Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity NewswireSecurity Leadership and ManagementSecurity & Business ResilienceIdentity ManagementPhysical Security

Utilizing data analytics in physical security

By Farhad Tajali
Security data analytics
December 7, 2021

The increase in use of technology and the Internet of Things (IoT) in the security industry has led to the generation of massive amounts of data points each day. From smart interconnected systems to access control, surveillance and incident management systems, technology can produce powerful insights and guide security teams’ data-driven decision-making. To combat new and existing emerging threats, security professionals must be proactive in identifying security gaps and risks using data analytics.

The story

The tale of pursuing data analytics’ utilization in the security field started with an experience, led to a hypothesis and ended with validated research findings. With a degree in Information Systems and experience working in both healthcare and banking industries as an analyst and later as a network engineer, data was always a critical asset. Upon transitioning to the physical security field, utilizing data and creating specific metrics to measure operational effectiveness was indisputable, but it appeared to be a new phenomenon amongst many of my security professional colleagues. This experience became evident when I led and directed a security metrics program implementation several years ago for a Fortune 100 company.

The implementation included the rollout of an incident management system (i.e., applications such as dispatch, incident reporting, investigations, task management and guard tours), data collection and analysis and data visualization. Data utilization by many of the security professionals was truly a new phenomenon and the skill gap was apparent. At times, there was even a strong resistance to implement a security metrics program from many security leaders.

The hypothesis

The question emerged; is the security industry lagging in integrating data analytics into their daily operations and translating quantitative data into practical insights? This is a study I conducted at the University of Southern California while pursuing a doctoral degree in Organizational Change and Leadership. The study focused on security professionals with a lens on skill gaps and assets. The research explores knowledge, motivation and organizational influences (KMO) to identify assets and needs impacting the utilization of data analytics in the field of physical security.

The study was guided by three research questions:

  1. What is the security professionals’ knowledge in the context of using data analytics to inform data-driven decision-making?
  2. What is the security professionals’ motivation in the context of using data analytics to inform data-driven decision-making?
  3. How do the organizational context and culture either facilitate or hinder their efforts in implementation and use of data analytics?

Purpose of study

The purpose of this study was to evaluate the utilization of data analytics by security professionals in the field of physical security. Upon conducting the literature review, scholarly sources supported the hypothesis that security professionals lack effective utilization of data for process improvement, risk mitigation and to inform their decision-making.

The study used explanatory sequential mixed methods including surveys and interviews. Survey data was obtained from over 250 security professionals from the United States and 43 other countries globally. Additionally, data from seven security professionals was obtained through interviews. Security professionals were recruited using various security organizations, including the ASIS Connects community of global security professionals. The participants represented various positions such as manager (33.6%), director (22%) and Chief Security Officer (CSO) (10.4%), among other security positions, and 77% of respondents reported more than 10 years of experience in the security field.


Results and findings

The study found three key findings impacting security professionals’ slow adoption of data analytics through triangulation of both quantitative and qualitative research data. The three key findings include inadequate data analytical skills (Procedural knowledge); lack of motivation to engage in data collection and analysis (Self-efficacy); and provisioning of resources (Cultural setting).

Knowledge influence

When asked to identify barriers in utilization of data, security professionals reported knowledge and resources as the two main barriers in their profession. Additionally, 94% of security professionals who currently do not perform any form of data analysis reported they would utilize data analytics if they knew more about how to use them effectively.

 Table 1

Security professionals’ responses to additional knowledge items indicated various levels of familiarity in utilization of data analytics. Security professionals were asked to indicate their familiarity level with the below survey items related to data analytics:


Motivation influence

The self-efficacy-related survey items measured security professionals’ motivation in utilizing data analytics. Security professionals (71.1%) reported they were “not at all confident” to “moderately confident” in their ability to perform data analysis, while only 28.9% reported they were “extremely confident” in their ability. 

Similarly, 76.3% of security professionals reported their ability to perform data analysis to measure their security programs’ effectiveness as “not at all adequate” to “moderately adequate,” while 23.7% reported their ability as “extremely adequate.”

