Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceFire & Life SafetyPhysical Security

Integrated Solutions

Drones as security tools

Incorporating drones into an organization’s security operations can be a huge benefit, but it’s essential to understand available technology, regulatory requirements and continued costs.

By Matt Sloan
Drones
December 9, 2022

With more sophisticated enemies and threat vectors in today’s security landscape comes the need for more sophisticated defenses. For defensive, proactive and efficient security operations, security professionals can use a number of technologies, including artificial intelligence (AI) and drones or robotics.

Some people may have seen images of faceless Al Qaeda and ISIS chiefs being taken out by predator drones overseas. Also prevalent are drone images such as aerial selfies, real estate advertisements and car dealership promos taken by amateur pilots. Within the security industry, there are many useful applications for drones.

Take public safety agencies’ use of drones, for example. More than 2,000 first responder agencies across the country have begun using the aerial platforms to detect hotspots in fires, look for lost hikers, or help SWAT teams execute high-risk warrants.

So how can drones be useful for private or security teams? The first step in evaluating whether a drone will be useful to an organization is to figure out potential use cases.

There are traditional applications and deployments of drones to enhance the physical security of facilities using thermal, zoom and other highly-sophisticated sensors for surveillance, tracking assets at a job site, or even tracking criminals stealing those assets.

Such security technology combined with AI can also be used for carrying payloads across large tool yards, quantifying progress of a building project, making 3D models of the organization’s facilities, or regular patrols of a property’s perimeter.

Once security leaders have identified how their organization can use drone technology, the next step is to pick the right one.

Drones range in price from $400 to $4 million; therefore, security leaders should focus first on assessing which drone capabilities they need before considering the cost.

If the application calls for indoor flying, the smaller, the better. If the application involves heavy payloads, the biggest option is best. The drone itself is less important than the sensor on it, so understanding which aircraft can carry the payload necessary and how long it can carry that sensor is critical.

Battery technology hasn’t progressed nearly as much as other technology has progressed, but on average, one battery will power a drone for about 20 minutes. Drones that carry two batteries last about 40 minutes or so. Alternatively-powered options like tethered drones exist, which can fly indefinitely, but can’t move around much. While tethered drones would be less useful for perimeter sweeps or patrols, they can be ideal for fixed-location operations where moving around isn’t critical.

Additionally, there are gas- and hydrogen-powered aircraft that offer much longer endurance, but they can be more complicated to operate, more difficult to maintain and harder to fuel.

After security teams weigh the options of what they need, the next consideration should be the legal and regulatory aspects of operating a drone.

Organizations within the private sector, whether for- or non-profit, fall into the category of commercial drone operation. Each operator that flies commercially is required to do so under 14 CFR Part 107 of the Federal Aviation Regulations. The regulation states that pilots are subject to a 60-question knowledge test to be certified. Once passed, that individual will receive a “Remote Pilot in Command” license with a small unmanned aircraft systems (UAS) rating — like a regular pilot’s license but restricted to small unmanned aircraft.

A Part 107 certification comes with specific rules. The drone must be under 55 pounds in total, be operated within line-of-sight of the operator in uncontrolled airspace, not over people, and in daylight hours only — unless they’ve been specifically trained for nighttime use and possess special lighting equipment on the drone. Many of these conditions can be set aside by applying for various waivers, each with its own set of complexities and rules.

Those organizations that qualify as “public operators” — typically police, fire and emergency management agencies licensed by a state — have the ability to operate under Part 107 or a Public Agency Certificate of Authorization (COA). The COA allows those agencies some flexibility in the rules and allows them to self-certify operators without going through the Part 107 process. It should be noted, however, that many of these qualifying agencies elect to have pilots adhere to the Part 107 rules despite not being required to do so.

The last consideration for enterprise security teams considering a drone program is program operations. Once the organization has certified drone pilots, it is best practice to designate a program manager that is responsible for keeping appropriate records, ensuring pilots have the right training to operate the organizations’ aircraft, and keeping that training current. Training is critical to continued drone programs.

Good training must not only focus on knowing the rules, but learning how best to fly the aircraft, maintain it, operate in emergency scenarios and make a safe call about when it is, and isn’t, appropriate to fly.

Security leaders also need to account for a number of other considerations, such as UAS liability insurance, insurance from damages to the aircraft itself, data retention and management, and training for those who need to interpret the data to get useful information from the technology.

And like any other technology, “one and done” is difficult in the UAS world, as new aircraft, sensors and software are coming onto the market every day. Therefore, it’s also important to understand that whatever drone an organization purchases today may not be the best security tool in the future.

The bottom line is this — incorporating drones into an organization’s arsenal can be a huge benefit, but it is not something to be undertaken lightly. The appropriate aircraft and sensors, the right pilots to fly them with the right training, and the ability to understand the data they collect are all critical keys to using drones successfully within an enterprise security program.


For more articles on robotics, drones and artificial intelligence, visit:

Drones as security tools

To protect and serve: A case for drones and public gatherings

Artificial intelligence operations must involve ethical and responsible frameworks

DoorDash uses artificial intelligence robots in corporate offices

KEYWORDS: artificial intelligence (AI) drones risk management security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Drones author

Matt Sloane is CEO of Skyfire Consulting. Image courtesy of Sloane

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • drones for security

    Drones as security tools

    See More
  • Drones: A Security Tool, Threat and Challenge - Security Magazine

    The role of drones in bolstering the operational efficiency of today’s security measures

    See More
  • smiles-positive-freepik1170x658.jpg

    Simple security tools for positive interactions

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!