buildings and its occupants. Through his leadership, Sudhi helps create and commercialize new data-enabled and Internet of Things (IoT) offerings. He has full P&L responsibilities for the business including sales, operations, product management, marketing and technology development functions. In his more than 20 years of experience in business management and engineering, Sudhi has achieved several granted and pending patents in smart building technologies, and has published two books on big data and IoT. Sudhi lives in Milwaukee, Wis., U.S. and holds a bachelor’s degree in Engineering and Production Engineering from Jadavpur University, India.
Joe oliveri

As vice president and general manager, security, for Johnson Controls Building Solutions North America, Joe Oliveri manages the full P&L responsibility for the security business in the U.S. and Canada. He also leads the company’s Advanced Integration Business and plays an integral role in the company’s network of security innovation programs. Joe holds a Master’s Degree in Business Administration from Northeastern University and a Bachelor’s Degree in Mechanical Engineering from Worcester Polytechnic Institute.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security newswire default

    Government Officials Optimistic About Benefits of Smart Cities

    See More
  • surveillance 2 responsive default security

    Government Officials Optimistic about Smart Cities

    See More
  • security guard freepik

    Why now is a crucial time to protect the mental health of security workers

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!