SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Video analytics
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Audio Analytics: An Underused Security Tool

Audio Analytics: An Underused Security Tool
Audio Analytics: An Underused Security Tool
Audio Analytics: An Underused Security Tool
Audio Analytics: An Underused Security Tool
Larry Anderson
Larry Anderson
Contact company
Contact Louroe Electronics
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Audio analytics enhance security by detecting threats like gunshots and aggression ahead of time.
  • Integrators underuse audio due to privacy concerns, missing chances for system improvements.
  • Audio complements video, reducing false alarms and improving threat assessments in security.

Audio has been slower to catch on in the security market because of lingering concerns about privacy laws related to audio surveillance. But audio analytics capabilities are increasing right alongside the more commonly used video analytics. Integrators who ignore audio are missing an opportunity to create better systems. 

Privacy is generally not a concern. U.S. law is clear that audio monitoring is legal as long as there is no expectation of privacy among those being monitored. Public signs must be posted to provide clear indication that audio communication is being monitored.

Missed Opportunity For Smaller Integrators

Audio has especially not yet been embraced by integrators that typically do residential and light industrial type applications, says Richard Brent, CEO of audio monitoring provider Louroe Electronics. Larger integrators doing bigger jobs are more likely to incorporate audio into the mix. For the smaller integrators, especially, it’s a missed opportunity.

“More integrators today are offering audio as a component, and more and more end users will say that video alone isn’t giving me all the answers,” says Brent. “It continues to grow.”

Video without audio is like living in a silent movie, according to Louroe. In many instances, the sound element can make all the difference and identify a threat before it’s too late. Audio monitoring also helps combat false alarms by providing secondary verification in case of an emergency, robbery, security threat or other intrusion.

Audio monitoring also helps
combat false alarms by
providing secondary
verification in case of an
emergency, robbery, security
threat or other intrusion

Louroe Electronics works closely with customers to ensure their audio products are used overtly and in compliance with the law. International laws vary greatly in terms of permitted applications of audio; in any case, legal concerns should be addressed by an attorney.

Louroe has been in the audio monitoring business for more than 38 years; some 800,000 of its Verifact microphones are installed all over the world. For the last year and a half, Louroe has partnered with Dutch company Sound Intelligence to bring the LE-802 Intelligent Audio Analytics System to market, in effect analysing sound and turning it into useful information.

Threat Assessment System

The LE-802, which will be exhibited at ASIS 2016 in Orlando, combines four different types of audio analytics, running simultaneously, into a “threat assessment” system that provides alerts of a dangerous situation, sometimes before it becomes deadly, says Brent. The audio analytics can detect gunshots, aggression, glass breaking and a car alarm.

Audio software analyzes factors such as volume, duration, frequencies and intensity, and the resulting sound profiles are associated with various events, whether a gunshot or glass breaking.

The system’s ability to detect aggression is based on contrasting the sound of someone suddenly yelling with typical ambient sounds. The software identifies fear, anger and duress and immediately notifies security staff so they can intervene before a conflict escalates. Brent estimates that 90 percent of physical aggressions are preceded by verbal aggression.

Gunshot detection is an
especially useful tool in the
education market, given that
there have been 191 U.S.
school shootings since 2013

Vertical Markets For Audio Analytics

Applications of intelligent audio analytics cut across multiple vertical markets. In education, audio analytics could detect an escalating conflict between students. In a hospital, it could provide an alarm in case of a disruptive patient. It could identify when a bar patron has had too much to drink and becomes belligerent. It could be useful in a factory, or at a postal facility, or in a check-cashing facility – anywhere that aggressive behavior could be a precursor to violence. Audio analytics can integrate directly with video cameras and/or video management systems (VMSs).

Gunshot detection is an especially useful tool in the education market, given that there have been 191 U.S. school shootings since 2013, or about one per week since Sandy Hook. Gunshot detection has also found a lot of interest in Safe Cities applications.

Based on an audio analytics alarm, nearby cameras could be triggered to capture video as a situation unfolds. Two-way audio integrated with a nearby speaker could communicate with an aggressive individual and let them know that authorities have been notified. Security staff could remotely interact with suspicious persons in real time, rather than needing to send a guard physically to an area.

Audio is also finding a role in the broader market of building management, where a large building systems integrator might use audio as a component to monitor the sounds of an HVAC system, or machinery in an oil-and-gas application. “There are so many ways that audio gets used to complement our visual experiences,” says Brent.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Audio surveillance
  • Video analytics
  • Intrusion detection
  • Video surveillance
  • Related categories
  • Intruder detectors
  • Intruder alarm communicators
  • IP cameras
Related white papers
Understanding AI-Powered Video Analytics

Understanding AI-Powered Video Analytics

Download
Open Credential Standards And The Impact On Physical Access Control

Open Credential Standards And The Impact On Physical Access Control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
Related articles
Interface Systems: 2026 Retail Security Trends

Interface Systems: 2026 Retail Security Trends

Why Open Matters In The Age Of AI

Why Open Matters In The Age Of AI

Verkada AI Tech Reshapes Enterprise Security Industry

Verkada AI Tech Reshapes Enterprise Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Video analytics
  4. News
  5. Security beat
About this page

Discover how audio analytics, an underused security tool, enhances CCTV systems and ensures advanced threat detection in real-time.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec