SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

How Are Data Analytics Changing The Course Of Security?

10 Nov 2023

How Are Data Analytics Changing The Course Of Security?
Larry Anderson
Larry Anderson
21 Nov 2023

Editor Introduction

For many years, security systems produced their share of "data exhaust." Every access control action and each video image became a data point to be stored in perpetuity, with no practical way to use the data. More recently, systems have been developed to enable organizations to analyze data from sensors and other connected devices to gain valuable insights into how their systems are being used, to identify potential vulnerabilities; and even to provide insights into broader enterprise operations. We asked this week’s Expert Panel Roundtable: How are data analytics changing the course of the security marketplace? 


Card image cap
Charles Pitman Genetec, Inc.

Security organisations are sitting on a goldmine of data collected by surveillance cameras, video management systems (VMS), and other connected physical security devices. With the rise of data analytics, physical security system data can be used as more than just a tool to respond to crime or a necessary expense to keep assets and people safe. It can become a core element in the digital transformation of organisational processes. Analytics can turn physical security data into smart, actionable insights that improve operations, efficiency, revenue generation, the customer experience, and more. A unified, open physical security platform helps organisations tap into the full potential of devices and equipment they already own, using data in new ways to streamline operations. While analytics help filter unstructured data into pertinent events, the platform helps operators leverage those insights to resolve immediate issues. And it brings teams across the organisation together on a common toolset, using a common language, to make improvements to the things they do every day. 

Card image cap
David (Dave) Barber Salient Systems

From an IP video perspective, the data has always been there; it is only within the past few years that the security space has begun to use this data to create more efficiencies and predictors. We know that many end users’ systems have grown in size, and employing the operators necessary to watch and respond in real-time to these real-life events has been costly. Usher in the use of real-time AI, and now even end users with small and large systems can see and respond to these events in real-time. They can also review reports of these events to allow for more efficient responses regarding future events. Over time, AI technology has become more accurate and usable. AI has allowed manufacturers to create tools that enable our end-user customers to be more efficient and provide a solution for them to reduce their liabilities.  

Card image cap
Daniel Reichman Ai-RGUS

A camera system on its own offers users the ability to have eyes at every location where a camera is installed. However, it still requires a person to actually view the footage in order to take the appropriate action. Selling a camera system along with analytics helps unlock value from the camera system investment by offering an efficient means of uncovering information. For example, a camera system offered with a health monitoring solution that can identify camera view problems such as tilted or blocked cameras gives users peace of mind that the video evidence they expect to be there after an incident will be of the highest quality. Without such software, users would need to establish a programme to regularly check the camera system to ensure it is working as intended. This is a time- and cost-intensive process to do without automation.

Card image cap
Rui Barbosa i-PRO

Modern AI cameras can record a wealth of metadata regarding the objects they recognise. These attributes can then be fed into an analytics engine to find people or vehicles of interest or alert us when people or vehicles with certain characteristics exhibit a type of behavior. Beyond security, this data can also show how many people have entered an area or how long they paused next to a certain display. This can be used to construct a “heat map” that retail operations can use to uncover which products are attracting attention. Sophisticated analytics like AI Scene Change Detection can go further and alert an organisation when stock is running low. Organisations large and small are hungry for data/metrics that show how the business is performing. Security cameras can easily do “double duty” by protecting assets and employees while simultaneously providing data that reveal opportunities and trends that can directly benefit a company’s bottom line.

Card image cap
Rob Muehlbauer Axis Communications

Data analytics have played an important role in making security more proactive versus reactive, as analytics have greatly expanded the capabilities of traditional surveillance devices such as cameras, intercoms, access control solutions, and more. Leveraging and integrating data collected by video, audio, and other surveillance technologies, analytics not only allow security teams to make faster decisions based on real-time outputs but also provide improved access to actionable insights that can then be used to make key business decisions, allowing the security marketplace to provide increased value across the enterprise. Edge analytics, in which data is both collected and analysed via the device itself, are especially adaptable and scalable, allowing security organisations to offer solutions that are more cost-effective and straightforward to implement. As data analytics continue to evolve, so too will the overall security marketplace.  

Card image cap
Kayne McGladrey Hyperproof

Data analytics serves as an essential resource for Chief Information Security Officers (CISOs). It can automatically evaluate the effectiveness of security controls that relate to distinct risks. Assessments give feedback in real time, which allows for swift adjustments to these controls. Data analytics also enable anomaly detection, which issues alerts when metrics deviate in a meaningful way from usual patterns, thereby aiding in risk management. Further, predictive analytics analyse historical data to foresee potential future security incidents, helping CISOs take action in advance. Data analytics also contribute to enhanced situational awareness. They aggregate information from a variety of network sources, which assists in the strategic allocation of resources. However, the expertise of a CISO remains vital for interpreting data in its proper context and making informed decisions. In summary, data analytics is transforming the methods CISOs use to manage cybersecurity risks. It is making their strategies more effective and adaptable. 

Card image cap
Corey Still Bell

Today’s cybersecurity solutions feature analytics for software, hardware, and the cloud. However, applying analytics has changed significantly over time. Previously, analytics were used in a very reactive way to detect patterns in east-west traffic to shorten dwell time after a breach occurs. But as analytics platforms improve and draw upon more data, they’re increasingly being used in a more predictive and proactive manner, including analysing incoming and outgoing traffic to ensure threats can’t gain access to the network in the first place. Compared to individual solutions, purpose-built security analytics platforms can provide increased visibility into an organisation’s network, endpoint, and cloud traffic. This offers unprecedented amounts of contextual information on potential threats and how to mitigate them, allowing organisations and their security teams to get a much richer understanding of what’s happening with particular locations or sets of users. 


Editor Summary

As our Expert Panelists point out, analytics can turn physical security (and cybersecurity) data into smart, actionable insights that improve operations, efficiency, revenue generation, and the customer experience, among other benefits. The use of analytics is enabling security practitioners to shift from a reactive to a proactive stance, in some cases identifying problems at an early stage and contributing to the company’s bottom line. 

  • Related links
  • Axis Communications Intercom Systems
  • Axis Communications Video Surveillance software
  • Genetec Video Surveillance software
  • Salient Systems Video Surveillance software
  • Axis Communications IP cameras
  • Genetec IP cameras
  • i-PRO IP cameras
  • Card Access control cards/ tags/ fobs
  • Infrared IP cameras
  • Audio Only Intercom Systems
  • IP54 Intercom Systems
  • Magnetic Stripe Access control cards/ tags/ fobs
  • Desk Mount Intercom Systems
  • ANPR Software Video Surveillance software
  • Vandal Resistant Intercom Systems
  • Flush Mount Intercom Systems
  • Control Software Video Surveillance software
  • Keypad & Audio Intercom Systems
  • Proximity Access control cards/ tags/ fobs
  • Water Resistant Intercom Systems
  • Surface Mount Intercom Systems
  • Fob Access control cards/ tags/ fobs
  • Network IP cameras
  • Video & Audio Intercom Systems
  • Detection Software Video Surveillance software
  • Wall Mount Intercom Systems
  • Tag Access control cards/ tags/ fobs
  • PTZ IP cameras
  • Video, Keypad & Audio Intercom Systems
  • Drawing Software Video Surveillance software
  • Smart Card Access control cards/ tags/ fobs
  • Weather Resistant Intercom Systems
  • Thermal IP cameras
  • IP Surveillance Software Video Surveillance software
  • Management Software Video Surveillance software
  • Recording Software Video Surveillance software
  • Monitoring Software Video Surveillance software
  • Surveillance Software Video Surveillance software
  • Transmission Software Video Surveillance software
  • 2023 security trends
  • Related categories
  • Video Surveillance software
  • Intercom Systems
  • IP cameras
  • Access control cards/ tags/ fobs
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
Related articles
How Physical Security Consultants Ensure Cybersecurity For End Users

How Physical Security Consultants Ensure Cybersecurity For End Users

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Round table discussions
About this page

"Explore how data analytics are transforming the physical security industry, providing insights into system usage, detecting vulnerabilities, and enhancing enterprise operations. Learn from our Expert Panel Roundtable."

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec