Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalLogical SecurityPhysical Security

Integrated Solutions

A new era in property protection: Security officers & security robots

Integrating human and autonomous guarding into a comprehensive security system can enhance protection.

By Steve Reinharz
Robotics

onurdongel / E+ via Getty Images

April 6, 2023

Artificial intelligence (AI) technology has made its way into the security industry in a number of applications, including with the use of AI-powered autonomous security robots. While security robots have brought a number of advantages to enterprise security posture, there are concerns about the impact of autonomous security robots on the traditional human security guards and their future role.

However, it is possible for human security guards and autonomous security robots to coexist and collaborate to provide facility protection. With the combination of human intuition and machine intelligence, these two security forces can complement each other and elevate enterprise security levels.

As this technology continues to advance, the use of autonomous security robots is growing. These devices can help security professionals cover large areas and monitor for potential threats around the clock. Whether it's patrolling the perimeter of a property or monitoring specific areas such as entrances and exits, security robots can bolster security in many areas.


How security robots aid safety efforts

One benefit of using autonomous robotic security devices is increased efficiency. These devices can operate without the need for breaks or time off and they can be programmed to respond to specific threats or situations. For example, a robotic security device could be programmed to detect and respond to the presence of an unauthorized individual in a restricted area, such as a parking lot after work hours. In addition, they can provide autonomous responses to perimeter breaches or the detection of unexpected situations, which can be valuable in large facilities or public spaces where it may take time for a human security guard to reach the location of the emergency.

These types of autonomous responses, whether visual alerts, such as flashing lights and displays, can draw attention to potential threats and distract and deter individuals from engaging in illegal activities. Sirens and pre-recorded audible messaging can also serve as an effective deterrent, as they signal that the area is being monitored and that any unauthorized activity will be detected and reported. Robotic security devices can be an effective way to discourage individuals from attempting to enter a property without authorization or engage in illegal activities, such as vandalism or theft.

A guard whose job might be to check in visitors in a lobby is performing the repetitive task that requires verifying the visitor’s identity, confirming their appointment or purpose of visit and logging visitor information into a system. This process can be time-consuming and prone to human error.

An AI-powered device, such as a check-in robot or an advanced visitor management system, can help streamline this process. The device can quickly verify identity using tools such as barcode or other ID scanning, automatically log information into a secure database and provide a digital record of all visitors. Additionally, the autonomous device can handle a high volume of visitors at great speed, reducing wait times and increasing efficiency.

Another advantage of AI-powered security robots is their ability to continuously learn and adapt. As they collect data and analyze patterns of activity, robot accuracy and effectiveness can improve over time. This means that robots can become more adept at detecting and deterring potential threats, which can help to further reduce crime and secure properties.

One of the most enduring and notable benefits of utilizing autonomous security robots is the cost savings. The cost of hiring and maintaining human security guards can be significant, especially when considering factors such as benefits and paid time off. In contrast, autonomous security robots can be operated at a substantially lower cost, making them a more cost-effective solution. This is particularly appealing for organizations looking to reduce payroll expenses or secure large areas with limited budgets.

Employee absenteeism continues to pose a significant challenge for the security industry. The absence of security personnel can lead to a heavier workload for remaining employees, decreased operational efficiency and potential security lapses. The cost of finding adequate staff to fill in for absent employees and the disruption to daily operations can also be substantial. In comparison, the autonomous security robot can remain on duty 24 hours a day.


Working together to boost security

Human security guards still play a vital role in maintaining a secure environment. While security robots are capable of detecting potential threats, currently they lack the ability to interpret and understand the context of a situation. For example, they may detect a group of individuals loitering in an area and alert security personnel, but they cannot determine whether their presence is a genuine threat or simply a group of friends.

In situations where an autonomous device has detected a potential threat, a human security guard could be notified by the device and then can approach the individuals and assess the situation, possibly defusing any potential conflict before it escalates. Additionally, human security guards can provide guidance and support to individuals on the property, helping to calm the situation and provide a sense of security. Robotic devices, while able to detect and respond to threats, are not yet able to provide this level of personal interaction.

One way that traditional human security guards and security robots can work together effectively is by utilizing each other’s strengths. This combination of technology and human expertise can help to create a more comprehensive and effective security system.

While autonomous security robots can help enhance security and increase efficiency, they are not yet able to entirely replace traditional human security guards. By integrating both into a comprehensive security system, it is possible to leverage the strengths of both and provide a higher level of protection. Traditional human security guards bring the ability to assess situations, take appropriate action and provide personal interaction, while robotic devices can continuously monitor for potential threats and autonomously respond to any suspicious activity. By working together, both man and machine can coexist and provide a higher level of protection, at an overall reduction in cost for properties. Embracing this partnership can shape the future of security and create a safer world for all.

KEYWORDS: artificial intelligence (AI) Artificial Intelligence (AI) Security comprehensive security plan robots threat response

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Reinharz is the Founder and CEO of Robotic Assistance Devices (RAD), where he oversees the development, sales and marketing, and strategic vision for the company. Reinharz has more than 20 years of experience in various facets of the high-tech industry – as the founder of security integration firm Security Zone, Inc., and a strategic leader at global enterprises. Reinharz has extensive knowledge of a diverse portfolio of technologies, developing practical, effective solutions for end-user customers. As CEO of RAD, Reinharz leverages his extensive knowledge and interest in robotics and artificial intelligence to design and develop robotic solutions that increase business efficiency and deliver cost savings. Reinharz is a native of Toronto, Ontario, Canada, and attended the University of Western Ontario, where he earned dual Bachelor of Science degrees in political science and commercial studies. Follow him on Twitter: @SteveReinharz.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • AI-enews

    5 AI Trends You Should Be Using to Improve Physical Security

    See More
  • metaverse

    The metaverse ushers in a new era of cyber threats

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products

Events

View AllSubmit An Event
  • September 25, 2024

    How to Incorporate Security Into Your Company Culture

    ON DEMAND: From this webinar, you will learn how to promote collaboration between IT and physical security teams to streamline corporate security initiatives.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!