Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalAccess Management

Listen to Your Smart Building

By Amanda Reed
sky line

Photo by Sean Pollock on Unsplash

May 11, 2022

You know the saying, “If these walls could talk?” It’s a turn of phrase that is used to describe the many interesting things that have happened in a room or building, despite the occupant not knowing all the details. Imagine the stories that Rockefeller Center or the Chrysler Building could tell if they were able!

Thankfully, we’ve now entered an age where we can analyze what happens in a building and use that data to optimize every day operations. Facility owners and managers today just beginning to grasp the information provided by their buildings’ data. Multitudes of transactions can be captured, correlated, analyzed, and leveraged to create cost efficiencies, enhance visitor or tenant experience, and even generate revenue.

For example, the Downtown Austin Alliance tracks door “unlocks” to gauge the return of workers to Texas’s capital city. The Downtown Austin Alliance provides data so that businesses that rely on workers coming downtown—hair salons, gyms, restaurants, dry cleaners, theaters—can adjust hours, staffing, and offerings.

Similarly, a financial services company uses building data to advise investors in the corporate travel space. By analyzing the percentage change in daily active access control users by factors such as city, state, and industry — as well as the pandemic’s impact on daily commercial property usage — the company helps its clients tailor their investments.

Access control is one of the many aspects of a smart building that can help divulge certain aspects of the day-to-day that would go otherwise unnoticed. Cloud-based systems can capture successful and failed access attempts by person, door, department, time of day, access permission, building, campus, country, region, or so on. At the building level, the data might show what areas require less heating or cooling at certain times since they receive little traffic. Across a corporate campus, it might show where employees tend to prop open doors during break time, suggesting that security might wish to deploy an officer there at specific times. Across an entire organization, it might reveal which type of access control is most reliable and effective — say smart card versus mobile versus face recognition.

However, confining building data to access control is outdated. Today’s smart buildings are filled with sources of lucrative data. On the security side, video surveillance, alarm systems, intrusion sensors, and other tools yield abundant information. Beyond that, the data sources are practically innumerable: HVAC systems, electricity use, air quality, humidity, occupancy, room use, maintenance requests, parking, and so on. As the sources increase, the possible insights increase logarithmically. We are just starting the age of big building data.

In fact, on top of access control, the most common updates to building include The most common additions and upgrades include visitor management systems (32 percent), upgraded access control (30 percent), access control integrated with new applications (29 percent), and biometrics (18 percent).

Several non-security features appear as well: hoteling/desk-booking applications (11 percent), room reservation applications (10 percent), and tenant/resident experience apps (4 percent). Those non-security features underscore the phenomenon of access control and other Proptech applications increasingly sharing the same platform.

If your building could talk, what would it say, and what would you do after listening to it?

KEYWORDS: cybersecurity physical security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Amanda reed 250x250

As SDM Staff Editor, Amanda Reed was responsible for managing the news department in the digital edition and on the website. Amanda manages the SDM E-News and Today’s Systems Integrator e-newsletters and was the person behind SDM’s social media posts on Facebook, Twitter and LinkedIn. She received bachelor’s degrees in communication/rhetoric and nonfiction writing from the University of Pittsburgh.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • pixels

    How to Use Data, AI & the Cloud to Change Your Building Operations

    See More
  • digital

    Are You Utilizing Big Data in Your Building Security?

    See More
  • AI security

    How AI Will Influence the Future of Smart Buildings

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing