Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalAccess ManagementPhysical Security

From human to hybrid: Why augmented guards are the future of security

By Jake Stauch
security guard standing by doors

Image via Unsplash

July 28, 2023

In the U.S., the security guard shortage has become a full-blown crisis. A third of security firms say their staff numbers are significantly below pre-pandemic levels, according to a recent survey. This crisis is playing out against the backdrop of an unprecedented rise in crime across the country — from Whole Foods closing its year-old San Francisco flagship location to New York City Mayor Eric Adams’ recent plan to combat retail thefts across the city’s five boroughs. 

Yet long before this recent wave of crime, it had become increasingly clear that the traditional model of physical security with multiple guards patrolling buildings and facilities had become less effective and more expensive. 

To understand what’s driving this change, let’s take a look at the big challenges facing the people charged with protecting businesses.

First, security guards in many cases don’t have the proper authority to take action in moments of crisis. They don’t have the ability to make arrests, and furthermore, they’re often unarmed. This limits their options when they come face-to-face with a potential perpetrator. Either they can try to deter the intruder or they can call the police.

This limited authority to take action directly contributes to the second problem: Police departments that are charged with investigating on-site intrusions are increasingly short-staffed and overworked. And the rates of false alarms don’t help. According to the Department of Justice, over 95% of alarm system activations are false alarms. 

The problem is even more severe for cities such as Gastonia, North Carolina, where in 2021 99% of alarm activations were made erroneously. These false alarms come with a real price tag: In 2021, false alarms cost Gastonia over $850,000. It’s for this reason why many cities now charge citizens and businesses fees for excessive false alarms — or worse, have stopped responding to non-verified alarms altogether. This is the case in major cities such as Seattle, which require that alarm companies use enhanced call verification (i.e., calling customers) prior to requesting police dispatch. 

A model for augmented security

Given these limitations, it’s clear we’re overdue for a new approach to physical security, one bolstered by the latest developments in camera hardware, access control systems, environmental sensors and the cloud. Call it “augmented security.”

To illustrate this model, let’s imagine an overnight security guard at a large zoo. With a network of cameras and environmental sensors, the job has been transformed. While the guard is patrolling the expansive, dark zoo grounds, a team of professional monitoring agents is actively monitoring the rest of the premises for potential threats. The remote team can take real action for a threat on the opposite side of the park by talking down through speakers, dispatching police and more. And the guard, from an app on their phone, also have visibility into exactly what’s happening. That visibility is further augmented by a network of environmental sensors, which alerts them in real-time to everything from an unexpected sound in the Monkey House to rising temperatures in the Penguin Zone. 

Augmenting, not replacing

There’s a lot of risk that security guards take on, and security leaders can ask a lot from them. This is why security leaders should make their jobs safer, but also to ensure they are better informed and more efficient.

The answer to the challenges facing business today isn’t “more security.” Instead, it’s security that better reflects the unique challenges of the moment. At a time when many companies are looking to emerging technology to help them replace humans, it’s worth remembering that emerging tools also have the power to transform how people work. It’s not “humans or machines?” but instead “humans and machines.”

KEYWORDS: access management machine learning security guards technology video management system (VMS)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jake Stauch is the Director of Product at Verkada.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Open filing cabinet

    Document Protection: Why Hybrid Storage Is the Future of Security

    See More
  • finance security freepik

    Why cybersecurity frameworks are crucial for the future of open banking

    See More
  • cctv-geefac66e5_1920.jpg

    Why AI CCTV is the future of security and surveillance in public spaces

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing