SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Is audio underused in physical security? What are the obstacles?

2 May 2025

Is audio underused in physical security? What are the obstacles?
Larry Anderson
Larry Anderson
2 May 2025

Editor Introduction

The role of audio in physical security is multifaceted and increasingly vital, offering a layer of intelligence and interaction that access control and/or video surveillance alone cannot provide. Sounds provide crucial context to visual events. For instance, someone running might appear suspicious on video, but audio could reveal they are shouting for help, changing the interpretation entirely. Even so, historically speaking, audio has been an underused component in physical security. How is the situation changing? We asked our Expert Panel Roundtable: Is audio an underused component in today’s physical security systems? What obstacles are keeping audio from expanding?


Card image cap
Adam Lowenstein i-PRO

Frequently an afterthought, audio analytics and intercom systems are underutilised components in security systems. When you consider that many modern AI-enabled security cameras include audio analytics as a standard feature, this represents a lost opportunity for enhanced situational awareness and validation of important events. i-PRO’s cameras can alert operators to the sound of broken glass, gunshots, yells, etc. Some camera models have built-in microphones to do this, while others support inputs from external microphones. A classic misconception is that using audio analytics means cameras are recording audio, which can conflict with privacy regulations. Audio analytics, processed on the edge, in-camera, means audio never leaves the camera and is never stored or monitored. An alert is generated only when a detected sound matches a known sound signature, such as a glass break. In this way, privacy is ensured, and regulatory compliance is guaranteed.

Card image cap
Charles Nguyen Genetec, Inc.

Yes, audio is often underused in physical security despite its ability to enhance real-time awareness and response. While video surveillance and access control are widely adopted, audio has lagged due to outdated perceptions and integration concerns. It has long been seen as an IT or facility function—audio systems like intercoms were not a core part of security. That is changing. Modern IP-based audio technology makes unifying communication, video, and access control easier into a single platform. This allows operators to see, hear, and speak with people or issue announcements at entry points or during incidents, all in one interface, enabling faster, more accurate decisions. Many still underestimate audio’s value or are unaware of how it can be easily integrated. They can assess the situation more accurately, ask follow-up questions, and respond appropriately. When audio is included, it adds critical context that video alone can’t provide—as technology evolves, its role in physical security is becoming not just helpful, but essential.

Card image cap
Stephen G. Sardi Anviz Global Inc.

Audio verification technology in access (physical security) applications is underused, simply because it has not gained the traction it needs to position itself against the more time-proven biometrics: fingerprint and facial recognition. As with any technology, deployments need to show their value in robust and reliable operation, price performance, and ease of use in their applied end cases. With the increased use of AI as a building block that better enables field installations, truly reliable performance can be expected across diverse user groups and applications where background noise could be a limiting factor. At Xthings, we embrace the intelligent use of, and secure implementation of AI infrastructure in ways that increase user satisfaction, product performance, and flexible deployment capability. We believe in creating non-contact solutions that enhance health safety in work environments, so audio is certainly in mind.

Card image cap
Toby Hutchings Gallagher Security

Audio plays an important role in modern physical security systems, enhancing both functionality and user interaction. Integrations with intercom systems enable real-time communication for access control, allowing security personnel to verify identities remotely. Audio detection can also act as a sensor, identifying threats such as glass breaking, gunshots, or raised voices — triggering appropriate responses even before visual confirmation. Additionally, audio serves as a user interface, providing immediate feedback through alerts, alarms, or voice prompts. This not only guides user behaviour but also enhances safety and compliance. One example is Gallagher’s custom tones feature, which allows customers to upload personalised audio files. These can be used to signal access decisions at card readers, enabling organisations to align security cues with their brand identity. Whether it's a welcoming chime for access granted or a firm tone for denial, audio transforms security from a silent guardian into a responsive, intuitive system.

Card image cap
Chris Wildfoerster Axis Communications US

Today, there are more ways than ever to integrate audio into security systems to deliver expanded coverage and value. Modern audio solutions include a variety of capabilities like two-way communication with echo cancellation, eye-catching displays, strobe lights, custom messaging and zoning, and more to help enhance use of the technology in schools, healthcare facilities, transportation hubs, and other protected areas. Taking it a step further, audio analytics that leverage artificial intelligence to detect unusual sounds, such as screams, shouts, and breaking glass, are increasingly being implemented to trigger automatic alerts that help verify events while improving incident response. Ease of scalability has been a key challenge when it comes to expanded audio adoption, but today's technology solutions prioritise system scalability to ensure organisations of all sizes are able to implement and use audio coupled with visual alerting to their full advantage.

Card image cap
David Zhai Verkada Inc.

Audio is a critical layer of information for physical security systems, especially at the perimeter, where real-time communication and response are key. Voice, after all, is one of the most natural and effective ways we communicate and gather information. Whether it’s granting or denying access to a building, de-escalating a situation, or issuing instructions during an emergency, spoken communication can be far more impactful than strobe lights, sirens, or buzzers. Now, with the integration of AI, audio is evolving from a basic communication channel into an important source of intelligence. Recent advances in AI, particularly large language models (LLMs), are opening the door to new capabilities that give security and operations teams deeper context and faster insights. I can envision that, in the not-so-distant future, systems will leverage intelligent AI agents that can interact via voice to provide instructions, answer questions, or even take specific actions. It’s important to note that audio is not necessary or appropriate to leverage in all security settings. Security leaders and organisations will need to ensure they are deploying audio analytics in a responsible, thoughtful way that respects privacy.


Editor Summary

From cameras with built-in microphones to intercoms and public address systems to audio analytics, there is a variety of components that can leverage sound to improve security. Audio is no longer just a supplementary feature in physical security; rather, it's an increasingly integral component that significantly enhances detection capabilities, improves response effectiveness, and provides valuable context for security events.

  • Related links
  • Anviz Power supplies & batteries
  • Axis Communications Power supplies & batteries
  • i-PRO Power supplies & batteries
  • Verkada Power supplies & batteries
  • Axis Communications Video servers (IP transmission)
  • Gallagher Gates
  • Related categories
  • Power supplies & batteries
  • Bollards
  • Video servers (IP transmission)
  • Barricades
  • Gates
  • Barriers
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
IDIS launches new AI PTZ cameras for enhanced security

IDIS launches new AI PTZ cameras for enhanced security

Everon & Alarm.com unify commercial security solutions

Everon & Alarm.com unify commercial security solutions

Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Round table discussions
About this page

Explore how audio enhances physical security systems, providing critical context alongside video and access control. Discover insights and obstacles from industry experts on audio's evolving role in security.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec