Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityVideo Surveillance

The new rules of security: How AI will transform video surveillance

By Steve Lindsey, Brandon Woolf
camera surveillance
April 6, 2021

The security industry is at a tipping point. For decades, we've relied on a trusted playbook that's guided how we deploy resources, design solutions and adopt technology. But AI and machine learning are quickly transforming the security landscape. And that means it's time for our legacy playbook to get a rewrite.

When it comes to intelligent video surveillance in particular, AI-driven products are beginning to unlock new functionality, and even change the role video surveillance plays for companies. From better sensors to higher resolution cameras to more efficient processing units, we're seeing an unparalleled convergence of hardware and software. And that's creating new opportunities for everything from intelligent threat detection to personalized customer experiences. 

We're just at the beginning of this journey, but it's clear that best practices are changing. Seemingly in real-time, security professionals are reimagining how they'll build their teams, structure engagements and define their value. We're all still building the playbook as we use it, but here are four new, unspoken "rules" for the new world of security - and how they'll continue to evolve thanks to AI.

 

1. Embrace flexible setups

Before recent technological advancements, most security systems only featured motion sensors that triggered alerts based on a percentage of pixels that changed on a screen. That meant security teams spent a lot of time tweaking the camera setup to minimize false positives. In a highly manual and time-intensive process, you could avoid falling leaves or passing headlights that might set off alerts. But it came at the cost of restricting the field of view and leaving certain areas vulnerable to threats.

With AI, you don’t need to compromise. Smart systems can identify the difference between humans, animals, and objects and then trigger alerts based only on those identified signatures regardless of surrounding video noise like blowing leaves, headlights, inclement weather or other factors. This capability allows you to focus specifically on your security goals, which means you can expand your field of view as wide as necessary. 

And with new flexibility comes new opportunities for adaptation and evolution. In the new era, security will need to anticipate new threats and risks. Leading-edge professionals will harness the new setup flexibility to experiment with new approaches and proactively optimize. 

 

2. Maximize economies of scale

With so many false positives, legacy security systems didn’t exactly inspire confidence when it came to the accuracy of alerts. What’s worse, stray foliage or flashes of light could generate hundreds of alerts per night - far too many to responsively address. AI-powered platforms significantly reduce the number of false positives, allowing security teams to take a more cost-effective approach to staffing. 

With intelligent video surveillance, companies can deploy a lean team of remote monitors to keep tabs on several locations. Additionally, they can use smart platforms to communicate with any trespassers or troublemakers in real time and dispatch law enforcement or emergency responders if necessary.

 

3. Look for behavior patterns, not faces

The General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) have created a great deal of anxiety in the industry about privacy. In the world of video, AI-related privacy conversations have largely focused on identity revealing technologies like facial recognition. Critics argue that identity aside, AI could develop algorithms that introduce unfair race or gender biases.

But we think the security benefits from smart video surveillance systems come from identifying specific behavior patterns, not faces. By analyzing common behavior patterns in retail environments, artificial intelligence and machine learning systems can learn to spot abnormal behavior — or suspicious activity that could indicate a problem without ever identifying the individual or inferring any unnecessary bias.

For example, most consumers tend to select one high-value item from a given shelf or approach the register in a moderate gait. So when surveillance platforms detect behavior that deviates from these norms, they can alert security teams to potential threats and risks. Additionally, by shifting from a reactive model that targets individuals to a proactive model that anticipates behaviors, we can avoid scenarios that profile individuals or invite bias.

 

4. Focus on relationship-building, not bad-guy busting

Prioritizing behavior over faces means surveillance systems can go far beyond pinpointing the bad guy. It means they can actually help build and strengthen relationships with valuable customers. 

Especially at a time when retail is looking for new ways to engage customers, companies can use AI to identify signs of someone in need. For example, if the security platform flags a person making sudden body movements or wandering back and forth, it could mean a customer is frustrated or confused. Sending over an employee to help could not only close a sale but also boost customer loyalty.

By expanding our goals beyond threat detection, prevention and mitigation to the enhancement of customer satisfaction and brand value, we can create opportunities to improve the customer experiences and build relationships.

As we continue to train our models, we’re learning more and more about how AI can benefit – and redefine — security. And that means these new “rules” are hardly written in stone. If anything, the final and most important rule might be this: In a world where AI and machine learning push us to new levels of agility and adaptability, the playbook itself is always a work in progress. 

KEYWORDS: artificial intelligence (AI) risk management security cameras video surveillnace

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Lindsey came to LiveView Technologies (LVT) in 2011. He has extensive experience with electronic engineering and specializes in computer programming. He began his career by selling computers and installing CAT 5 and fiber optic cables, and later worked for Novell on their NetWare, GroupWise, and eDirectory technologies, as the CTO at i3 Technologies, as well as starting his own company called AudioShare which was a first-of-its-kind digital audio distribution network. Because of this varied work history, Lindsey has a deep understanding of programming, engineering, networking, digital signal processing, RF engineering, and even physical wiring, all of which has had a powerful influence on LVT’s product offering. He won the 2007 Utah Innovations Award in Electronics Hardware and is currently on the annual selection committee. Lindsey has a bachelor’s degree in electronic and information technologies from Brigham Young University. He is married and has seven children. In his spare time, he enjoys music, including writing and playing four instruments, and biking. 

Brandon Woolf has more than 20 years of experience building companies. He started his career in the Bay Area where he consulted with dozens of high-tech companies before joining Google. While there, Woolf helped grow and develop the G Suite into a multi-billion-dollar product. He then moved from Silicon Valley to the Silicon Slopes to help grow several tech companies — including Lucid Software and MX — before he joined LiveView Technologies as the Vice President of Product. Woolf studied business at Brigham Young University and earned a Master of Commerce and Accounting from the University of Virginia. He has a passion for technology and reaching new possibilities by presenting the right solutions for customers. Woolf is a husband and father of four and loves mountain biking, triathlons, and music.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • parking-lot-freepik

    3 ways video surveillance can boost parking lot security

    See More
  • fire-freepik

    Preventing toxic landfill fires with thermal surveillance

    See More
  • Lindsey podcast news header

    A Glimpse of the Future: How AI Will Transform Physical Security

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing