SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

How Can Security Systems Be More Proactive?

10 Aug 2023

How Can Security Systems Be More Proactive?
Larry Anderson
Larry Anderson
10 Aug 2023
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Proactive security systems prevent incidents, reducing need for reactive responses.
  • Expert panel discusses proactive measures enhancing organizational security effectiveness.
  • Proactive systems aim to mitigate harm by foreseeing and preventing potential threats.

Editor Introduction

Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organization, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples. 


Card image cap
Ryan Gregory Axis Communications

Today’s security systems can be as proactive as ever, protecting sites across industries while also streamlining operations and enhancing visitor experiences. For instance, audio solutions can be used as a deterrent to prevent incidents and to broadcast critical announcements, and intercoms can provide onsite or remote access control with options for automation that can simplify security needs. Additionally, analytics embedded in cameras can help with detection and prevention, as well as help to improve day-to-day business operations. All these different components can then be pulled together into a single video management platform for a complete, proactive, end-to-end security system. But proactivity doesn’t end there, systems depend on proactive maintenance to ensure stability and security. This is especially true in today’s ecosystem of connected and interdependent devices and solutions, and as cyberattacks grow in number and sophistication.

Card image cap
Sean Foley Interface Systems LLC

Preventing a bad event from occurring should be a focus for any security or loss prevention team. With AI-based cameras capable of human and vehicle detection, we can now provide custom, automated responses to a variety of situations. If a group of people are loitering on the premises after hours, we might trigger a voice-down message that asks them politely to disperse. If they don’t comply, a further escalation message might include turning on additional lighting or activating strobes. All of this can be done without any human intervention and can be directly integrated with existing cameras and infrastructure. The ultimate step might be triggering an alert to the monitoring service to have someone intervene or otherwise size up the situation and decide whether to involve law enforcement. Such proactive AI-based security systems can stop crime before it starts and help prioritize the time and attention of security and loss prevention teams.

Card image cap
Dave Nieweg Milestone Systems

Data-driven Video Management Systems (VMS) can "watch and listen" for abnormal actions, sounds, motions, harmful air quality, and much more. Integrated video analytic software can “learn” a scene and identify a wide range of atypical actions and events. Audio sensors can detect specific noise signatures like arguing, gunshots, or calls for help, while air monitoring sensors can detect overall air quality, smoking, vaping, carbon monoxide, and other hazardous gases, making integrated sensors an essential part of the VMS's overall safety and security effectiveness. An open VMS enables the synchronization of audio, video, and other data with a facility's other existing safety systems such as access control, lighting, and intercom creating a comprehensive, proactive approach to security. VMS technologies today can quickly ingest, process, and present vast amounts of data to security personnel, allowing them to monitor events in real-time and make informed, proactive decisions as they occur, greatly improving overall safety and security.

Card image cap
Alan Stoddard Intellicene

Predictive analytic capabilities are an important component of realizing proactive security efforts. By analyzing historical data and identifying trends and correlations, security systems can help security pioneers anticipate potential risks. For example, AI algorithms can identify high-risk areas based on past incidents and allocate additional security resources accordingly. This predictive approach allows for proactive measures to be implemented, thus enhancing overall security preparedness. Also, the integration of AI and situational awareness software brings intelligent automation to security systems. Routine tasks such as monitoring cameras or analyzing logs can be automated, reducing human error, and freeing up human operators to focus on critical responsibilities. This automation improves the efficiency and effectiveness of security efforts, enabling a more proactive approach.

Card image cap
Matthew Fabian Genetec, Inc.

With security systems growing beyond video and access control to include additional IoT sensors as well as analytics and other data inputs, many aspects of a system response can now be automated, allowing it to become more proactive rather than reactive. System behaviors, settings, and controls can now be driven by correlating seemingly unrelated events. For example, an IoT sensor detecting a rise in room temperature, combined with an error or alarms from IT systems, can alert an operator to an issue or even automatically activate extra cooling within an area. When an incident happens, security systems can also automate certain tasks, like triggering alarms, notifying security personnel, or activating automated countermeasures before a breach occurs.

Card image cap
Greg Ayres iDter

Video surveillance with analytics and artificial intelligence (AI) has evolved into automated and proactive deterrence systems. Intruders are detected and classified within seconds followed by immediate and unpredictable deterrence reactions resulting in most intruders (98%+) choosing to swiftly exit. Those who continue to breach are met with escalating actions, including blinding strobes of red and blue LEDs; piercing 120 dB sirens; situation-appropriate voice-down messages; and intimidating sound effects. Immediate deterrence has also been proven to significantly reduce the frequency of intrusions on a property. The use of AI to classify the success of an automated deterrence sequence allows monitoring personnel to narrow their focus on events that matter, reducing labor costs and the overuse of PSAP response. AI has changed the formula of video surveillance from labor-intensive monitoring to a proactive and strategic solution that can prevent crime and significantly lower the total cost of ownership to the user.

Card image cap
Michael Bone LifeSafety Power, Inc.

Power has become increasingly interactive, predictive, and essential to security system continuity. Power is now part of a proactive network that gives a comprehensive, 24/7 analysis of system health and viability. Continued technology refinement brings visibility to the well-being of connected locks, access control, and other systems across the enterprise. Network-connected solutions help integrators and end users assess power continually with notifications that protect against outages or damaging environmental conditions. For example, network-managed power systems report problems immediately, or even before they happen, to the end user and the systems integrator via email, a central dashboard, or by integrating directly into the access manufacturer’s interface. In addition, remote power management provides the ability to schedule automated battery testing, proactively staying on top of battery conditions. Other proactive alerting capabilities include the ability to monitor environmental conditions and report abnormal issues as well as remotely power cycle devices.

Card image cap
Daniel May Consort Architectural Hardware

From cloud-based networks to Near Field Communication (NFC) technology, the adoption of modern access control systems continues to change our approach to building security. Following years of innovation, interconnected security systems are now enabling end users to prevent security risks in their buildings before they transpire intuitively verifying and granting access in large-scale facilities and keeping our homes safe and secure while we are away. The ability to remotely access front doorbells, locking systems, and cameras around our homes has been a major turning point in residential security for example, and now provides homeowners with a practical remedy to ward off potential intruders. Similarly, agile and adaptive cloud-based security systems are presenting decision makers with ready-made, buy-off-the-shelf security products that proactively reduce the vulnerabilities of their buildings by fitting the needs of the environment, no matter the scale or requirements of the space.

Card image cap
Daniel Reichman Ai-RGUS

Security systems can be proactive in their use and, also, beyond their use in security. For example, by counting people and segmenting those counts by space and time of day, it is possible to better plan for attendants or reorganize the flow in a building. In addition, knowledge about the health of the system including its individual components can enable security staff to proactively adjust, repair, or replace a camera or recorder before the video is potentially lost or rendered unusable by equipment failure, environmental conditions, or malicious act.

Card image cap
Tom Reilly Commend USA

Security systems can be proactive by incorporating unified communications solutions, which integrate various systems and allow organizations to enhance their situational awareness and respond to security threats more effectively. Frequently, unified communications solutions can be integrated with incident management systems, enabling seamless communication and coordination during security incidents. When an incident is detected, the unified interface can automatically trigger workflows, such as initiating emergency response protocols, notifying designated personnel, and escalating the incident to the appropriate authorities. By leveraging unified communications, organizations can stay ahead of potential security threats and take proactive measures to safeguard their assets, people, and operations. Another way security systems can be proactive is by utilizing new technology, such as artificial intelligence through voice assistants. AI can enhance the efficiency of security operations and incident response by automating routine tasks, freeing human security personnel to focus on more critical activities.

Card image cap
Jordan Hill HiveWatch

Many physical security systems can be mostly reactive, but how you design your program with them can help create proactive capabilities. Incident reporting and analytics that capture where incidents are happening, the frequency of those incidents, and how long they take to resolve can inform program managers where the best places are to install a new security camera or add an additional stop for a guard tour. Device health alarms help proactively ensure that your security systems are still performant. And noise reduction creates more time for operators to do proactive work by removing false positive alarms from their task lists. Taken together, the shift from reactive to proactive can be a force multiplier for security teams and leadership.

Card image cap
Jake Stauch Verkada Inc.

Security systems become proactive tools when they’re designed to anticipate and prevent threats rather than only reacting to an incident. The key is preventative detection and deterrence. These preventative actions are critical, particularly in cases like retail theft where grab-and-go crimes may only take a couple of minutes. A video security solution with advanced analytics can detect potentially threatening activities, from entering a protected area to crowding or loitering, and instantly activate deterrents like alarms, sirens, or strobes all before an intruder actually enters the building. Now, you can even programme automatic responses on talk-down speakers to play custom sounds, scaring away intruders before they can do any damage. All of this before human intervention ultimately saves valuable time, resources, and money. 

Card image cap
Leo Levit ONVIF

One overlooked area in the proactive capabilities of security systems is predicting system health. What is the probability that certain components might fail because the operating environment temperature exceeds the recommended spec, or the likelihood the image will become blurry, or the dome needs cleaning? The industry will benefit from a variety of analytics and algorithms that can answer these questions and over time offer predictions on device and system health and lifecycle management.

Card image cap
Robert Wall Edge360

Video surveillance's deterrence capabilities are vital in proactive security strategies because it discourages bad actors from engaging in criminal behavior. Containerized video management systems (VMS) can greatly enhance these capabilities. These platforms, encapsulated within software containers, deliver consistent performance across different computing environments because the containers include everything from the code and runtime to system tools and libraries. The advantages of a containerized VMS extend to its scalability, supporting swift changes in security resources to accommodate changing needs. The inherent flexibility of these systems supports their deployment across a variety of infrastructures, including on-premises, cloud-based, or a hybrid setup. The resulting scalability and flexibility are what make a containerized VMS such a critical asset in improving an organization's proactive security strategy.

Card image cap
Grant Graham Netwatch

Proactive security measures play a crucial role in maintaining a safe and secure environment. The primary benefit is proactive crime prevention, including theft, vandalism, data breaches, and more. Acting ahead of time can effectively avert these security incidents, safeguarding physical and digital assets. It also enables rapid response to threats and contributes to creating a strong security culture within an organization. Proactive video monitoring is becoming the most effective crime prevention service within the remote video monitoring services category. This actively monitored security measure, overseen by skilled security personnel, is designed to preemptively identify potential threats. Rather than solely recording for post-incident analysis, PVM is engineered to issue real-time alerts when suspicious behavior is observed. Stakeholders can immediately respond to potential security threats, as opposed to discovering them post-event. This contributes to fostering a heightened level of security consciousness and safe environments. 

Card image cap
Adam Lowenstein i-PRO

It’s no longer acceptable for security teams to simply document impactful events that happened in the past for their organizations. The overarching goal is to try and prevent events from occurring in the first place. This shift from a reactive stance to a proactive one is a major focus at i-PRO. AI-based cameras are a first line of defense when it comes to helping security teams be more proactive. For example, the ability to detect and notify operators when a human is loitering after hours is highly valuable. Likewise, if a truck pulls up to a loading dock at 4 a.m., security teams should get an alert. New analytics like Scene Change Detection take this even further with the ability to report on anomalies that occur from normal in the camera’s field of view. Such powerful AI-based analytics running on the edge can even inform operations when stock is running low on shelves.

Card image cap
Rebecca Herold Privacy & Security Brainiacs

Cybersecurity pros can make security systems more proactive by performing ongoing risk management activities to prevent as many security incidents as possible instead of being reactionary and waiting until after incidents occur. This can include applying security and privacy patches to operating systems, applications, and other network components as soon as they become available to prevent cyber crooks from exploiting associated vulnerabilities. Additionally, access to networks and data should be restricted by using charge-only USB ports and cables in your facility’s public and meeting areas. Physically checking those charging stations regularly to ensure they have not been replaced with data transfer cables or have had USB charge-only ports replaced with USB data ports can help with proactivity. Finally, providing security and privacy training regularly to all personnel with access to the organization’s systems, along with sending frequent reminders, awareness activities, etc., will proactively make all humans in the system security protections instead of being security vulnerabilities.

Card image cap
Maureen Carlson System Surveyor

Regardless of its size and scope, making sure any security system operates proactively comes down to three things: 1) documenting and knowing where all your devices are located on a map 2) understanding what state they are in, and 3) ensuring they are maintained and operational. After all, security systems are dynamic. As devices age and threats to organizations evolve, it’s normal for security personnel to relocate, upgrade or replace technology. To make sure a system remains proactive, it’s important to incorporate a dynamic system design and lifecycle management software tool that can evolve at the same pace your system does. Many organizations rely on static forms of documentation, such as PDFs and spreadsheets, to keep track of this information; but incorporating a digitized as-built helps organizations break down communication silos between the stakeholders involved in overseeing a security system, making it easy to participate and collaborate system maintenance.

Card image cap
Manish Mehta Ontic Technologies

There are a few ways security systems can be proactive. First, utilizing a centralized incident and investigation process allows for effective cross-functional collaboration between teams, reducing the need for security teams to manually collect and connect data from different point solutions to piece together a picture of an impending threat. Additionally, incorporating integrated research capabilities with ongoing monitoring will uncover critical signals faster and allow teams to take action proactively. Historical data can help provide additional context when an incident occurs and uncover potential patterns allowing teams to stay ahead of those threats. Finally, ensuring your security systems provide situational awareness and can identify where threats exist will help teams keep track of changing events, such as weather, to quickly react to early risk indicators. When all these elements come together in a single platform, organizations can have a more holistic view of potential threats, make better-informed decisions for proactive and reliable risk mitigation, and avoid business disruption. 

Card image cap
Eddie Reynolds Iluminar Inc.

When designing a proactive security system, it isn’t enough to install video surveillance cameras and turn them “on.” Security personnel must ensure their hardware is operating at its best, around the clock, to ensure their systems alert them to potential threats so personnel can respond to them proactively. It’s a proven fact: Without proper lighting, video security systems cannot deliver clear images in challenging lighting conditions. By integrating external illumination devices, such as Infrared (IR) or white light illuminators, video surveillance devices can capture high-quality images and video, 24/7. With proper lighting, personnel will be able to both detect and deter perimeter intrusions, as part of an effort to anticipate and mitigate crime before it occurs.


Editor Summary

Our Expert Panelists provide a variety of thought-provoking examples of how security systems are evolving to be more proactive. Among the proactive tools are artificial intelligence (AI), real-time monitoring, and analysis of past trends to predict likely future events. Proactively preventing a future event or loss is one of the best ways that a security system can demonstrate its value and contribute to the bottom line.

  • Related links
  • Axis Communications Digital video recorders (DVRs)
  • Axis Communications Access control software
  • Axis Communications Video Surveillance software
  • Axis Communications Intruder alarm warning devices
  • Genetec Video Surveillance software
  • Genetec Access control software
  • Milestone Video Surveillance software
  • Verkada Access control software
  • Verkada Intruder alarm warning devices
  • Verkada Video Surveillance software
  • Axis Communications IP cameras
  • Axis Communications Access control readers
  • Genetec IP cameras
  • i-PRO IP cameras
  • Verkada IP cameras
  • Verkada Access control readers
  • Axis Communications Network Video Recorders (NVRs)
  • Genetec Network Video Recorders (NVRs)
  • Milestone Network Video Recorders (NVRs)
  • Verkada Access control cards/ tags/ fobs
  • Verkada Network Video Recorders (NVRs)
  • Axis Communications Video signal devices & accessories
  • Access Control Software Access control software
  • Networkable Access control readers
  • Self Contained - External Intruder alarm warning devices
  • Intelligent motion detection Video motion detectors
  • Internal Intruder alarm warning devices
  • Detection Software Video Surveillance software
  • Network IP cameras
  • IP Surveillance Software Video Surveillance software
  • Smart Card Access control software
  • Management Software Video Surveillance software
  • Recording Software Video Surveillance software
  • Monitoring Software Video Surveillance software
  • Surveillance Software Video Surveillance software
  • Video Signal Generator Video signal devices & accessories
  • User tool for control panel Access control software
  • Version Upgrade Access control software
  • Warning Sign Video signal devices & accessories
  • Warning Sticker Video signal devices & accessories
  • Visitor Management tool Access control software
  • Related categories
  • Digital video recorders (DVRs)
  • Video Surveillance software
  • Access control software
  • Intruder alarm warning devices
  • IP cameras
  • Access control readers
  • Network Video Recorders (NVRs)
  • Access control cards/ tags/ fobs
  • Video motion detectors
  • Video signal devices & accessories
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
Related articles
How Physical Security Consultants Ensure Cybersecurity For End Users

How Physical Security Consultants Ensure Cybersecurity For End Users

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Round table discussions
About this page

"Explore proactive security system strategies that help prevent incidents, reduce harm and negate the need for reactive responses. Gain insights from our expert panel discussion."

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec