SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Artificial intelligence (AI)
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

What is machine learning? How can it benefit physical security?

20 Dec 2023

What is machine learning? How can it benefit physical security?
Larry Anderson
Larry Anderson
20 Dec 2023

Editor Introduction

Machine learning (ML) is a field within Artificial Intelligence (AI) and one of the more common buzzwords in the physical security market. ML focuses on building computer systems that can learn and improve on their own, without being explicitly programmed for every scenario. Machine learning is poised to revolutionise physical security by offering a more proactive, data-driven approach to securing people and assets. We asked this week’s Expert Panel Roundtable: What is Machine Learning (ML) and how can it benefit physical security? 


Card image cap
Barry Norton Milestone Systems

Video analytics have been around for years, but since 2009, the feasibility of deep learning has led to successive waves of intelligent features. By training neural networks, basic analytics tasks like motion detection, object detection, and tracking objects within scenes became commonplace. Further advances in machine learning are driving the current progress in artificial intelligence (AI), empowering systems to learn and enhance through experience, without explicitly relying on programming. This is made possible by training solutions that derive insights from video and other data, uncovering hidden patterns and knowledge. Machine learning is revolutionising security by making it possible to automate the detection of potentially harmful patterns and swiftly identify breaches or threats in real-time. Moreover, it can continue to learn over time from these incidents, enabling the prediction and potential prevention of future security violations. By effectively "learning" to discern risks, AI solutions can elevate the effectiveness and efficiency of security measures. 

Card image cap
Ryan Zatolokin Axis Communications

Machine learning (ML) is a subset of artificial intelligence (AI) that allows computers to build their logic for making predictions and determinations. Without ML, a computer requires human input to create algorithms. Furthermore, deep learning (DL) is a refined version of ML that can learn to extract and combine features in a data-driven manner. DL is suitable for complex challenges such as image classification, language processing, and object detection, allowing it to be used for applications beyond traditional security like monitoring occupancy and time spent in an area. These intelligent technologies have helped to transform physical security from reactive to proactive, enabling organisations across industries to effectively tackle security threats head-on. This is thanks to automated, real-time analytic capabilities, which can dig into the granular details of captured footage, audio, etc. without human intervention saving valuable time and resources and allowing for faster incident resolution. 

Card image cap
Will Knehr i-PRO

Machine learning (ML), a subset of artificial intelligence (AI), focuses on the development of algorithms and models that enable devices to perform tasks without specific instructions. ML models learn from training data (the dataset) that is provided to them. An ML model recognises patterns and relationships within the data it is given and outputs a resulting analysis very quickly. For physical security use cases involving video, ML provides an enormous benefit by automating certain surveillance tasks beyond what limited human resources can provide. ML can detect objects it has been trained to recognise (vehicles,humans) and describe the unique attributes (colour, type) associated with them making forensic search exceptionally fast and accurate. ML-based analytics can also provide anomaly detection alerting staff when an environment deviates from the norm. ML algorithms that run “on the edge” offer enhanced threat detection and proactive decision-making for security personnel in real time.

Card image cap
Daniel Reichman Ai-RGUS

Machine learning is a name for computer programs that automatically estimate which action to take based on a set of input data. An example is whether or not to send a technician to clean a camera lens based on the current image of the camera and analyse if the view is clear or not. Machine learning can benefit physical security by automating certain rote, time-consuming but important tasks. For example, a machine learning program is well-suited to identify all cameras that appear to be tilted from their original position. This information can be supplied to an operator who can decide the best remedial action. 

Card image cap
Felix Fu Anviz Global Inc.

Machine Learning (ML) is a subfield of Artificial Intelligence (AI), focusing on the development of algorithms and models that enable computers to learn from data and make predictions or decisions. Machine learning systems are not explicitly programmed to perform specific tasks, but learn from the data provided, allowing computers to improve their performance on specific tasks as they encounter more data. The key point of machine learning is its ability to recognise patterns, learn these patterns, and make decisions or predictions without explicit human intervention. Machine Learning (ML) has several benefits for physical security systems, enhancing surveillance, threat detection, and access control. Here are some benefits of machine learning for physical security: Anomaly Detection: Machine learning algorithms can learn what is considered normal, and then detect anomalies or suspicious activities. Video Surveillance and Object Recognition: Machine learning algorithms can analyse video information to recognise and track objects, faces, and behaviours. Real-Time Threat Response: Machine learning algorithms integrated with security systems can quickly analyse and respond to potential threats. They can trigger alarms or responses based on predefined patterns or anomalous activities. 


Editor Summary

Machine learning provides new computer capabilities that are improving video analytics, among other uses. These systems are not programmed; rather, they “learn” and improve their performance based on additional data they are exposed to. As our Expert Panelists point out, machine learning is useful for a variety of repetitious analytics tasks, as well as object recognition, anomaly detection, and real-time threat response. More than a buzzword, machine learning is an important new tool for physical security – now and in the future.

  • Related links
  • Anviz CCTV software
  • Axis Communications CCTV software
  • Genetec CCTV software
  • Milestone CCTV software
  • Anviz Access control readers
  • Axis Communications Access control readers
  • Axis Communications Video signal devices & accessories
  • Bar Code Access control readers
  • Networkable Access control readers
  • PC-based Access control readers
  • Biometric Access control readers
  • Control Software CCTV software
  • Detection Software CCTV software
  • Standalone Access control readers
  • Card Swipe Access control readers
  • Contact Access control readers
  • Infrared Access control readers
  • IP Surveillance Software CCTV software
  • Adapter Video signal devices & accessories
  • Audio amplifier Video signal devices & accessories
  • Magnetic Stripe Access control readers
  • Management Software CCTV software
  • Mifare Access control readers
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • Transmission Software CCTV software
  • Video Detector Video signal devices & accessories
  • Video Line Correctors Video signal devices & accessories
  • Video loss alarm unit Video signal devices & accessories
  • Video Signal Generator Video signal devices & accessories
  • Related categories
  • CCTV software
  • Access control readers
  • Video signal devices & accessories
Related white papers
Elevating security through multi-sensing solutions and large-scale AI

Elevating security through multi-sensing solutions and large-scale AI

Download
The 4 pillars of AI in managing high-stakes critical events

The 4 pillars of AI in managing high-stakes critical events

Download
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Related articles
Suprema BioStation 3 sets global sales record

Suprema BioStation 3 sets global sales record

A landmark gathering shaping the future of real estate, investment, sustainability & design

A landmark gathering shaping the future of real estate, investment, sustainability & design

Leuze AI elevates optical sensor precision

Leuze AI elevates optical sensor precision

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Artificial intelligence (AI)
  4. News
  5. Round table discussions
About this page

"Discover how Machine Learning, a facet of Artificial Intelligence, can revolutionise physical security with a data-driven approach, as expounded by our Expert Panel Roundtable."

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec