Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Technologies & SolutionsNew Security Technology

Too Many Toys in Your Toybox?

By Karyn Hodgson
crowded desktop

Olga Strelnikova/iStock / Getty Images Plus via Getty Images

November 10, 2022

When it comes to smart buildings it is all too easy to collect so many “toys” (technology products and solutions) that you can’t possibly use them all at once. With children this problem is easily solved. Simply put them away for a while and when you bring them back out they will be “new” and interesting again. But with security solutions this is not feasible — you paid for it and it solves a problem you had. So how do you maximize it?

“What we found happens a lot is we end up with a lot of ‘things,’ said Heather Warner, head of global security operations technology at Amazon at a recent Securing New Ground conference held in October in New York City. One of three panelists for “Security Leaders Speak! Insights from Top Security Practitioners” Warner and the others lamented the challenges they faced with so much technology. “There are a lot of applications and different ways to slice a bigger problem,” she added. “I am looking to not do that. I want to make it very, very easy for our users to get exactly what they want by going to fewer places.”

Another panelist, Jonathan Aguila, global security director-systems and technology for Meta, said it is a huge effort to normalize and aggregate all this data. “Now we have too many toys in the toybox and our parents are saying, ‘You have to play with these toys.’ But how do you organize all that data?”

“Big data” and the Internet of Things can be a double-edged sword. On the one hand more data integration is great — but only if you can use it. The good news is technology advancements such as machine learning, or artificial intelligence are starting to make things easier, albeit slowly.

“The big data piece for me, when I think about using it, COVID-19 for all the good and bad really shined a light on the physical security space and the vast array of things you can do with it,” Aguila said. Security is a small — but critical — piece of big data, he added.

“Our organization looks at data on the business side,” said Jeff Stonebreaker, senior vice president, safety and security for Major League Soccer. “We are trying to find the integration sweet and balance that with the appropriate level of security at our events.”

Warner said artificial intelligence helps her organization. “For us there is so much data. We have to leverage a lot of AI to glean information. Whether it is entrances to buildings, throughput, or hiring patterns, what we are trying to do with all that data is just make sense of it. You can’t just look at one thing. … We try to use the data through machine learning to create applications to make sense of it all. When we do that is when we get the magic, where we can see holes in our security.”

None of this is a fast or easy solution, but Aguila advised patience and staying focused on the end goal.

“There are a lot of areas you can go, but it’s about knowing that the journey you are going to go on and defining it really well. It is a slow process, but it’s a foundation. You are not going to boil the ocean.”

KEYWORDS: smart buildings

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Karyn Hodgson is a long-time security industry reporter with previous assignments at Security Magazine and SDM Magazine. Karyn is the managing editor for SDM Magazine. She can be reached at 630-694-4025.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

Classroom with desks and chairs

School’s Out, But Security’s Not: Preparing for K-12 Summertime Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • smart building

    Security’s Central Role in Smart Buildings

    See More
  • cyber-data-freepik1170x658x96.jpg

    Security teams have too many assets to secure

    See More
  • Homeland Security Has Too Many Definitions

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing