Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalAccess Management

Listen to Your Smart Building

By Amanda Reed
sky line

Photo by Sean Pollock on Unsplash

May 11, 2022

You know the saying, “If these walls could talk?” It’s a turn of phrase that is used to describe the many interesting things that have happened in a room or building, despite the occupant not knowing all the details. Imagine the stories that Rockefeller Center or the Chrysler Building could tell if they were able!

Thankfully, we’ve now entered an age where we can analyze what happens in a building and use that data to optimize every day operations. Facility owners and managers today just beginning to grasp the information provided by their buildings’ data. Multitudes of transactions can be captured, correlated, analyzed, and leveraged to create cost efficiencies, enhance visitor or tenant experience, and even generate revenue.

For example, the Downtown Austin Alliance tracks door “unlocks” to gauge the return of workers to Texas’s capital city. The Downtown Austin Alliance provides data so that businesses that rely on workers coming downtown—hair salons, gyms, restaurants, dry cleaners, theaters—can adjust hours, staffing, and offerings.

Similarly, a financial services company uses building data to advise investors in the corporate travel space. By analyzing the percentage change in daily active access control users by factors such as city, state, and industry — as well as the pandemic’s impact on daily commercial property usage — the company helps its clients tailor their investments.

Access control is one of the many aspects of a smart building that can help divulge certain aspects of the day-to-day that would go otherwise unnoticed. Cloud-based systems can capture successful and failed access attempts by person, door, department, time of day, access permission, building, campus, country, region, or so on. At the building level, the data might show what areas require less heating or cooling at certain times since they receive little traffic. Across a corporate campus, it might show where employees tend to prop open doors during break time, suggesting that security might wish to deploy an officer there at specific times. Across an entire organization, it might reveal which type of access control is most reliable and effective — say smart card versus mobile versus face recognition.

However, confining building data to access control is outdated. Today’s smart buildings are filled with sources of lucrative data. On the security side, video surveillance, alarm systems, intrusion sensors, and other tools yield abundant information. Beyond that, the data sources are practically innumerable: HVAC systems, electricity use, air quality, humidity, occupancy, room use, maintenance requests, parking, and so on. As the sources increase, the possible insights increase logarithmically. We are just starting the age of big building data.

In fact, on top of access control, the most common updates to building include The most common additions and upgrades include visitor management systems (32 percent), upgraded access control (30 percent), access control integrated with new applications (29 percent), and biometrics (18 percent).

Several non-security features appear as well: hoteling/desk-booking applications (11 percent), room reservation applications (10 percent), and tenant/resident experience apps (4 percent). Those non-security features underscore the phenomenon of access control and other Proptech applications increasingly sharing the same platform.

If your building could talk, what would it say, and what would you do after listening to it?

KEYWORDS: cybersecurity physical security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Amanda reed 250x250

As SDM Staff Editor, Amanda Reed was responsible for managing the news department in the digital edition and on the website. Amanda manages the SDM E-News and Today’s Systems Integrator e-newsletters and was the person behind SDM’s social media posts on Facebook, Twitter and LinkedIn. She received bachelor’s degrees in communication/rhetoric and nonfiction writing from the University of Pittsburgh.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • pixels

    How to Use Data, AI & the Cloud to Change Your Building Operations

    See More
  • digital

    Are You Utilizing Big Data in Your Building Security?

    See More
  • AI security

    How AI Will Influence the Future of Smart Buildings

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing