SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Intrusion detection
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

What is the value of physical security data?

5 Sep 2018

What is the value of physical security data?
5 Sep 2018

Editor Introduction

We are living in the age of Big Data, and businesses are inundated with large volumes of data every day. Success depends on capturing, analysing and ultimately transforming that data into information and intelligence that can be used to improve the business. So, it is with today's physical access control and video systems, too, which also generate unprecedented levels of data. But how can we make the data useful to end users and how can they realise its full value? We asked this week's Expert Panel Roundtable: Relating to physical security systems, what is the value of data and how can that value be measured?


Card image cap
Mark Perkins Boon Edam

While active protection is the primary job of a security system, the data generated by today’s networked solutions can provide a wealth of intelligence to help organisations optimise both their security strategies and their business operations. For example, a security entrance can generate data on factors such as traffic density at different entrances throughout the day, the number of tailgating attempts, valid/false ID entries rejected, and more. If the data shows a high number of rejections of people with a valid ID, the manager can educate staff on proper use to help reduce that number and improve both security and throughput. Some security entrances can even predict the probability of tailgating attempts and can be calibrated to increase or decrease this percentage, finding their ideal balance between convenient access and risk. Using this data, organisations can decrease risk and liability, while also helping to reduce both capital and operational expenditures.

Card image cap
Dan Cremins March Networks Corporation

Physical security systems typically consist of video surveillance, access control and alarms, which, when integrated together, can provide great solutions for security applications. By going a step further and pulling in data from other business systems, however, you can enable advanced solutions for both security and non-security applications. A typical example is the integration of transaction data and video in retail applications to identify possible shrink. Combining other data sources, such as queue length or dwell time analytics, enables business owners to measure customer service and behaviours, while using recorded video to see what is really happening. Every industry collects data that, when integrated in the right way, can tell an insightful story about security, customer experience, compliance and operations, while providing overall business intelligence. How to get started? Make a list of every technology installed in your – or your customer’s – organisation. Chances are there is useful untapped data. 

Card image cap
Sean Lawlor Genetec, Inc.

When it comes to physical security, the acquisition and processing of data can bring great improvements to operational efficiency. Security operators often must spend a significant amount of time reviewing and processing large volumes of data to make sense of an event. Because machines are uniquely equipped to tirelessly process large volumes of mundane data, they can be used to automate some of these routine tasks and free up operators to perform other operations. The question of “how do we measure these gains?” arises a lot in data-centric problems. Every connection a machine makes without human input has the potential to result in increased efficiency. This can be measured by comparing the rate at which your staff completes a task before and after the use of a machine to conduct data analysis. A drop-in efficiency usually means too many “false positives” and would signify the solution isn’t working.

Card image cap
Andrew Palmer Seagate Technology

In the past, surveillance footage was often overwritten after a short period of time – cost limitations prevented data being stored for long. Today, the cloud is on hand to help ease the data storage headache, allowing us to hold on to vast amounts of data for a longer period. Combined with the rise of new data analytics capabilities, this has changed our idea of data’s value. Suddenly we can collect and analyse data over a period of several years, and measure its value in its real-world applications: it can be used to predict traffic trends, or analyse where to place promotions or staff in a shopping mall. It’s always hard to predict the future value of surveillance data, but thanks to new technologies, that data has the potential to more than repay the cost of storage in tangible business insights.

Card image cap
Jim Katsifolis The Ava Group

Conventional physical security systems are reactive, providing real-time alerts by detecting and reporting security breaches as they occur. Recent advances in Big Data platforms, more common today in industries such as banking and securities, can be used to make physical security systems more proactive and predictive in nature. For a perimeter intrusion detection system (PIDS), using data from the immediate environments of the electronic equipment and outdoor barrier can enhance product lifetime, increase uptime and be used to optimise operational performance. More broadly, combining current and historical data from networked PIDS, access control, video surveillance and IoT systems from multiple sites enables the identification of high-risk behaviours or patterns, as well as insights into the overall effectiveness of security strategies and how to continually refine them. For organisations, the value of data is measured in terms of operational cost savings, incident reduction and improved business continuity.

Card image cap
Ken LaMarca Active Intelligence

The contribution of data for physical security applications continues to grow in importance as IP-based systems employing advanced VMS solutions continue to proliferate. An advanced VMS platform can aggregate and analyse data from virtually any point along a company’s IT backbone to enhance security operations. And aside from detecting and alerting users of possible security threats, data analysis can be applied for a myriad of business intelligence operations such as locating physical assets in bustling hospitals, shifting traffic patterns on municipal roadways, tracking packages, evaluating manufacturing processes, monitoring remote infrastructure operations, or even following the migration of wildlife for scientific research. The applications for data-enriched VMS-driven surveillance systems are virtually unlimited as they are driven by users’ needs. Integrations of new and emerging data points and analytics empower users and integrators to deliver the specific solutions they need.

Card image cap
Tim Shen Dahua Technology USA Inc.

When security systems first made their appearance in the mainstream market, end users were only interested in seeing the images the systems produced. Since then, a demand for high-resolution images has ensued, and today end users want not only hi-res images, but an integrated system that turns the images and other data received from a camera into something valuable for their business. One way to do this and measure success is through artificial intelligence (AI). Embedded into today’s security systems, AI can pull data from recordings and categorise it using various facial features, such as age and gender. From there, the data can be compared with pre-recorded information in the database, bringing value to anti-crime measures. In other sectors, such as retail, AI can provide enhanced information for audience targeting. This allows companies to evaluate current resources, determine where they can minimise efforts, and establish areas they can improve upon.

Card image cap
Cody Flood Arcules

The ability to detect and process data is invaluable for intelligent physical security systems, driving three distinct aspects of security operations. These include: the ability to view live events; the ability to search recorded data for forensic investigations; and the ability to correlate data from various sources across the enterprise to detect abnormalities in behaviour that require investigation. The last point is also trending as “predictive analysis” is slowly but surely becoming a reality with advanced management platforms that can seamlessly aggregate data from formerly disparate systems. This allows security management to detect abnormalities in behaviour detected from intelligent analytics such as license plate or facial recognition, and/or integrated POS or access control systems to identify potential problems. The data collected by intelligent VMS and analytics also provide a wealth of business intelligence to supplement a range of applications such as logistics, retail merchandising, traffic patterns, and more.


Editor Summary

Beyond the real-time functionality of security systems, there is a constant flow of data emanating from video surveillance, access control and alarm technologies. In the case of video, unstructured video data is increasingly being analysed and transformed into metrics that can provide immediate insights into a company's operation. Artificial intelligence (AI) is among the new tools to help end users make sense of the increasing flood of data and to boost its impact beyond the security department and throughout an organisation. At the end of the day, data is a valuable asset, and a company’s success often rests on how well it manages that asset. 

Related white papers
Precision and intelligence: LiDAR's role in modern security ecosystems

Precision and intelligence: LiDAR's role in modern security ecosystems

Download
The top 4 reasons to upgrade physical security with the Cloud

The top 4 reasons to upgrade physical security with the Cloud

Download
11 advantages of a combined system for access control and intrusion

11 advantages of a combined system for access control and intrusion

Download
Related articles
Securitas UK & Hays Travel mark 10 years partnership

Securitas UK & Hays Travel mark 10 years partnership

Ranger acquires Universal Fire & Security in South West

Ranger acquires Universal Fire & Security in South West

Detection Tech's DT2030 strategy: Enhance X-ray detector solutions

Detection Tech's DT2030 strategy: Enhance X-ray detector solutions

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Intrusion detection
  4. News
  5. Round table discussions
About this page

Discover the untapped potential of physical security system data in enhancing business operations, efficiency, and decision-making. Unlock your security data's value now!

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec