SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Retail security
  • Home
  • About
  • White papers
  • Case studies
  • News
  • Expert commentary
  • Security beat
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

Why the term “Security Team” is too limiting

Why the term “Security Team” is too limiting
Ryan Schonfeld
Ryan Schonfeld
Contact company
Contact HiveWatch
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Security now integrates technology, workplace, and culture, expanding beyond "gates, guards, and guns."
  • Retail security covers loss prevention, asset management, and brand protection, not just physical security.
  • Security investments involve technology, legal, and strategic decision-makers, requiring coordinated approaches.

There’s been a long history of people thinking of “gates, guards, and guns” when referring to physical security. And for a long time, this was the norm.

When analogue cameras required significant amounts of wiring and a dedicated guard to watch said feeds (think about any action movie from the 90s), the assumption was that security was protecting assets, but had little to do with the overall business. 

Defining security with recent advancements

Fast forward to more recent advancements in video surveillance, cloud-based solutions, and artificial intelligence (AI)-driven decision-making, and now the term “security” has reached a more complex fork in the road.

“Security” is about a broader idea of protecting people, assets, and the brand from harm. So it’s only natural that the term used to describe the work practitioners do advances, as well.

Why is the term outdated? 

Today, security encompasses technology, the workplace, and culture, it touches so many facets

“Security team” has a connotation that may no longer be accurate for the scope of work that the people on that team perform.

Today, security encompasses technology, the workplace, and culture. It touches so many facets of the organisation.

Security in retail

Take retail, for instance. So many security leaders encompass not only loss prevention teams, but also asset management, brand protection, and retail security.

Some companies combine the three of these or split them up based on the needs of the organisation. In this case, the “security team” may place a limit on what the department aims to accomplish. 

Involvement of other teams

Security teams also may be broader and include external individuals who still require a say in decision-making:

  • Technology: Whether it’s the company’s CTO, CISO, or IT department, you can almost guarantee that they’re going to want to know what technology is going on in the network. Convergence is no longer a buzzword, it’s a necessity; especially when cyber risk is growing and cyber criminals are becoming more and more sophisticated. 
  • Legal: There are so many jokes about lawyers ruining all the fun, but the joke’s on any company that doesn’t consider the legality of data collection or usage before investing in technology platforms. Consider the implications of using biometrics or facial recognition especially when it comes to emerging laws or regulations. Security may not just be about physical security, it might also need to be about protecting the business from legal action, as well.
  • CISO: Threats that cross over between physical and cyber security departments are becoming more common, which means a coordinated approach to protection is necessary. This also means that investments in technology should be able to serve both departments. Additionally, as physical security becomes increasingly dependent on intelligent devices, it’s the cybersecurity team led by the CISO that develops the best practices and policies for managing and securing them. Their input is invaluable. 

Decision-making in today’s business environment

Like any good business decision, multiple stakeholders should be involved in decisions around technology

Like any good business decision, multiple stakeholders should be involved in decisions around technology investments especially those who are directly impacted by the use of or benefit of the technology in question. 

For example, if it’s an operational efficiency investment, a company’s CFO should be involved (even more so if it impacts cost savings). 

Functional or operational changes

Technology investments (even in the security space) should involve IT if there’s an infrastructure component to the implementation. From an electronic security standpoint, cybersecurity or information security leaders should have a chance to weigh in.

As more decisions involve more people, security leaders need to think about what their investments in functional or operational changes can mean for other groups across the company. 

Budget sharing

It can help with C-suite discussions especially when there’s talk of “doing more, with less” 

Whether the technology can enable marketing, facility managers, or IT, multiple uses can mean multiple ways to allocate funding to pay for technology investments.

Budget sharing has become a popular way to pay for investments that help shift expenses away from a single department when many of them can benefit from the tech. It can help with C-suite discussions especially when there’s talk of “doing more, with less” happening at all levels of the organisation. 

Benefits of security in an organisation

“Security team” may not have a universal meaning anymore, but it’s safe to say that evolving the discussion around how security benefits the broader organisation is beneficial to practitioners.

The more we talk about how we can protect people and assets, the more realisation there will be about how that impacts the business and the industry will be better for it. 

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Retail surveillance
  • Electronic security systems
  • Retail security systems
  • Shop security systems
  • Physical security
  • Industrial security
  • Mall security
  • Commercial security
  • Shopping centre security
  • Security management
  • Security policy
  • Security tagging
  • Security cameras
  • Covert cameras
  • Security camera systems
  • Security monitoring system
  • Radio frequency Identification
  • Voice recognition systems
  • Facial recognition systems
  • Video analytics
  • Electronic access control
  • Store security
  • Store surveillance
  • Industrial security systems
  • Retail security
  • Wireless security
  • Network cameras
  • Security software
  • Security service
  • Industrial surveillance
  • Covert Surveillance
  • Integration software
  • Cyber security
  • Corporate Security
  • Central Monitoring
  • Network Video Recorders
  • Video surveillance
  • Mergers & Acquisitions
  • Machine Learning
  • Touchless Security
  • Related links
  • Articles by Ryan Schonfeld
  • Related categories
  • CCTV software
  • Access control software
  • Network video recorders (NVRs)
Related white papers
Physical access control

Physical access control

Download
Precision and intelligence: LiDAR's role in modern security ecosystems

Precision and intelligence: LiDAR's role in modern security ecosystems

Download
Verkada workplace safety survey

Verkada workplace safety survey

Download
Related articles
Retail security in 2021 and beyond

Retail security in 2021 and beyond

What security technologies are impacting the retail market?

What security technologies are impacting the retail market?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Retail security
  4. News
  5. Expert commentary
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec