Download PDF version Contact company

Owning and operating an entertainment venue comes with increasing levels of risk – whether it’s during the current pandemic or in a post-pandemic world. With the additional challenge of safe re-opening comes increased levels of social unrest, emboldened and unruly patrons, and increasing threats from weapons and other prohibited materials.

The venue owners and operators have an obligation to keep patrons and employees safe from these kinds of security threats, while not negatively affecting the patron experience. The consequences are far-reaching and often extend beyond the brawl or other acts of violence. The recent events at Leister square at the Euro finals speak to the ongoing issues.

As former FBI Director, William H. Webster, once said, “Security is always seen as too much until the day it is not enough.”

The impacts of a security failure fall into three categories of potential business damage that venue operators need to factor in when considering the total cost of a security incident:

Business Disruption

There is an immediate business impact due to an act of violence in a venue in the form of business disruption. Cancelling the event and future events, evacuating the facility and the impact of panic and distress to patrons, police investigations, and interruptions of normal business operations can have costly and long-term implications to the business. These impacts are immediate – in the moments and period shortly after the incident – and have a longer effect as the business has to address the perpetual disruption from an unplanned situation. 

Additionally, there are other considerations to ensure that the staff is managed through the event and are confident of a safe work environment. There will be obvious concerns and stresses, and distractions resulting from the event that will require staff care support, along with potentially incremental hiring and training of staff. Further, the current social unrest has created a security challenge for staff who are no longer guaranteed protection as they perform their security functions, adding to the cost of staffing and security.

Lawsuits

The current social unrest has created a security challenge for staff who are no longer guaranteed protection as they perform their security functions

With violence comes lawsuits and media attention.  The collateral “damage” from an event is often lengthy, with teams from legal, media, operations and the executives engaged in costly and lengthy processes to manage through the post-event complexities. The direct costs of these events can be hundreds of millions, as previously reported for the Mandalay Bay and Pulse Nightclub shootings. The indirect and sometimes hidden costs for business disruption can often be the same or more. We live in a very litigious society – and violent incidents are fertile ground for both legitimate and opportunistic lawsuits.

Reputation Damage

Major physical security incidents can come with the risk of a negative brand impact. Regardless of the incident, or the proximity to the venue, the venue brand gets tainted with negative news.  With “cancel culture” and our social media-fueled world, the headlines and impressions created can have long-lasting impacts to patron attendance, revenues, and profitability – especially since they are circulated without all the details and facts. Unfortunately, individuals consciously or unconsciously avoid venues that have a negative brand impression. A brand that has a challenge with guns or fights may also cause many potential patrons to stay away – a key reason why Major League Baseball stadiums opened “family sections,” though ideally, all areas of the ballpark would be suitable for families.

Mitigating the Cost of Security Incidents

In the post 9/11 world, security has become a top priority for larger entertainment venues, with particular attention and certifications being driven by the Department of Homeland Security. Unfortunately, this has also had a detrimental impact on the patron experience. Historically, security, whether physical security or cybersecurity, has been at the cost of patron experience and ease of use. More security equals a much poorer experience. For example, long lines at metal detectors are now expected by people when they attend sporting or entertainment events. While this helps to protect against the risks and costs articulated above, it reduces the amount of time patrons are in the facility, which impacts revenue. Also, it simply shifts the target from one side of the metal detector to the other, where long lines and crowds form outside the venue. This open area is still considered within the brand's responsibility. 

Digital technology holds one answer to managing risk and the impact of an incident while ensuring a very positive experience. Historically, security, whether physical security or cybersecurity, has been at the cost of patron experience and ease of use. 

The world of metal detectors, wands and widely deployed security guards is all part of today’s “brute force” manual approach to security. This is a very labor-based business model that does not scale and has a fixed approach that cannot adapt to changing venue requirements. New, multi-billion-dollar stadiums are being built with a focus on a broad and immersive patron experience. Digital technology fits into this model to deliver next-generation patron safety with enhanced experiences.

For example, modern gateway weapons screening solutions enable patrons to walk into venues unimpeded – just like the pre-9/11 world. These systems only alert guards when an actual weapon is detected, eliminating the need to screen the 99+% of patrons who are not carrying anything dangerous into the venue.

