SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Retail security
  • Home
  • About
  • White papers
  • Case studies
  • News
  • Expert commentary
  • Security beat
  • Round table
  • Products
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Why The Term “Security Team” Is Too Limiting

Why The Term “Security Team” Is Too Limiting
Ryan Schonfeld
Ryan Schonfeld
Contact company
Contact HiveWatch
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Modern security includes technology, workplace culture, impacting many organizational facets beyond physical protection.
  • "Security team" limits scope; includes tech, asset management, brand protection, and legal consideration.
  • Security decisions involve diverse stakeholders: CISO, CTO, IT with budget-sharing enabling efficient investments.

There’s been a long history of people thinking of “gates, guards, and guns” when referring to physical security. And for a long time, this was the norm.

When analog cameras required significant amounts of wiring and a dedicated guard to watch said feeds (think about any action movie from the 90s), the assumption was that security was protecting assets, but had little to do with the overall business. 

Defining security with recent advancements

Fast forward to more recent advancements in video surveillance, cloud-based solutions, and artificial intelligence (AI)-driven decision-making, and now the term “security” has reached a more complex fork in the road.

“Security” is about a broader idea of protecting people, assets, and the brand from harm. So it’s only natural that the term used to describe the work practitioners do advances, as well.

Why is the term outdated? 

Today, security encompasses technology, the workplace, and culture, it touches so many facets

“Security team” has a connotation that may no longer be accurate for the scope of work that the people on that team perform.

Today, security encompasses technology, the workplace, and culture. It touches so many facets of the organization.

Security in retail

Take retail, for instance. So many security leaders encompass not only loss prevention teams, but also asset management, brand protection, and retail security.

Some companies combine the three of these or split them up based on the needs of the organization. In this case, the “security team” may place a limit on what the department aims to accomplish. 

Involvement of other teams

Security teams also may be broader and include external individuals who still require a say in decision-making:

  • Technology: Whether it’s the company’s CTO, CISO, or IT department, you can almost guarantee that they’re going to want to know what technology is going on in the network. Convergence is no longer a buzzword, it’s a necessity; especially when cyber risk is growing and cyber criminals are becoming more and more sophisticated. 
  • Legal: There are so many jokes about lawyers ruining all the fun, but the joke’s on any company that doesn’t consider the legality of data collection or usage before investing in technology platforms. Consider the implications of using biometrics or facial recognition especially when it comes to emerging laws or regulations. Security may not just be about physical security, it might also need to be about protecting the business from legal action, as well.
  • CISO: Threats that cross over between physical and cyber security departments are becoming more common, which means a coordinated approach to protection is necessary. This also means that investments in technology should be able to serve both departments. Additionally, as physical security becomes increasingly dependent on intelligent devices, it’s the cybersecurity team led by the CISO that develops the best practices and policies for managing and securing them. Their input is invaluable. 

Decision-making in today’s business environment

Like any good business decision, multiple stakeholders should be involved in decisions around technology

Like any good business decision, multiple stakeholders should be involved in decisions around technology investments especially those who are directly impacted by the use of or benefit of the technology in question. 

For example, if it’s an operational efficiency investment, a company’s CFO should be involved (even more so if it impacts cost savings). 

Functional or operational changes

Technology investments (even in the security space) should involve IT if there’s an infrastructure component to the implementation. From an electronic security standpoint, cybersecurity or information security leaders should have a chance to weigh in.

As more decisions involve more people, security leaders need to think about what their investments in functional or operational changes can mean for other groups across the company. 

Budget sharing

It can help with C-suite discussions especially when there’s talk of “doing more, with less” 

Whether the technology can enable marketing, facility managers, or IT, multiple uses can mean multiple ways to allocate funding to pay for technology investments.

Budget sharing has become a popular way to pay for investments that help shift expenses away from a single department when many of them can benefit from the tech. It can help with C-suite discussions especially when there’s talk of “doing more, with less” happening at all levels of the organization. 

Benefits of security in an organization

“Security team” may not have a universal meaning anymore, but it’s safe to say that evolving the discussion around how security benefits the broader organization is beneficial to practitioners.

The more we talk about how we can protect people and assets, the more realization there will be about how that impacts the business and the industry will be better for it. 

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Retail surveillance
  • Electronic security systems
  • Retail security systems
  • Shop security systems
  • Physical security
  • Industrial security
  • Mall security
  • Commercial security
  • Shopping centre security
  • Security management
  • Security policy
  • Security tagging
  • Security cameras
  • Covert cameras
  • Security camera systems
  • Security monitoring system
  • Radio frequency Identification
  • Voice recognition systems
  • Facial recognition systems
  • Video analytics
  • Electronic access control
  • Store security
  • Store surveillance
  • Industrial security systems
  • Retail security
  • Wireless security
  • Network cameras
  • Security software
  • Security service
  • Industrial surveillance
  • Covert Surveillance
  • Integration software
  • Cyber security
  • Corporate Security
  • Central Monitoring
  • Network Video Recorders
  • Video surveillance
  • Mergers & Acquisitions
  • Machine Learning
  • Touchless Security
  • Related links
  • Articles by Ryan Schonfeld
  • Related categories
  • Video Surveillance software
  • Access control software
  • Network Video Recorders (NVRs)
Related white papers
Physical Access Control

Physical Access Control

Download
Precision And Intelligence: LiDAR's Role In Modern Security Ecosystems

Precision And Intelligence: LiDAR's Role In Modern Security Ecosystems

Download
Verkada Workplace Safety Survey

Verkada Workplace Safety Survey

Download
Related articles
Securitas UK & Hays Travel Partnership Milestone

Securitas UK & Hays Travel Partnership Milestone

AIoT At Hikvision's Bangkok Summit: A Global Insight

AIoT At Hikvision's Bangkok Summit: A Global Insight

Hanwha Vision Opens AI Experience Centre In Paris

Hanwha Vision Opens AI Experience Centre In Paris

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Retail security
  4. News
  5. Expert commentary

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec