Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Technologies & SolutionsNew Security Technology

Too Many Toys in Your Toybox?

By Karyn Hodgson
crowded desktop

Olga Strelnikova/iStock / Getty Images Plus via Getty Images

November 10, 2022

When it comes to smart buildings it is all too easy to collect so many “toys” (technology products and solutions) that you can’t possibly use them all at once. With children this problem is easily solved. Simply put them away for a while and when you bring them back out they will be “new” and interesting again. But with security solutions this is not feasible — you paid for it and it solves a problem you had. So how do you maximize it?

“What we found happens a lot is we end up with a lot of ‘things,’ said Heather Warner, head of global security operations technology at Amazon at a recent Securing New Ground conference held in October in New York City. One of three panelists for “Security Leaders Speak! Insights from Top Security Practitioners” Warner and the others lamented the challenges they faced with so much technology. “There are a lot of applications and different ways to slice a bigger problem,” she added. “I am looking to not do that. I want to make it very, very easy for our users to get exactly what they want by going to fewer places.”

Another panelist, Jonathan Aguila, global security director-systems and technology for Meta, said it is a huge effort to normalize and aggregate all this data. “Now we have too many toys in the toybox and our parents are saying, ‘You have to play with these toys.’ But how do you organize all that data?”

“Big data” and the Internet of Things can be a double-edged sword. On the one hand more data integration is great — but only if you can use it. The good news is technology advancements such as machine learning, or artificial intelligence are starting to make things easier, albeit slowly.

“The big data piece for me, when I think about using it, COVID-19 for all the good and bad really shined a light on the physical security space and the vast array of things you can do with it,” Aguila said. Security is a small — but critical — piece of big data, he added.

“Our organization looks at data on the business side,” said Jeff Stonebreaker, senior vice president, safety and security for Major League Soccer. “We are trying to find the integration sweet and balance that with the appropriate level of security at our events.”

Warner said artificial intelligence helps her organization. “For us there is so much data. We have to leverage a lot of AI to glean information. Whether it is entrances to buildings, throughput, or hiring patterns, what we are trying to do with all that data is just make sense of it. You can’t just look at one thing. … We try to use the data through machine learning to create applications to make sense of it all. When we do that is when we get the magic, where we can see holes in our security.”

None of this is a fast or easy solution, but Aguila advised patience and staying focused on the end goal.

“There are a lot of areas you can go, but it’s about knowing that the journey you are going to go on and defining it really well. It is a slow process, but it’s a foundation. You are not going to boil the ocean.”

KEYWORDS: smart buildings

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Karyn Hodgson is a long-time security industry reporter with previous assignments at Security Magazine and SDM Magazine. Karyn is the managing editor for SDM Magazine. She can be reached at 630-694-4025.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Fingerprint on computer board

Enhancing Incident Response with Integrated Access Control and Video Verification

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

An Opened Lock Standing Out From Locked Locks

From the Outside In: A Smarter Approach to Vendor Access

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • smart building

    Security’s Central Role in Smart Buildings

    See More
  • cyber-data-freepik1170x658x96.jpg

    Security teams have too many assets to secure

    See More
  • Homeland Security Has Too Many Definitions

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing