SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Which security systems are more proactive than reactive?

20 Apr 2022

Which security systems are more proactive than reactive?
Larry Anderson
Larry Anderson
20 Apr 2022

Editor Introduction

The advantages of security systems as forensic and investigative tools are well understood and demonstrated in the market. However, the new trend is toward systems that are useful in real-time and that even predict a security event, before it happens.

We asked this week’s Expert Panel Roundtable: Which security systems are becoming more proactive than reactive?


Card image cap
Iain Chorlton Amulet

While the nature of our industry dictates that some work will always be reactive, the fact is that more and more should be proactive. We have the tools and the experience to put plans in place for our clients and reach a level of preparedness that wasn’t possible in previous years. A prime example of this is real-time situational software. Tools like this can create a culture of security and enhanced preparedness, by running exercises in the software, based on any number of scenarios. Teams can train and prepare for various scenarios, so that if and when they do happen, the response is planned out rather than reactive. Software can be accessed by all stakeholders to open lines of communication and manage a security response. This can underpin many other security systems, thereby helping organisations to become more proactive, with every element of their security service.

Card image cap
Kyle Hurt Genetec, Inc.

The role of physical security systems has evolved significantly over the last few years. From being mostly used as forensic tools, modern physical security systems are now being developed for intelligence-led risk mitigation and proactive prevention. With a unified security system that tightly integrates and correlates data from sensors, such as access control, intrusion, video, ALPR and more, organisations can establish a more proactive security operation environment, instead of reacting to a security event, after the fact. New crime analysis and case investigation tools, based on cognitive engineering and the latest in video analytics, can now facilitate intelligence-led policing through data discovery and construction of relationships between people, places, time, objects, and activities. The latest advancements in ALPR technology go beyond recognising licence plate numbers, by also identifying vehicle characteristics, like colour and type, and behaviour analytics, such as speed estimation and direction of travel, under all weather conditions.

Card image cap
John Davies TDSi

While proactive security seems like an obvious goal, it’s important to remember that by their very nature, most security systems (including sensors, cameras, and access credential readers) are inherently reactive to a condition or action in the monitored environment, as it takes place. While these systems are excellent at alerting the security team, they aren’t really proactive. A truly proactive system would require an inherent AI/Machine Learning capability that allows the generation of predictive algorithms, based on actual event data. If the system can accurately monitor and interpret real-world data in its space, then it can become more proactive. However, there is always a danger that a system pre-occupied by this could end up concentrating on expected scenarios, making the unexpected even more of a surprise. Ideally all security systems need to do both – being both proactive to suggest potential issues and fully alert to any breach, however unexpected.

Card image cap
Brian Baker Calipsa

The addition of artificial intelligence (AI) software makes video surveillance a much more proactive technology. Cameras no longer simply transmit live video for security operations centre staff to review and act upon alarm events. Now, AI software rapidly makes judgments on events to eliminate up to 95% of false alarms. Previously, non-threatening activities, such as a stray animal running across the field of vision required an operators’ attention, possibly causing a delay in response or entirely missing an actual event. The same software also automatically identifies loiterers or crowd formations. Watchlists allow security teams to load photos of people or vehicles to observe – or ignore. A camera’s angle being moved or significant scene changes result in an alert to the SOC. The analytic AI software also helps with forensic investigations, tracking objects of similar appearance from all cameras or selected sites. Proactive video surveillance has arrived.

Card image cap
Jody Ross AMAG Technology, Inc.

The abundance of data that security systems provide can be overwhelming, to say the least. How that data is handled and how to make that data work for you is the difference between being proactive and reactive. Security systems produce data that can be used proactively in securing facilities and providing a safer environment. Analytics or business intelligence can help identify people who may pose a high risk to an organisation. Anomalies in employees’ or contractors’ patterns, such as unusual arrival or departure times, or trying to access the wrong doors, could easily happen under the radar and be completely overlooked. Analytics systems can notify operators that a closer look at a particular person may be warranted. The access control data, along with other data, can be consumed, assessed, and communicated to other departments, in order to prevent risk proactively.

Card image cap
Brad McMullen 3xLOGIC, Inc.

Security systems have historically been used to detect suspicious behaviour and send alerts, when unauthorised activity occur on-premises. The challenge, however, is that this process is very reactive and alerts are typically triggered, after someone has obtained access to the site. Advanced edge-based analytics can alert in real time, when suspicious activity is detected on or around the protected estate. This provides an opportunity for proactive response and the potential to prevent a malicious event. The ability to ‘see in the dark’ makes region surveillance much more robust and resilient, thereby enhancing the level of protection that a CCTV system can provide. Today, most advances in security systems are focused on proactive alerts and response, which lead to preventive notifications. Utilising edge analytics, motion detection, thermal sensors, and comprehensive rules engines, video management systems can also provide alerts and visibility that can help prevent break-ins, and they provide real-time data and visibility

Card image cap
Nils Wahlander HID

We often have more data at our fingertips than we know what to do with, but the solutions that have harnessed this information have really changed the user experience. In the security space, we have specifically seen cloud-based card personalisation solutions utilise the card printer data, in order to enable the card office administrators to change from a reactive fire-fighting approach to less stressful proactive approach. Just like you never run out of gas, as soon as you reach your destination, you do not run out of printer consumables, when the last card is printed. This innovative approach is accomplished by providing information, such as the printer status, its consumable levels, and whether a software update is needed in real time, through a dashboard or text notifications. In addition, these cloud-based card personalisation solutions provide the flexibility to see this information from anywhere, using the Cloud to provide user flexibility.

Card image cap
Tim Northwood Inner Range

Historically, access control was simply about opening doors with PIN codes and later with smart cards. But, intelligent access control systems have been constantly evolving and they now offer an increasing array of proactive features. The sophisticated integration abilities of quality access control systems mean managers can control all aspects of access and security from one unified platform, from CCTV and elevators to visitor management and HR systems. Whether you simply want reminders, when health or safety training needs renewing, proactive measures to manage the flow of people, or insights to drive efficiencies, intelligent access control can deliver. Likewise, if you want a system that automatically pulls up relevant CCTV if an alert is triggered, or elevators that read credentials presented to entry turnstiles and automatically direct users to their fastest elevator, in order to avoid crowding, quality access control can achieve this. It means you can be more proactive too.

Card image cap
Rebecca Wormleighton Zendelity

It is not that security systems are becoming more proactive, it’s the evolution of technology that is allowing security to become proactive. Advancements in mobile applications, near field communications (NFC), artificial intelligence, predictive analytics, facial recognition, cloud computing etc. are enabling business to become more proactive, security is the use case. To identify the security systems, one must look for the ones that integrate these technologies. What is consistent with these technologies, is that they all center on data, which says that the more data you have the more accurate and proactive security can be and therefore, reduce more risk. For example, Command Centre from Zendelity leverages the latest advancements in mobile devices, NFC and cloud computing to enable safety and security for the first time, to be able to capture operating data in real time, so they can identify potential hazards, before they impact customers, employees, vendors and guests.


Editor Summary

Risk mitigation and proactive prevention are among the ways that security systems are becoming more proactive in the current climate. Security systems provide a lot of data that can be analysed to yield greater insights into possible future risks and scenarios. Artificial intelligence (AI) and machine learning help current systems analyse the past and predict future risks. Being able to predict and/or prevent a future event is a new opportunity for the security market.

  • Related links
  • AMAG Access control software
  • AMAG CCTV software
  • Genetec CCTV software
  • Genetec Access control software
  • HID Access control software
  • Inner Range Access control software
  • Inner Range Access control systems & kits
  • TDSi CCTV software
  • TDSi Access control software
  • TDSi Access control systems & kits
  • Genetec IP cameras
  • TDSi IP cameras
  • TDSi IP Dome cameras
  • Biometric Access control software
  • ANPR Software CCTV software
  • Access Control Software Access control software
  • Biometric Access control systems & kits
  • Proximity Access control systems & kits
  • Standalone / Networked Access control systems & kits
  • Indoor/Outdoor IP Dome cameras
  • Network IP cameras
  • Proximity Access control software
  • IP Surveillance Software CCTV software
  • Central Monitoring Option Access control software
  • Monitoring Software CCTV software
  • Face Recognition Software Access control software
  • Issuance and identification system Access control software
  • Related categories
  • CCTV software
  • Access control systems & kits
  • Access control software
  • IP cameras
  • IP Dome cameras
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
IDIS launches new AI PTZ cameras for enhanced security

IDIS launches new AI PTZ cameras for enhanced security

Everon & Alarm.com unify commercial security solutions

Everon & Alarm.com unify commercial security solutions

Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Round table discussions
About this page

Discover robust security systems that blend proactive and reactive approaches, ensuring a safe, seamless business experience with top-notch protection.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec