Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity & Business ResiliencePhysical SecurityVideo Surveillance

Enterprise Services

Strategies for justifying security tech investments

Security leaders should determine which emerging technologies, such as artificial intelligence, are best for their organization.

By Miguel Lazatin
security technology

xijian via Getty Images

July 10, 2023

With the growing acceptance of emerging technologies — artificial intelligence (AI), edge recording and cloud platforms among them — security leaders are embracing new ways of working and looking for new solutions. As the technology and threat landscapes evolve, security and surveillance solutions are expected to do more than just “monitor and protect.” They are now increasingly being viewed as business solutions, capable of delivering data-driven business insights and driving operational efficiencies across an entire organization.

Defining the need for security is usually straightforward — justifying a technology investment is often a different matter. Many security executives, if asked, would agree there’s something in their technology stack that could use an upgrade. However, those same executives would likely also agree the necessary budgets would be hard to secure, if not impossible.

With internal resources and budgets getting tighter and tighter, companies are often expected to do more with less. It all comes down to making the strongest case for security technology spending; demonstrating a clear need and reason for the technology; and also identifying ways to minimize spending as much as possible without sacrificing the benefits of modern security technology.

Making the case for security technology

When justifying security spend with organizational stakeholders, security leaders should think of their technology in terms of its potential to be a value add, rather than a cost center.

Take video surveillance, for example. In addition to monitoring a facility or property, deterring theft and protecting employees and visitors; a security and surveillance system can also be utilized to aid business operations via AI, machine learning and video analytics.

Video analytics have traditionally been viewed as a security luxury: nice to have, but limited in form and application. Technological advancements in algorithms and AI are propelling the capabilities of video analytics forward — and consequently making it easier to justify a spend due to their potential to save time and increase efficiency.

Just a few scenarios to illustrate the point of a properly designed and deployed intelligent video surveillance system’s value:

  • Retailers can optimize store merchandise layouts and staffing for higher revenue potential.
  • Hospitals can monitor patients to determine if they are secure in bed or at risk of falling out.
  • Schools can perform people-counting to accurately track the volume of people entering or exiting a building.
  • In the gaming industry, analytics can help casinos track guest behavior patterns, determine the busiest and slower times of the day, and which games are more regularly visited.
  • Public space managers can monitor building occupancy levels to comply with health guidelines.

Aligning security technology investments with the organization

Ultimately, organizations in any industry can derive data-driven business insights from their security technology stack. Equally important to knowing how much to spend is also knowing when not to spend.

For example, a company can prioritize their security needs and then start small, implementing a security program in only one area of a business as a test. If they achieve success in that one area, their case for a larger spend for company-wide deployment is much stronger.

In another scenario, a retail chain or large bank may have plans to upgrade their camera network at 6,000 locations. In reality, no organization is ever likely to do all 6,000 at one time, so as an alternative, they can plan out an appropriate “phased” deployment strategy, rolling out 400 locations a month or along whatever timeline makes the most sense for them.

Other criteria that may determine the type of security system and how much an organization needs to spend for it are the intended use cases. For example, in many markets such as cannabis or banking, there are regulations stating the need to have both onsite and offsite back-up storage. In that case, security technology spend could be dictated by regulatory requirements.

It's also important to evaluate how sensitive data is. If the organization deals with financial or GDPR-controlled data, security leaders may not want to put it all in the cloud, for example. These use cases could necessitate a hybrid-cloud or on-premises approach to data storage, and the regulatory landscape can be used as a justification for the appropriate security technology.

In other words, the final use often defines the amount required to spend, which is the majority of a good argument for making a security technology investment. Security technologies are high on companies’ priority lists for good reasons. An effective strategy can “future-proof” every aspect of an enterprise and keeps a company relevant and thriving in today’s competitive environment.

KEYWORDS: artificial intelligence (AI) Artificial Intelligence (AI) Security security investment security technology security technology strategy

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Miguel Lazatin is Senior Director of Marketing at Hanwha Vision America.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Budgets

    7 security investments for a post-pandemic world

    See More
  • cyberworld-freepik

    Tech companies pledge billions to bolster cybersecurity investments

    See More
  • SEC0821-Cover-Feat-slide1_900px

    Top de-escalation strategies and training for security leaders

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing