Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalTechnologies & SolutionsNew Security TechnologyAccess ManagementPhysical Security

Technology hones physical security threat assessments

By Austin Lee Johnson
drone flies over landscape

Image via Unsplash

May 4, 2023

Threat assessment technology has become commonly available on the market in recent years, from drone technology and computer analysis software to other technical tools.

This is due to the wide variety of suppliers that created competition market pricing according to Alan Saquella, CPP, Professor of Security and Intelligence at Embry-Riddle Aeronautical University and former Security Director at Cox Communications.

Technologies aiding threat assessments

With these market shifts, corporate budgets can reach farther than in previous years due to virtual collaboration capability and the decrease in market prices of security technology.

Tablets

Expanding the security manager resources by utilizing personal handheld tablets to take advantage of virtual report writing and note-taking through cloud-based services allows a team to communicate quicker when conducting assessments, surveys and audits. Tablets can be cross-utilized for operating drones, measuring distances, viewing maps, taking photos, writing assessment notes, creating presentations and reports, as well as communicating in real time with team members and clients.

Drones

Drones produced today have longer flight time, higher quality aerial imaging and mapping, and lower consumer costs for commercial and private drones than in previous years. These tools can be operated from smart devices and launch in minutes, stated Saquella. Many consumer drones have the capability to download video and photos directly to the device that is controlling it. The ability to quickly download footage to a smart device allows for the security professional to analyze and share images with members of team and contracted security integrators. Drones are a valuable night survey tool as they help show lapses in lighting on a large facility to a specific area of concern. Understanding and following local, state and federal laws is a requirement to using drones. Taking classes, earning certifications and obtaining licenses are highly recommended and is sometimes necessary to best utilize drones when conducting threat assessments, stated Saquella.

Light meters

Light meters can be implemented in threat assessments to complete night surveys. This tool helps show if a facility meets industry standard for lighting. They can be best utilized when paired with drones to look for exterior facility lighting vulnerabilities and saves an assessor time when conducting an assessment.

Radio frequency devices

Radio frequency (RF) devices allow for open-source physical penetration testing of access control systems. Understanding and using RF tools during the threat assessment process can help better protect their organization against readily available devices. These tools can be used for physical security penetration testing to show the ease of access and exploit potential vulnerabilities within access control systems. To better protect a facility and write a quality threat assessment, it is necessary to understand the ease of breaching access control systems with tools that are widely available to the public, Saquella stated.

Cloud software

Online cloud services allow for file sharing and editing in real time across desktop computers, phones and tablets. These file sharing services cut down the turnaround time that it takes to author a report and share results. Many of these cloud services also host video conferencing applications that help better connect with team members leadership.

GIS mapping

Desktop geographic information system (GIS) mapping software can allow threat assessors to generate maps using open-source and user-provided data. User data can be in the form of drone mapping/imagery or location data provided by the surveyor. For example, lighting maps of a facility can help show what lights need to be replaces or added. Understanding, reading and creating maps is a useful skillset to have when conducting facility threat assessments.

Crime mapping

Crime mapping webpages are a great collection source for open-source intelligence (OSINT). Understanding the crime in the area surrounding a facility can help tailor the threat report and recommendations. Analyzing local crime trends helps the assessor and the client gain a greater understanding of a facilities’ security needs.

Cybersecurity

Protecting cyber equipment physically and virtually while securing a building’s wireless infrastructure is a valuable part of a physical threat assessment. Many access control devices and camera systems operate within facilities’ wireless networks. Protecting physical security equipment from virtual threats makes the facility more secure. Understanding basic cybersecurity procedures and being up-to-date on cybersecurity resources is vital in recommending security improvements to organizations.

The advancements in security technology reduce the time of the threat assessment and report writing process and can lower the cost of the assessment. There is no substitute for up-to-date industry knowledge of technical security products that are available to end-users.

Saquella says, “Security leaders should always look for opportunities to test new security devices to enhance the security posture and thwart emerging threats.” Bad actors will look to exploit weaknesses, and it is our duty to stay ahead of their bad intentions, said Saquella.

KEYWORDS: crime data drone Radio-Frequency IDentification (RFID) security technology threat assessment

Share This Story

Austin johnson

Austin Johnson is a senior studying Global Security & Intelligence with concentrations in Prelaw/Law Enforcement and Leadership Analysis at Embry Riddle Aeronautical University. Johnson has been a member of ASIS and a leader in conducting regionwide security surveys overseen by professors. Johnson enjoys studying emerging topics in physical security and threat mitigation. Johnson gives back through community service as a member in Silver Wings and Order of the Sword and Shield. Johnson is interning at The Policing Lab, conducting crime report research for police departments across the United States.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!