Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceFire & Life SafetyPhysical Security

Drones as security tools

Unmanned aircraft can provide enterprise security teams with a number of potential use cases, including improving incident response, investigations and more.

By Adam Stone
drones for security

Pakhnyushchyy / iStock / Getty Images Plus via Getty Images

November 19, 2021

At LyondellBasell, Global Director of Crisis Management and Security Scott McHugh is using unmanned aerial vehicles (UAVs) to enhance situational awareness at a large-scale manufacturing plant. The drones have proven their value.

“Chemical manufacturing plants tend to be very large with lots of acreages and, in the past, we’ve used security officers to conduct perimeter patrols,” McHugh says. “Drones are able to do those tedious and repetitive tasks very efficiently and rapidly. Plus, they never lose their focus. They are consistently attentive to their task.”

A recent event shows how drones make the company’s security efforts more efficient and effective. “As a security patrol drone was launching and climbing to its patrol height, it noticed, far into the distance, a wisp of smoke coming from an area of our property that was remote, undeveloped and difficult to access well over a mile away,” he shares. “We changed the patrol path and sent the drone to the area in question to further investigate and discovered a brush fire, which was immediately reported to our on-site fire department. It’s very unlikely that a manned security patrol would have seen that fire.”

Security industry professionals say drones have the potential to enhance their efforts across a range of industries. With eyes in the sky, security teams can expand their situational awareness while making more effective use of their human resources.


Why Drones?

“Drones give security a unique situational awareness benefit,” says Mark McCourt, Chair of the Security Industry Association’s Robotics, Drones & AI Working Group. “You’re gathering valuable sensor data that can be immediately shared. If you’re securing a facility and the perimeter, there is no better viewpoint than being in the sky.”

Drones have the potential to expand intelligence of an area, “especially in a difficult [or hazardous] environment,” says Mark Schreiber, CPP, CPD, President and Principal Consultant at Safeguards Consulting Inc.

“Say you have a fire or an explosion on a site: You need to see everything going on around that location,” Schreiber says. “With a drone, we can quickly fly over and have someone at the command station gathering that video, disseminating it to all the people that need to assess the situation and identifying the appropriate response — all without exposing a human to the environment.”

At AVANGRID, which owns 10 utility companies, Vice President and Chief Security Officer Brian Harrell says that the company uses drones primarily to track maintenance issues, but that this capability can simultaneously be leveraged in support of security.

“We own and operate a number of drones as it relates to transmission line inspections, storm damage review, things like that,” he says. “In doing that, if they recognize that there are gunshots in the side of our transformers or large insulators, security is immediately notified. Because of that drone footage and that information that we’re receiving from the drone, we are able to open up an investigation to figure out what happened and how we mitigate it for the future.”


Potential Use Cases

At CEVA Logistics, which operates close to 200 warehouses nationwide, Vice President of Global Security James McDonald has utilized drones as a force multiplier.

“A drone is not going to be asleep at two o’clock in the morning over a long holiday weekend,” he says. In addition, drones can go where people can’t. “For example, a guard won’t be able to physically walk a fence line in a low-lying marshland area, whereas a drone can provide coverage regardless of the terrain.”

McDonald also finds value in drones’ follow-up capabilities. “The drone has been used in a few incidents to follow fleeing suspects and provide police with real-time tracking information for a successful resolution,” he says.

In addition to real-time tracking of suspicious activities, McCourt says drones can provide evidentiary value to enterprise security teams. “People can only recall from memory, unless body cameras are deployed and active — which is still rare in private security,” he says. “Drones record audible evidence. This is actual evidence that can be used to manage live events as well as for forensics.”

Another application for unmanned assets, McCourt says, is facilitating collaboration among security teams. “Consider a facility fire. You can have the state, the city, the county, Hazmat, the fire department and federal resources all looking at the exact same drone-created information and deciding the best way to manage an incident,” he says. “It allows you to coordinate your response, to put your resources against the threat most effectively, while also not unnecessarily putting people at risk.”

As a private investigator who has worked extensively in the financial services sector, Scott Snide says banks and other institutions can tap drone-generated data to monitor for changes that might signal a security issue in the making.

“You can use the drone's historical flight data to create a facility baseline,” Snide says. “You can verify that a skylight or a fence was intact at a certain time, for example. If there are changes to the baseline, you can backtrack through video surveillance camera footage, security guard logs or maintenance records to further investigate what caused the changes.”

Likewise, he suggests, routine drone patrols can catch potential gaps in security protocols — gaps that a human patrol officer might miss. From its high-level view, a drone could take note of inadequate illumination in a parking lot. “The security manager can instantly identify if the lighting is actually effective in that area, and if a dead spot is found, adjustments can be made,” he says.

At the same time, drones can be used to forge a deeper partnership between security teams and local law enforcement agencies. McHugh, for example, has loaded his drones with license plate data from the Texas stolen car ‘hot sheet.’ As the drone passes by a parking lot, it can compare license plates against those on the hot sheet. Security staff have actually spotted some stolen cars this way. “We have been able to pass that information to the local police for follow-up, and they’ve recovered stolen vehicles as a result,” he says.


Best Practices

A few key best practices help support effective drone use for security purposes. First, it’s worth noting that anyone piloting a drone for commercial purposes must obtain an Federal Aviation Administration (FAA) certification to do so. “We have security officers that we sent through the Part 107 small UAV (sUAV) pilot training so they could successfully take the test to obtain FAA certification. The training takes about two-plus weeks on average to complete,” McHugh says. “We have an FAA-certified sUAV pilot on every shift, so there is a pilot always available to oversee the flight of the security drones and to take command of the drone if needed.”

Operators must also respect privacy. That means you don’t fly over adjacent properties, and it means you have clear policies about how drone-generated data is to be used. In general, these policies will mirror a security team’s existing protocols.

“You already have security cameras — they just happened to be fixed, whereas the camera on a drone is mobile,” Schreiber says. “The same general expectations come into play, but the policy should be explicit in saying that the drone video will be treated in the exact same manner. We will not put a security camera that monitors the interior of a bathroom, and we would never ask a drone to fly by a bathroom window and look inside.”

Ideally, an enterprise security team’s drone policy will spell out all aspects of its use plan, from operations to data retention. “We strongly recommend that you have a formal and comprehensive drone security program,” Schreiber says. “The key thing is to develop an understanding across the organization of what that drone will be doing, what it is expected to do and what it is not going to be allowed to do. You need to define that and communicate that.”

KEYWORDS: drones enterprise security risk management unmanned aircraft systems

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Adam Stone is a contributing writer for Security magazine. He has covered IT issues in the public and private sectors for more than 20 years. In addition to following security trends, he writes on military technology, education-tech, government IT and diverse others issues.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Drones

    Drones as security tools

    See More
  • SEC0819-VMS-Feat-slide1_900px

    Video Management Systems for Your Security Enterprise

    See More
  • SEC0821-Cover-Feat-slide1_900px

    Top de-escalation strategies and training for security leaders

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!