 

As illustrated below, 94% of security professionals reported they would use security metrics if they knew how to use them effectively, while only 6% of participants reported they would not engage in use of security metrics. Data suggested that an overwhelming gap in knowledge exists for those security professionals who do not currently perform data analysis, therefore hindering their self-efficacy.


Data also suggested that security professionals perceive high utility value in using security metrics to inform their decision-making process. Over half of respondents reported security metrics would be “extremely likely” to inform their decision-making process, followed by 42.4% of participants who reported security metrics would “likely” inform their decision-making process. Similarly, 56.3% of respondents reported they would be “extremely likely” to attend a training program on security metrics if one was offered by their organization, followed by 37.2% reporting they would likely attend a training program on security metrics, stressing security professionals’ high utility value in utilizing data analytics.

Organizational influence

Security professionals reported that the organizational climate provided support for utilization of data analytics. Data suggested the level of support was even higher for those security professionals who currently engage in utilization of data. Additionally, most security professionals (88.4%) either “agree” or “strongly agree” that their organizations’ leaders are supportive of utilization of data analytics, compared to 11.7% who either “strongly disagree” or “disagree” regarding the same issue. This result highlights strong leadership support for the utilization of data analytics and finds that leadership support is not one of the barriers to utilization of data analytics by security professionals.

Recommendations

Security professionals do not need to be data scientists, but they should strive to be data champions within their organizations. To be a data champion, the skill gaps identified in this study should be addressed using adequate training and resources. Using data, security professionals can tell a better story of the state of security within their organizations. Such intelligence can lead to proactive risk mitigation, effective program management and places the organization in a place of advantage when facing new threats.

Security leaders should also insert the “utilization of data” in their conversations with their teams and hold their vendors and security contractors accountable for provisioning data to gain business intelligence within their respective areas. Leaders should also ensure access to data analytics training is available and incentivized for their teams.

Kiron and Shockley posit that organizations reside in three stages of analytics utilization cycle: aspirational, experienced and transformed. Organizations in the aspirational stage use data analytics sparingly or, at times, not at all. Organizations in the experienced stage utilize data analytics as a tactical tool. However, strategic impact of data analytics to the organization and change is limited. Transformed organizations utilize data analytics to its full potential and are able to change their business as needed. Many security organizations live in the aspirational stage and must lead their teams towards the experienced and, ultimately, transformed stages.

There are several recommendations outlined in this study. A few of those recommendations include:

  • Develop security professionals’ data analytics skills
  • Enhance security professionals’ motivation to engage in the collection and analysis of security data
  • Provision adequate resources to support security professionals in their data analytics journey

To read the full study and further recommendations, click here. View results in infographic form here.

All graph and table images courtesy of Farhad Tajali

KEYWORDS: data analytics data management physical security assessment security leadership skills security research study

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Farhad Tajali, Ed.D. is an experienced security professional and a Reserve Deputy with the Los Angeles County Sheriff’s Department, Fraud & Cyber Crimes Bureau. Tajali is currently the Chief Strategy Officer at a healthcare startup and recently acquired his Doctorate in Education from the University of Southern California, Rossier School of Education. He completed his dissertation project on “Utilizing Data Analytics in the Field of Physical Security: An Exploratory Study.”

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Lukas Quanstrom.png

    Breaking down data siloes in physical security

    See More
  • Surveillance, video wall

    Advances in deep learning & predictive analytics will significantly increase video intelligence capabilities in 2021

    See More
  • The 5 D’s of Outdoor Perimeter Security - Security Magazine

    Utilizing Intelligence to Extend the Security Perimeter

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products

Events

View AllSubmit An Event
  • April 16, 2025

    Modernizing GSOC Operations: Ensuring Full Control and Complete Situational Awareness

    ON DEMAND: For many organizations, physical security management can be a daunting task. Threats are on the rise and risks are becoming increasingly diverse. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!