Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementVideo SurveillanceRetail/Restaurants/Convenience

Implementing AI security solutions: A crawl-before-you-run strategy

By Ben Ziomek
AI robot
September 15, 2021

In navigating the shift from burglar alarms to digital security systems, many organizations are adopting artificial intelligence (AI) to bolster their security postures. In fact, a large majority of security operation centers (SOCs) employ AI and machine learning tools to detect advanced threats. However, not all AI is created equal and reaching too high too quickly with technological solutions can leave security teams with unclear or inefficient workflows. To get the most out of new technologies, security practitioners should focus on starting small with foundational AI technologies in order to lay the groundwork for a more reliable and mature security system.

It’s important to keep in mind that AI technology is still maturing every day. New AI tools for security, often related to computer vision and surveillance camera analytics, are continually surfacing on the market. Often many organizations feel pressured to try the “latest and greatest” and end up testing expensive solutions that don’t deliver what they promise, which turns them off to using AI entirely.

In some cases, too-advanced systems can provide a lower ROI 

In most fields these promises are easy to see through and organizations quickly become savvy to vendors that overpromise and underdeliver. For example, there is no AI that comes close to being able to flag “suspicious people,” and this also opens the doors for privacy and ethical issues.

Retail is one industry where organizations feel pressure to buy the most advanced security solutions such as shoplifting detection. Technologies like Amazon Go and Standard Cognition make it possible to track every piece of merchandise in a store and reliably detect when a person leaves with items they did not pay for.

But this type of technology is extremely difficult and expensive to adopt, as it involves installing thousands of new hardware devices throughout stores, not to mention the added cost of servers, cloud computing power and software. Few retailers are able to stomach the high costs of advanced loss-prevention systems, and will often simply give up on AI-based security entirely and miss out on opportunities to start small and build up.

While shoplifting detection systems that use more limited hardware exist, they could fall short of performance expectations and may be plagued with false positives and false negatives. At best, they require dedicated staff to install, tweak and monitor the systems, which can be a heavy lift for organizations taking their first steps into AI-powered security. As a result, firms end up frustrated and fail to explore alternative AI-solutions that can provide more realistic outcomes for less time and money investment.

Start small with threat detection and occupancy tracking

In general, organizations looking to leverage AI to improve security should learn to crawl before they run. Before starting to sprint toward more advanced AI solutions such as facial recognition or shoplifting detection, security teams should try to use simpler techniques to address persistent issues.

For example, it’s easy for facilities and building security teams to leverage intruder detection sensors to identify after-hours thefts or use loitering detection on existing cameras to identify people lingering for too long outside buildings or facilities. Even hardware sensors for counting occupancy can be a good first step to the adoption of new security tech. There is over $150 billion in unused office space globally. The insights and trends surfaced from occupancy tracking can help building managers assess space utilization in order to make better decisions that minimize costs. This is especially helpful for adapting to changing office needs in a post-pandemic world. For example, managers may decide to keep only certain areas of a building lit instead of an entire floor.

In another example, the construction industry must ensure that workers are wearing personal protection equipment (PPE) like hard hats at all times, but they don’t always comply. Each year, there are 9,000 accidents that come about due to the use, maintenance and failure to use the PPE that’s appropriate for the task at hand, according to Health and Safety Executive (HSE). Security cameras equipped with AI-powered computer vision software can help staff continuously monitor PPE usage on the job and instantly security and safety staff to a violation. With worksite injuries costing the construction industry a staggering $11 billion in direct costs and lost productivity annually, creating a safer work environment is critical. AI also dramatically improves the “signal-to-noise” ratio, allowing operators to rapidly search for and pull up frames of detected incidents on multiple cameras at once, saving dozens of operator-hours per month.

All of these approaches provide a clear, measurable return on investment. And most critically, adopting simpler AI systems gives security teams practice in interfacing with this new type of technology, improving their capabilities and comfort level once the time does come to make the jump to more sophisticated systems.

Man and machine working together

That said, organizations hoping to leverage AI to improve security operations and building management need to acknowledge the realistic capabilities of the technology. AI can detect specific actions and objects, but there’s no AI in development that is even close to being able to replace security personnel. AI can indicate that an object looks like a weapon or that someone is loitering, but it still can’t understand the context around situations. To get the most out of their AI technology investments, organizations should always keep in mind that the data it delivers is just a tool that requires human reasoning to deliver outcomes.

KEYWORDS: artificial intelligence (AI) asset protection loss prevention threat detection

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ben Ziomek is the CTO of Actuate.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Red laptop

Cybersecurity leaders discuss Oracle’s second recent hack

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • video collaboration

    Effective video collaboration: What you need to consider before investing in a system

    See More
  • Security Cameras on Building

    Best practices for implementing a new security camera system

    See More
  • gun safety

    How AI helps prevent shootings before a single shot is fired

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing