Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityVideo Surveillance

The new rules of security: How AI will transform video surveillance

By Steve Lindsey, Brandon Woolf
camera surveillance
April 6, 2021

The security industry is at a tipping point. For decades, we've relied on a trusted playbook that's guided how we deploy resources, design solutions and adopt technology. But AI and machine learning are quickly transforming the security landscape. And that means it's time for our legacy playbook to get a rewrite.

When it comes to intelligent video surveillance in particular, AI-driven products are beginning to unlock new functionality, and even change the role video surveillance plays for companies. From better sensors to higher resolution cameras to more efficient processing units, we're seeing an unparalleled convergence of hardware and software. And that's creating new opportunities for everything from intelligent threat detection to personalized customer experiences. 

We're just at the beginning of this journey, but it's clear that best practices are changing. Seemingly in real-time, security professionals are reimagining how they'll build their teams, structure engagements and define their value. We're all still building the playbook as we use it, but here are four new, unspoken "rules" for the new world of security - and how they'll continue to evolve thanks to AI.

 

1. Embrace flexible setups

Before recent technological advancements, most security systems only featured motion sensors that triggered alerts based on a percentage of pixels that changed on a screen. That meant security teams spent a lot of time tweaking the camera setup to minimize false positives. In a highly manual and time-intensive process, you could avoid falling leaves or passing headlights that might set off alerts. But it came at the cost of restricting the field of view and leaving certain areas vulnerable to threats.

With AI, you don’t need to compromise. Smart systems can identify the difference between humans, animals, and objects and then trigger alerts based only on those identified signatures regardless of surrounding video noise like blowing leaves, headlights, inclement weather or other factors. This capability allows you to focus specifically on your security goals, which means you can expand your field of view as wide as necessary. 

And with new flexibility comes new opportunities for adaptation and evolution. In the new era, security will need to anticipate new threats and risks. Leading-edge professionals will harness the new setup flexibility to experiment with new approaches and proactively optimize. 

 

2. Maximize economies of scale

With so many false positives, legacy security systems didn’t exactly inspire confidence when it came to the accuracy of alerts. What’s worse, stray foliage or flashes of light could generate hundreds of alerts per night - far too many to responsively address. AI-powered platforms significantly reduce the number of false positives, allowing security teams to take a more cost-effective approach to staffing. 

With intelligent video surveillance, companies can deploy a lean team of remote monitors to keep tabs on several locations. Additionally, they can use smart platforms to communicate with any trespassers or troublemakers in real time and dispatch law enforcement or emergency responders if necessary.

 

3. Look for behavior patterns, not faces

The General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) have created a great deal of anxiety in the industry about privacy. In the world of video, AI-related privacy conversations have largely focused on identity revealing technologies like facial recognition. Critics argue that identity aside, AI could develop algorithms that introduce unfair race or gender biases.

But we think the security benefits from smart video surveillance systems come from identifying specific behavior patterns, not faces. By analyzing common behavior patterns in retail environments, artificial intelligence and machine learning systems can learn to spot abnormal behavior — or suspicious activity that could indicate a problem without ever identifying the individual or inferring any unnecessary bias.

For example, most consumers tend to select one high-value item from a given shelf or approach the register in a moderate gait. So when surveillance platforms detect behavior that deviates from these norms, they can alert security teams to potential threats and risks. Additionally, by shifting from a reactive model that targets individuals to a proactive model that anticipates behaviors, we can avoid scenarios that profile individuals or invite bias.

 

4. Focus on relationship-building, not bad-guy busting

Prioritizing behavior over faces means surveillance systems can go far beyond pinpointing the bad guy. It means they can actually help build and strengthen relationships with valuable customers. 

Especially at a time when retail is looking for new ways to engage customers, companies can use AI to identify signs of someone in need. For example, if the security platform flags a person making sudden body movements or wandering back and forth, it could mean a customer is frustrated or confused. Sending over an employee to help could not only close a sale but also boost customer loyalty.

By expanding our goals beyond threat detection, prevention and mitigation to the enhancement of customer satisfaction and brand value, we can create opportunities to improve the customer experiences and build relationships.

As we continue to train our models, we’re learning more and more about how AI can benefit – and redefine — security. And that means these new “rules” are hardly written in stone. If anything, the final and most important rule might be this: In a world where AI and machine learning push us to new levels of agility and adaptability, the playbook itself is always a work in progress. 

KEYWORDS: artificial intelligence (AI) risk management security cameras video surveillnace

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Lindsey came to LiveView Technologies (LVT) in 2011. He has extensive experience with electronic engineering and specializes in computer programming. He began his career by selling computers and installing CAT 5 and fiber optic cables, and later worked for Novell on their NetWare, GroupWise, and eDirectory technologies, as the CTO at i3 Technologies, as well as starting his own company called AudioShare which was a first-of-its-kind digital audio distribution network. Because of this varied work history, Lindsey has a deep understanding of programming, engineering, networking, digital signal processing, RF engineering, and even physical wiring, all of which has had a powerful influence on LVT’s product offering. He won the 2007 Utah Innovations Award in Electronics Hardware and is currently on the annual selection committee. Lindsey has a bachelor’s degree in electronic and information technologies from Brigham Young University. He is married and has seven children. In his spare time, he enjoys music, including writing and playing four instruments, and biking. 

Brandon Woolf has more than 20 years of experience building companies. He started his career in the Bay Area where he consulted with dozens of high-tech companies before joining Google. While there, Woolf helped grow and develop the G Suite into a multi-billion-dollar product. He then moved from Silicon Valley to the Silicon Slopes to help grow several tech companies — including Lucid Software and MX — before he joined LiveView Technologies as the Vice President of Product. Woolf studied business at Brigham Young University and earned a Master of Commerce and Accounting from the University of Virginia. He has a passion for technology and reaching new possibilities by presenting the right solutions for customers. Woolf is a husband and father of four and loves mountain biking, triathlons, and music.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • parking-lot-freepik

    3 ways video surveillance can boost parking lot security

    See More
  • fire-freepik

    Preventing toxic landfill fires with thermal surveillance

    See More
  • 5 minutes with Raj

    5 minutes with Satish Raj - Why AI will transform digital video surveillance in 2021

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!