Likewise, AI-enabled video can surveille the premises 24/7 and automatically alert and brief guards when they detect a disturbance or other concerning event (like an abandoned package, or even a spill on a floor). This also removes guards from the “look for trouble” model – guards spend their time effectively responding to actual digitally-detected events.

With these new technologies, security transforms from being a roadblock to being an enabler. The technologies enable patrons to have a better experience in the venue and they enable guards to become knowledge workers focused exclusively on mitigating developing problems for patrons, rather than manual screen-watchers. And, they enable venues to dramatically reduce the likelihood of incidents happening in the first place – which is the best way to mitigate the costs of security incidents.

Download PDF version Download PDF version

Author profile

Peter Evans CEO, Patriot One Technologies Inc.

Peter Evans is the chief executive officer of Patriot One Technologies Inc. With more than 25 years of experience with venture capital, private equity and technology enterprises, he has served in senior executive roles with companies ranging from venture-backed start-ups to Fortune 500 brands, across sectors including telecom, cloud, SaaS and both cyber and physical security. 

In case you missed it

Cutting Through The Hype: AI And ML For The Security Space
Cutting Through The Hype: AI And ML For The Security Space

Today’s organizations face numerous diverse threats to their people, places and property, sometimes simultaneously. Security leaders now know all too well how a pandemic can cripple a company’s ability to produce goods and services, or force production facilities to shut down, disrupting business continuity. For example, a category three hurricane barreling towards the Gulf of Mexico could disable the supplier’s facilities, disrupt the supply chain and put unexpected pressure on an unprepared local power grid. Delivering timely critical information Tracking such risk is hard enough, but managing it is even more difficult. A swift response depends on delivering the right information to the right people, at the right time. And, it’s not as easy as it sounds. Indeed, 61 percent of large enterprises say critical information came too late for them, in order to mitigate the impact of a crisis, according to Aberdeen Research (Aberdeen Strategy & Research). These challenges are accelerating the hype around Artificial Intelligence (AI) These challenges are accelerating the hype around Artificial Intelligence (AI). The technology promises to help us discover new insights, predict the future and take over tasks that are now handled by humans. Maybe even cure cancer. Accelerating the hype around AI But is AI really living up to all this hype? Can it really help security professionals mitigate risk? After all, there’s a serious need for technology to provide fast answers to even faster-moving issues, given the proliferation of data and the speed at which chaos can impact operations. Risk managers face three major obstacles to ensuring business continuity and minimizing disruptions. These include: Data fatigue - Simply put, there’s too much data for human analysts to process in a timely manner. By 2025, the infosphere is expected to produce millions of words per day. At that pace, you’d need an army of analysts to monitor, summarize and correlate the information to your impacted locations, before you can communicate instructions. It’s a herculean task, made even more difficult, when we consider that 30 percent of this global datasphere is expected to be consumed in real time, according to IDC. Relevance and impact - Monitoring the flood of information is simply the first hurdle. Understanding its impact is the second. When a heat dome is predicted to cover the entire U.S. Pacific Northwest, risk managers must understand the specifics. Will it be more or less hot near their facilities? Do they know what steps local utilities are taking to protect the power grid? Such questions can’t be answered by a single system. Communication - Once you know which facilities are impacted and what actions to take, you need to let your employees know. If the event is urgent, an active shooter or an earthquake, do you have a fast, effective way to reach these employees? It’s not as simple as broadcasting a company-wide alert. The real question is, do you have the ability to pinpoint the location of your employees and not just those working on various floor in the office, but also those who are working from home? How AI and ML cut through the noise Although Artificial Intelligence can help us automate simple tasks, such as alert us to breaking news, it requires several Machine Learning systems to deliver actionable risk intelligence. Machine Learning is a branch of AI that uses algorithms to find hidden insights in data, without being programmed where to look or what to conclude. More than 90 percent of risk intelligence problems use supervised learning, a Machine Learning approach defined by its use of labeled datasets. The benefit of supervised learning is that it layers several pre-vetted datasets, in order to deliver context-driven AI The benefit of supervised learning is that it layers several pre-vetted datasets, in order to deliver context-driven AI. Reading the sources, it can determine the category, time and location, and cluster this information into a single event. As a result, it can correlate verified events to the location of the people and assets, and notify in real time. It’s faster, more customized and more accurate than simple Artificial Intelligence, based on a single source of data. Real-world actionable risk intelligence How does this work in the real world? One telecommunications company uses AI and ML to protect a mobile workforce, dispersed across several regions. An AI-powered risk intelligence solution provides their decision makers with real-time visibility into the security of facilities, logistics and personnel movements. Machine Learning filters out the noise of irrelevant critical event data, allowing their security teams to focus only on information specific to a defined area of interest. As a result, they’re able to make informed, proactive decisions and rapidly alert employees who are on the move. Four must-have AI capabilities To gain real actionable risk intelligence, an AI solution should support four key capabilities: A focus on sourcing quality over quantity. There are tens of thousands of sources that provide information about emerging threats - news coverage, weather services, social media, FBI intelligence and so much more. Select feeds that are trusted, relevant and pertinent to your operations. Swift delivery of relevant intelligence. To reduce the mean-time-to-recovery (MTTR), risk managers need an accurate understanding of what’s happening. Consider the different contextual meanings of the phrases ‘a flood of people in the park’ and ‘the park is at risk due to a flood’. Machine Learning continuously increases the speed of data analysis and improves interpretation. Ability to cross-reference external events with internal data. As it scans different data sources, an AI engine can help you fine-tune your understanding of what’s happening and where. It will pick up contextual clues and map them to your facilities automatically, so you know immediately what your response should be. Ready-to-go communications. Long before a threat emerges, you can create and store distribution, and message templates, as well as test your critical communications system. Handling these tasks well in advance means you can launch an alert at a moment’s notice. The ability to minimize disruptions and ensure business continuity depends on speed, relevance and usability. AI and ML aren’t simply hype. Instead, they’re vital tools that make it possible for security professionals to cut through the noise faster and protect their people, places and property.

What Career Opportunities Await The Next Generation In Security?
What Career Opportunities Await The Next Generation In Security?

A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labor pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?

Video Surveillance As A Service (VSaaS) From Integrator And User Perspective
Video Surveillance As A Service (VSaaS) From Integrator And User Perspective

Technology based on the cloud has become a popular trend. Most IT systems now operate within the cloud or offer cloud capabilities, and video surveillance is no exception: virtually every major hardware and software vendor offers cloud-based services. Users benefit from the cloud due to its numerous advantages, such as ease of implementation, scalability, low maintenance costs, etc. Video surveillance as a service (VSaaS) offers many choices, so there is an optimal solution for each user. However, what about integrators? For them, VSaaS is also a game-changer. Integrators are now incentivized to think about how they can maintain their markets and take advantage of the new business opportunities that the cloud model provides. Hosted video surveillance The cloud service model has drastically changed the role of an integrator. Traditionally, integrators provided a variety of services including system installation, support, and maintenance, as well as served as a bridge between vendors and end-users. In contrast, hosted video surveillance as a service requires a security system installer to simply install cameras and connect them to the network, while the provider is in direct contact with each end-user. The cloud service model has drastically changed the role of an integrator There is no end to on-premises systems. However, the percentage of systems where the integrator’s role is eliminated or considerably reduced will continue to increase. How can integrators sustain their markets and stay profitable? A prospective business model might be to become a provider of VSaaS (‘cloud integrator’) in partnership with software platform vendors. Cloud-Based surveillance Some VMS vendors offer software VSaaS platforms that form the basis for cloud-based surveillance systems. Using these solutions, a data center operator, integrator, or telecom service provider can design a public VSaaS or VSaaS in a private cloud to service a large customer. The infrastructure can be built on any generic cloud platform or data center, as well as resources owned by the provider or client. So, VSaaS providers have the choice between renting infrastructure from a public cloud service like Amazon Web Services, Microsoft Azure, or Google Cloud or using their own or clients’ computing infrastructure (virtual machines or physical servers). Gaining competitive advantage When integrators purchase commitment use contracts for several years, they can achieve significant savings As an example, a telecom carrier could deploy VSaaS on their own infrastructure to expand their service offering for clients, gaining a competitive advantage and enhancing profits per user. Using a public cloud, a smaller integrator can host the computing infrastructure immediately, without incurring up-front costs and with no need to maintain the system. These cloud services provide scalability, security, and reliability with zero initial investment. When integrators purchase commitment use contracts for several years, they can achieve significant savings. Next, let’s examine VSaaS options available in the market from an end-users point of view. With hosted (or cloud-first, or true-cloud) VSaaS solutions, all the video feeds are transmitted directly from cameras to the cloud. Optionally, video can be buffered to SD cards installed on cameras to prevent data losses in case of Internet connection failures. Dedicated hardware bridges Service providers may offer dedicated hardware bridges for buffering video footage There are many providers of such services that offer their own brand cameras. Connecting these devices to the cloud should only take a few clicks. Firmware updates are usually centralized, so users don’t have to worry about security breaches. Service providers may offer dedicated hardware bridges for buffering video footage and secure connections to the cloud for their branded and third-party cameras. Typical bridges are inexpensive, basic NVRs that receive video feeds from cameras, record on HDD, and send video streams to the cloud. The most feature-rich bridges include those with video analytics, data encryption, etc. Introducing a bridge or NVR makes the system hybrid, with videos stored both locally and in the cloud. At the other end of the spectrum relative to hosted VSaaS, there are cloud-managed systems. Video management software In this case, video is stored on-site on DVRs, NVRs, video management software servers, or even locally on cameras, with an option of storing short portions of footage (like alarm videos) in the cloud for quick access. A cloud service can be used for remote viewing live video feeds and recorded footage, as well as for system configuration and health monitoring. Cloud management services often come bundled with security cameras, NVRs, and video management software, whereas other VSaaS generally require subscriptions. Keep in mind that the system, in this case, remains on-premises, and the advantages of the cloud are limited to remote monitoring and configuring. It’s a good choice for businesses that are spread across several locations or branches, especially if they have systems in place at each site. On-Site infrastructure All that needs to be changed is the NVRs or VMS with a cloud-compatible model or version All locations and devices can be remotely monitored using the cloud while keeping most of the existing on-site infrastructure. All that needs to be changed is the NVRs or VMS with a cloud-compatible model or version. Other methods are more costly and/or require more resources to implement. Hosted VSaaS helps leverage the cloud for the highest number of benefits in terms of cost and technological advantages. In this case, the on-site infrastructure consists of only IP cameras and network equipment. This reduces maintenance costs substantially and also sets the foundation for another advantage of VSaaS: extreme and rapid scalability. At the same time, the outgoing connection at each site is critical for hosted VSaaS. Video quality and the number of cameras directly depend on bandwidth. Broadband-Connected locations Because the system does not work offline, a stable connection is required to stream videos. In addition, cloud storage can be expensive when many cameras are involved, or when video archives are retained for an extended period. The hosted VSaaS is a great choice for a small broadband-connected location The hosted VSaaS is a great choice for small broadband-connected locations and is also the most efficient way to centralize video surveillance for multiple sites of the same type, provided they do not have a legacy system. Since it is easy to implement and maintain, this cloud technology is especially popular in countries with high labor costs. Using different software and hardware platforms, integrators can implement various types of VSaaS solutions. Quick remote access For those who adhere to the classic on-premises approach, adding a cloud-based monitoring service can grow their value proposition for clients with out-of-the-box capabilities of quick remote access to multiple widely dispersed sites and devices. For small true-cloud setups, there is a possibility to rent a virtual machine and storage capacity in a public cloud (such as Amazon, Google, or Microsoft) and deploy the cloud-based VMS server that can handle dozens of cameras. In terms of features, such a system may include anything from plain video monitoring via a web interface to GPU-accelerated AI video analytics and smart search in recorded footage, depending on the particular software platform. Optimizing internet connection Hybrid VSaaS is the most flexible approach that enables tailoring the system to the users’ needs High-scale installations, such as VSaaS for public use or large private systems for major clients, involve multiple parts like a virtual VMS server cluster, web portal, report subsystem, etc. Such systems can also utilize either own or rented infrastructure. Some vendors offer software for complex installations of this kind, though there are not as many options as for cloud-managed systems. Finally, hybrid VSaaS is the most flexible approach that enables tailoring the system to the users’ unique needs while optimizing internet connection bandwidth, cloud storage costs, and infrastructure complexity. It’s high time for integrators to gain experience, choose the right hardware and software, and explore different ways of building systems that will suit evolving customer demands in the future.