Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceFire & Life SafetyPhysical Security

Integrated Solutions

Drones as security tools

Incorporating drones into an organization’s security operations can be a huge benefit, but it’s essential to understand available technology, regulatory requirements and continued costs.

By Matt Sloan
Drones
December 9, 2022

With more sophisticated enemies and threat vectors in today’s security landscape comes the need for more sophisticated defenses. For defensive, proactive and efficient security operations, security professionals can use a number of technologies, including artificial intelligence (AI) and drones or robotics.

Some people may have seen images of faceless Al Qaeda and ISIS chiefs being taken out by predator drones overseas. Also prevalent are drone images such as aerial selfies, real estate advertisements and car dealership promos taken by amateur pilots. Within the security industry, there are many useful applications for drones.

Take public safety agencies’ use of drones, for example. More than 2,000 first responder agencies across the country have begun using the aerial platforms to detect hotspots in fires, look for lost hikers, or help SWAT teams execute high-risk warrants.

So how can drones be useful for private or security teams? The first step in evaluating whether a drone will be useful to an organization is to figure out potential use cases.

There are traditional applications and deployments of drones to enhance the physical security of facilities using thermal, zoom and other highly-sophisticated sensors for surveillance, tracking assets at a job site, or even tracking criminals stealing those assets.

Such security technology combined with AI can also be used for carrying payloads across large tool yards, quantifying progress of a building project, making 3D models of the organization’s facilities, or regular patrols of a property’s perimeter.

Once security leaders have identified how their organization can use drone technology, the next step is to pick the right one.

Drones range in price from $400 to $4 million; therefore, security leaders should focus first on assessing which drone capabilities they need before considering the cost.

If the application calls for indoor flying, the smaller, the better. If the application involves heavy payloads, the biggest option is best. The drone itself is less important than the sensor on it, so understanding which aircraft can carry the payload necessary and how long it can carry that sensor is critical.

Battery technology hasn’t progressed nearly as much as other technology has progressed, but on average, one battery will power a drone for about 20 minutes. Drones that carry two batteries last about 40 minutes or so. Alternatively-powered options like tethered drones exist, which can fly indefinitely, but can’t move around much. While tethered drones would be less useful for perimeter sweeps or patrols, they can be ideal for fixed-location operations where moving around isn’t critical.

Additionally, there are gas- and hydrogen-powered aircraft that offer much longer endurance, but they can be more complicated to operate, more difficult to maintain and harder to fuel.

After security teams weigh the options of what they need, the next consideration should be the legal and regulatory aspects of operating a drone.

Organizations within the private sector, whether for- or non-profit, fall into the category of commercial drone operation. Each operator that flies commercially is required to do so under 14 CFR Part 107 of the Federal Aviation Regulations. The regulation states that pilots are subject to a 60-question knowledge test to be certified. Once passed, that individual will receive a “Remote Pilot in Command” license with a small unmanned aircraft systems (UAS) rating — like a regular pilot’s license but restricted to small unmanned aircraft.

A Part 107 certification comes with specific rules. The drone must be under 55 pounds in total, be operated within line-of-sight of the operator in uncontrolled airspace, not over people, and in daylight hours only — unless they’ve been specifically trained for nighttime use and possess special lighting equipment on the drone. Many of these conditions can be set aside by applying for various waivers, each with its own set of complexities and rules.

Those organizations that qualify as “public operators” — typically police, fire and emergency management agencies licensed by a state — have the ability to operate under Part 107 or a Public Agency Certificate of Authorization (COA). The COA allows those agencies some flexibility in the rules and allows them to self-certify operators without going through the Part 107 process. It should be noted, however, that many of these qualifying agencies elect to have pilots adhere to the Part 107 rules despite not being required to do so.

The last consideration for enterprise security teams considering a drone program is program operations. Once the organization has certified drone pilots, it is best practice to designate a program manager that is responsible for keeping appropriate records, ensuring pilots have the right training to operate the organizations’ aircraft, and keeping that training current. Training is critical to continued drone programs.

Good training must not only focus on knowing the rules, but learning how best to fly the aircraft, maintain it, operate in emergency scenarios and make a safe call about when it is, and isn’t, appropriate to fly.

Security leaders also need to account for a number of other considerations, such as UAS liability insurance, insurance from damages to the aircraft itself, data retention and management, and training for those who need to interpret the data to get useful information from the technology.

And like any other technology, “one and done” is difficult in the UAS world, as new aircraft, sensors and software are coming onto the market every day. Therefore, it’s also important to understand that whatever drone an organization purchases today may not be the best security tool in the future.

The bottom line is this — incorporating drones into an organization’s arsenal can be a huge benefit, but it is not something to be undertaken lightly. The appropriate aircraft and sensors, the right pilots to fly them with the right training, and the ability to understand the data they collect are all critical keys to using drones successfully within an enterprise security program.


For more articles on robotics, drones and artificial intelligence, visit:

Drones as security tools

To protect and serve: A case for drones and public gatherings

Artificial intelligence operations must involve ethical and responsible frameworks

DoorDash uses artificial intelligence robots in corporate offices

KEYWORDS: artificial intelligence (AI) drones risk management security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Drones author

Matt Sloane is CEO of Skyfire Consulting. Image courtesy of Sloane

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • drones for security

    Drones as security tools

    See More
  • black keyboard with blue text

    65% of organizations cite data loss as top risk of unauthorized tools

    See More
  • smiles-positive-freepik1170x658.jpg

    Simple security tools for positive interactions

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

See More Products

Events

View AllSubmit An Event
  • June 24, 2025

    Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

    ON DEMAND: For today's security teams, making informed decisions in the first moments of a crisis is critical.
  • May 14, 2012

    Effective Risk Communication: Theory, Tools, and Practical Skills for Communicating about Risk

    Stay ahead of the curve by attending this in-depth program, featuring the latest scientific findings on risk perception, case studies from around the world, a suite of practical tools, and hands-on skill training.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing