Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResiliencePhysical Security

How to unlock the hidden value of security technology

By Stuart Tucker
artificial intelligence

Image by Jackson Sophat from Unsplash

October 7, 2022

Doing more with less. Accomplishing the same tasks with fewer resources. Driving operational efficiencies. These phrases have become painfully common. As organizations adapt to societal change and financial pressures — including recent recession anxieties — business leaders are asked to do the impossible.


But, in reality, it’s not impossible. Time and again, organizations accomplish more with less and end up thriving. One method for achieving this daunting task is to look inward at existing processes and technologies. Internal operationalization is particularly helpful in times of stress, as this process can expedite current workflows without requiring significant spend or organizational changes.


Perhaps surprisingly, security systems are a prime example of existing tech that leaders can use to unlock revenue-saving insights. According to research conducted by STANLEY Security, 46% of enterprises have traditional physical security technology like video surveillance, access control systems and intrusion alarms, and 91% of organizations have adopted cloud-based solutions. By pairing these technologies with artificial intelligence (AI) and machine learning (ML), business leaders can unveil a new layer of critical insights that build a more robust security ecosystem and create more efficient workflows.


Bolstering health, safety and asset security using AI and ML

Physical security remains top of mind for most business leaders. STANLEY Security research found that 72% of leaders identify the security of their organization’s assets as their primary business concern. The health and safety of employees come in at a close second (59%). This trend likely explains why most enterprises (91%) adopted cloud-based technologies to strengthen asset protection during the pandemic.


However, despite the easing of lockdown protocols, workplace health and safety concerns remain incredibly complex. Nearly 60% of business leaders expect to welcome all employees back to the office over the next 18 months, while 30% are implementing a hybrid approach and 7% are entirely virtual. As modern employees choose to locate nearly anywhere in the world, business leaders must create a safe remote workplace. And as other employees decide to navigate traditional office life once again, leaders must offer the same degree of protection to on-site and off-site team members.


A robust hybrid security plan doesn’t need to include directionless spending and hordes of new security installations. In fact, for most enterprises — those who have implemented cloud security solutions or traditional physical security technology — the answer to modern security concerns lies in existing tools. The key is learning to leverage these tools effectively.


Think of all the daily patterns and movements that security technologies record (either literally, in the case of video surveillance installations, or figuratively, in the case of access control or alarm systems). The information that is already being gathered by these tools can range from the average number of employees in a building to false alarm frequency to optimal temperature settings. Alone, this information may not appear enticing. But when coupled with AI- and ML-driven insights, this information becomes crucial to developing a predictive security program.


For example, an alarm panel empowered with AI and ML can track alarm frequency and develop a dashboard of insights for business leaders and monitoring center operators to review. Even more promising, leaders can leverage AI and ML tech to help predict when the next alarm may occur, allowing the business to address security events proactively. One of the greatest uses of this type of information is to eliminate noise and filter out false alarms more accurately.


Operationalizing business intelligence through hidden security insights

Data from the 2022 STANLEY Security Industry Trends Report reveals that only 29% of organizations have implemented AI- and ML- empowered integrated analytics. However, 78% are interested in learning more and would consider implementing these technologies to optimize operations. Clearly, business leaders are intrigued by the intelligence that security technology hides. The key, then, is to understand these insights — and devise a strategy to unlock them, spurring greater operational efficiency.


The latent information that security systems gather can provide crucial assistance with repetitive daily tasks. Using real-time location systems (RTLS), for instance, professionals can track the precise location of vital assets as well as the environment those assets exist in (i.e., gauging current temperature or storage location). This information alone is critical. When leveraged alongside AI and ML insights, however, the data becomes even more valuable. Enhanced security technology can review the location of singular assets and compile a locational history database among a vast array of assets. The system can then easily cross-reference this information to suggest areas for improvement. For example, maybe assets are often bottlenecked at a particular location — AI and ML can isolate this information and provide patterns that point to the cause.


This information provides human workers with deep, actionable insights, as well as more time in which to accomplish those tasks. Instead of manually tracking asset locations or statuses and remediating problems on the go, employees working alongside AI and ML can focus on revenue-generating initiatives while passive technologies handle the minutiae. 


Depending on the setting, that difference can go a long way. For instance, healthcare workers may have more one-on-one time with patients in need. Or, retail workers may be able to provide a better standard of service to each customer they encounter. And on a macro scale, business leaders can take advantage of these insights to make powerful, more informed decisions.


Overcoming obstacles to AI and ML adoption

Given the breadth of insights that security technologies provide, why are so many businesses neglecting AI and ML implementation? The barrier to entry with these technologies may appear daunting. But the good news is that the majority of leaders already have the basic security technology in place to leverage AI and ML in their organization. Their next step should be to invite a trusted partner to the table.


A trusted partner will review existing technologies and make recommendations for a more advanced security ecosystem. Remember that AI and ML implementation doesn’t have to be an “all or nothing” proposition. In many cases, security providers will suggest a tailored approach that updates certain functionalities and opts to leave others as-is, based on the desired level of insights and budget. Adopting software as a service (SaaS) tech in this way can help businesses scale their technology appropriately — both technologically and financially.


This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: artificial intelligence (AI) machine learning security operations security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Stuart Tucker is Vice President, Solutions Management and Engineering at STANLEY Security (now part of Securitas).

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • alarm-security-fp1170x658v4.jpg

    The hidden costs of alarm systems (and how to avoid them)

    See More
  • camera surveillance

    The new rules of security: How AI will transform video surveillance

    See More
  • Security Benchmark Report Survey 2021

    How do you define the value of security?

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!