SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-Powered Video Analytics
    Understanding AI-Powered Video Analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-Powered Video Analytics
    Understanding AI-Powered Video Analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Understanding AI-Powered Video Analytics
    Understanding AI-Powered Video Analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Understanding AI-Powered Video Analytics
    Understanding AI-Powered Video Analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-Powered Video Analytics
    Understanding AI-Powered Video Analytics
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-Powered Video Analytics
    Understanding AI-Powered Video Analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • AI-Powered Video Analytics
  • AI special report
  • Cybersecurity special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Is Audio Underused In Physical Security? What Are The Obstacles?

2 May 2025

Is Audio Underused In Physical Security? What Are The Obstacles?
Larry Anderson
Larry Anderson
2 May 2025
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Audio in physical security adds crucial context, enhancing surveillance capabilities.
  • Historically underused, audio's role in security systems is gaining importance.
  • Obstacles include technological integration and awareness in leveraging audio effectively.

Editor Introduction

The role of audio in physical security is multifaceted and increasingly vital, offering a layer of intelligence and interaction that access control and/or video surveillance alone cannot provide. Sounds provide crucial context to visual events. For instance, someone running might appear suspicious on video, but audio could reveal they are shouting for help, changing the interpretation entirely. Even so, historically speaking, audio has been an underused component in physical security. How is the situation changing? We asked our Expert Panel Roundtable: Is audio an underused component in today’s physical security systems? What obstacles are keeping audio from expanding?


Card image cap
Adam Lowenstein i-PRO

Frequently an afterthought, audio analytics and intercom systems are underutilized components in security systems. When you consider that many modern AI-enabled security cameras include audio analytics as a standard feature, this represents a lost opportunity for enhanced situational awareness and validation of important events. i-PRO’s cameras can alert operators to the sound of broken glass, gunshots, yells, etc. Some camera models have built-in microphones to do this, while others support inputs from external microphones. A classic misconception is that using audio analytics means cameras are recording audio, which can conflict with privacy regulations. Audio analytics, processed on the edge, in-camera, means audio never leaves the camera and is never stored or monitored. An alert is generated only when a detected sound matches a known sound signature, such as a glass break. In this way, privacy is ensured, and regulatory compliance is guaranteed.

Card image cap
Charles Nguyen Genetec, Inc.

Yes, audio is often underused in physical security despite its ability to enhance real-time awareness and response. While video surveillance and access control are widely adopted, audio has lagged due to outdated perceptions and integration concerns. It has long been seen as an IT or facility function—audio systems like intercoms were not a core part of security. That is changing. Modern IP-based audio technology makes unifying communication, video, and access control easier into a single platform. This allows operators to see, hear, and speak with people or issue announcements at entry points or during incidents, all in one interface, enabling faster, more accurate decisions. Many still underestimate audio’s value or are unaware of how it can be easily integrated. They can assess the situation more accurately, ask follow-up questions, and respond appropriately. When audio is included, it adds critical context that video alone can’t provide—as technology evolves, its role in physical security is becoming not just helpful, but essential.

Card image cap
Stephen G. Sardi Anviz Global Inc.

Audio verification technology in access (physical security) applications is underused, simply because it has not gained the traction it needs to position itself against the more time-proven biometrics: fingerprint and facial recognition. As with any technology, deployments need to show their value in robust and reliable operation, price performance, and ease of use in their applied end cases. With the increased use of AI as a building block that better enables field installations, truly reliable performance can be expected across diverse user groups and applications where background noise could be a limiting factor. At Xthings, we embrace the intelligent use of, and secure implementation of AI infrastructure in ways that increase user satisfaction, product performance, and flexible deployment capability. We believe in creating non-contact solutions that enhance health safety in work environments, so audio is certainly in mind.

Card image cap
Toby Hutchings Gallagher Security

Audio plays an important role in modern physical security systems, enhancing both functionality and user interaction. Integrations with intercom systems enable real-time communication for access control, allowing security personnel to verify identities remotely. Audio detection can also act as a sensor, identifying threats such as glass breaking, gunshots, or raised voices — triggering appropriate responses even before visual confirmation. Additionally, audio serves as a user interface, providing immediate feedback through alerts, alarms, or voice prompts. This not only guides user behavior but also enhances safety and compliance. One example is Gallagher’s custom tones feature, which allows customers to upload personalized audio files. These can be used to signal access decisions at card readers, enabling organizations to align security cues with their brand identity. Whether it's a welcoming chime for access granted or a firm tone for denial, audio transforms security from a silent guardian into a responsive, intuitive system.

Card image cap
Chris Wildfoerster Axis Communications US

Today, there are more ways than ever to integrate audio into security systems to deliver expanded coverage and value. Modern audio solutions include a variety of capabilities like two-way communication with echo cancellation, eye-catching displays, strobe lights, custom messaging and zoning, and more to help enhance use of the technology in schools, healthcare facilities, transportation hubs, and other protected areas. Taking it a step further, audio analytics that leverage artificial intelligence to detect unusual sounds, such as screams, shouts, and breaking glass, are increasingly being implemented to trigger automatic alerts that help verify events while improving incident response. Ease of scalability has been a key challenge when it comes to expanded audio adoption, but today's technology solutions prioritize system scalability to ensure organizations of all sizes are able to implement and use audio coupled with visual alerting to their full advantage.

Card image cap
David Zhai Verkada Inc.

Audio is a critical layer of information for physical security systems, especially at the perimeter, where real-time communication and response are key. Voice, after all, is one of the most natural and effective ways we communicate and gather information. Whether it’s granting or denying access to a building, de-escalating a situation, or issuing instructions during an emergency, spoken communication can be far more impactful than strobe lights, sirens, or buzzers. Now, with the integration of AI, audio is evolving from a basic communication channel into an important source of intelligence. Recent advances in AI, particularly large language models (LLMs), are opening the door to new capabilities that give security and operations teams deeper context and faster insights. I can envision that, in the not-so-distant future, systems will leverage intelligent AI agents that can interact via voice to provide instructions, answer questions, or even take specific actions. It’s important to note that audio is not necessary or appropriate to leverage in all security settings. Security leaders and organizations will need to ensure they are deploying audio analytics in a responsible, thoughtful way that respects privacy.


Editor Summary

From cameras with built-in microphones to intercoms and public address systems to audio analytics, there is a variety of components that can leverage sound to improve security. Audio is no longer just a supplementary feature in physical security; rather, it's an increasingly integral component that significantly enhances detection capabilities, improves response effectiveness, and provides valuable context for security events.

  • Related links
  • Anviz Power supplies & batteries
  • Axis Communications Power supplies & batteries
  • i-PRO Power supplies & batteries
  • Verkada Power supplies & batteries
  • Axis Communications Video servers (IP transmission)
  • Related categories
  • Power supplies & batteries
  • Bollards
  • Video servers (IP transmission)
  • Barricades
  • Gates
  • Barriers
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Understanding AI-Powered Video Analytics

Understanding AI-Powered Video Analytics

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
Related articles
What’s Behind (Perimeter) Door #1?

What’s Behind (Perimeter) Door #1?

IDIS Launches New AI PTZ Cameras With NIR Performance

IDIS Launches New AI PTZ Cameras With NIR Performance

Alarm.com & Everon: Unified Security Solutions

Alarm.com & Everon: Unified Security Solutions

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Round table discussions
About this page

Explore why audio remains underused in physical security systems and uncover the obstacles hindering its expansion alongside traditional video surveillance and access control.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-Powered Video Analytics
Understanding AI-Powered Video Analytics
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec