SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

How are data analytics changing the course of security?

10 Nov 2023

How are data analytics changing the course of security?
Larry Anderson
Larry Anderson
21 Nov 2023

Editor Introduction

For many years, security systems produced their share of "data exhaust." Every access control action and each video image became a data point to be stored in perpetuity, with no practical way to use the data. More recently, systems have been developed to enable organizations to analyze data from sensors and other connected devices to gain valuable insights into how their systems are being used, to identify potential vulnerabilities; and even to provide insights into broader enterprise operations. We asked this week’s Expert Panel Roundtable: How are data analytics changing the course of the security marketplace? 


Card image cap
Charles Pitman Genetec, Inc.

Security organisations are sitting on a goldmine of data collected by surveillance cameras, video management systems (VMS), and other connected physical security devices. With the rise of data analytics, physical security system data can be used as more than just a tool to respond to crime or a necessary expense to keep assets and people safe. It can become a core element in the digital transformation of organisational processes. Analytics can turn physical security data into smart, actionable insights that improve operations, efficiency, revenue generation, the customer experience, and more. A unified, open physical security platform helps organisations tap into the full potential of devices and equipment they already own, using data in new ways to streamline operations. While analytics help filter unstructured data into pertinent events, the platform helps operators leverage those insights to resolve immediate issues. And it brings teams across the organisation together on a common toolset, using a common language, to make improvements to the things they do every day. 

Card image cap
David (Dave) Barber Salient Systems

From an IP video perspective, the data has always been there; it is only within the past few years that the security space has begun to use this data to create more efficiencies and predictors. We know that many end users’ systems have grown in size, and employing the operators necessary to watch and respond in real-time to these real-life events has been costly. Usher in the use of real-time AI, and now even end users with small and large systems can see and respond to these events in real-time. They can also review reports of these events to allow for more efficient responses regarding future events. Over time, AI technology has become more accurate and usable. AI has allowed manufacturers to create tools that enable our end-user customers to be more efficient and provide a solution for them to reduce their liabilities.  

Card image cap
Daniel Reichman Ai-RGUS

A camera system on its own offers users the ability to have eyes at every location where a camera is installed. However, it still requires a person to actually view the footage in order to take the appropriate action. Selling a camera system along with analytics helps unlock value from the camera system investment by offering an efficient means of uncovering information. For example, a camera system offered with a health monitoring solution that can identify camera view problems such as tilted or blocked cameras gives users peace of mind that the video evidence they expect to be there after an incident will be of the highest quality. Without such software, users would need to establish a programme to regularly check the camera system to ensure it is working as intended. This is a time- and cost-intensive process to do without automation.

Card image cap
Rui Barbosa i-PRO

Modern AI cameras can record a wealth of metadata regarding the objects they recognise. These attributes can then be fed into an analytics engine to find people or vehicles of interest or alert us when people or vehicles with certain characteristics exhibit a type of behavior. Beyond security, this data can also show how many people have entered an area or how long they paused next to a certain display. This can be used to construct a “heat map” that retail operations can use to uncover which products are attracting attention. Sophisticated analytics like AI Scene Change Detection can go further and alert an organisation when stock is running low. Organisations large and small are hungry for data/metrics that show how the business is performing. Security cameras can easily do “double duty” by protecting assets and employees while simultaneously providing data that reveal opportunities and trends that can directly benefit a company’s bottom line.

Card image cap
Rob Muehlbauer Axis Communications

Data analytics have played an important role in making security more proactive versus reactive, as analytics have greatly expanded the capabilities of traditional surveillance devices such as cameras, intercoms, access control solutions, and more. Leveraging and integrating data collected by video, audio, and other surveillance technologies, analytics not only allow security teams to make faster decisions based on real-time outputs but also provide improved access to actionable insights that can then be used to make key business decisions, allowing the security marketplace to provide increased value across the enterprise. Edge analytics, in which data is both collected and analysed via the device itself, are especially adaptable and scalable, allowing security organisations to offer solutions that are more cost-effective and straightforward to implement. As data analytics continue to evolve, so too will the overall security marketplace.  

Card image cap
Kayne McGladrey Hyperproof

Data analytics serves as an essential resource for Chief Information Security Officers (CISOs). It can automatically evaluate the effectiveness of security controls that relate to distinct risks. Assessments give feedback in real time, which allows for swift adjustments to these controls. Data analytics also enable anomaly detection, which issues alerts when metrics deviate in a meaningful way from usual patterns, thereby aiding in risk management. Further, predictive analytics analyse historical data to foresee potential future security incidents, helping CISOs take action in advance. Data analytics also contribute to enhanced situational awareness. They aggregate information from a variety of network sources, which assists in the strategic allocation of resources. However, the expertise of a CISO remains vital for interpreting data in its proper context and making informed decisions. In summary, data analytics is transforming the methods CISOs use to manage cybersecurity risks. It is making their strategies more effective and adaptable. 

Card image cap
Corey Still Bell

Today’s cybersecurity solutions feature analytics for software, hardware, and the cloud. However, applying analytics has changed significantly over time. Previously, analytics were used in a very reactive way to detect patterns in east-west traffic to shorten dwell time after a breach occurs. But as analytics platforms improve and draw upon more data, they’re increasingly being used in a more predictive and proactive manner, including analysing incoming and outgoing traffic to ensure threats can’t gain access to the network in the first place. Compared to individual solutions, purpose-built security analytics platforms can provide increased visibility into an organisation’s network, endpoint, and cloud traffic. This offers unprecedented amounts of contextual information on potential threats and how to mitigate them, allowing organisations and their security teams to get a much richer understanding of what’s happening with particular locations or sets of users. 


Editor Summary

As our Expert Panelists point out, analytics can turn physical security (and cybersecurity) data into smart, actionable insights that improve operations, efficiency, revenue generation, and the customer experience, among other benefits. The use of analytics is enabling security practitioners to shift from a reactive to a proactive stance, in some cases identifying problems at an early stage and contributing to the company’s bottom line. 

  • Related links
  • Axis Communications CCTV software
  • Axis Communications Audio, video or keypad entry
  • Genetec CCTV software
  • Salient Systems CCTV software
  • Axis Communications IP cameras
  • Genetec IP cameras
  • i-PRO IP cameras
  • Desk Mount Audio, video or keypad entry
  • ANPR Software CCTV software
  • Card Access control cards/ tags/ fobs
  • Infrared IP cameras
  • Audio Only Audio, video or keypad entry
  • IP54 Audio, video or keypad entry
  • Magnetic Stripe Access control cards/ tags/ fobs
  • Keypad & Audio Audio, video or keypad entry
  • Vandal Resistant Audio, video or keypad entry
  • Flush Mount Audio, video or keypad entry
  • Control Software CCTV software
  • Fob Access control cards/ tags/ fobs
  • Network IP cameras
  • Video & Audio Audio, video or keypad entry
  • Detection Software CCTV software
  • Proximity Access control cards/ tags/ fobs
  • Water Resistant Audio, video or keypad entry
  • Surface Mount Audio, video or keypad entry
  • Weather Resistant Audio, video or keypad entry
  • Wall Mount Audio, video or keypad entry
  • Tag Access control cards/ tags/ fobs
  • PTZ IP cameras
  • Video, Keypad & Audio Audio, video or keypad entry
  • Drawing Software CCTV software
  • Smart Card Access control cards/ tags/ fobs
  • Thermal IP cameras
  • IP Surveillance Software CCTV software
  • Management Software CCTV software
  • Recording Software CCTV software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • Transmission Software CCTV software
  • 2023 security trends
  • Related categories
  • CCTV software
  • Audio, video or keypad entry
  • IP cameras
  • Access control cards/ tags/ fobs
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Round table discussions
About this page

"Explore how data analytics are transforming the physical security industry, providing insights into system usage, detecting vulnerabilities, and enhancing enterprise operations. Learn from our Expert Panel Roundtable."

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec