How can security systems be more proactive?
Editor Introduction
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organisation, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
Today’s security systems can be as proactive as ever, protecting sites across industries while also streamlining operations and enhancing visitor experiences. For instance, audio solutions can be used as a deterrent to prevent incidents and to broadcast critical announcements, and intercoms can provide onsite or remote access control with options for automation that can simplify security needs. Additionally, analytics embedded in cameras can help with detection and prevention, as well as help to improve day-to-day business operations. All these different components can then be pulled together into a single video management platform for a complete, proactive, end-to-end security system. But proactivity doesn’t end there, systems depend on proactive maintenance to ensure stability and security. This is especially true in today’s ecosystem of connected and interdependent devices and solutions, and as cyberattacks grow in number and sophistication.
Preventing a bad event from occurring should be a focus for any security or loss prevention team. With AI-based cameras capable of human and vehicle detection, we can now provide custom, automated responses to a variety of situations. If a group of people are loitering on the premises after hours, we might trigger a voice-down message that asks them politely to disperse. If they don’t comply, a further escalation message might include turning on additional lighting or activating strobes. All of this can be done without any human intervention and can be directly integrated with existing cameras and infrastructure. The ultimate step might be triggering an alert to the monitoring service to have someone intervene or otherwise size up the situation and decide whether to involve law enforcement. Such proactive AI-based security systems can stop crime before it starts and help prioritise the time and attention of security and loss prevention teams.
Data-driven Video Management Systems (VMS) can "watch and listen" for abnormal actions, sounds, motions, harmful air quality, and much more. Integrated video analytic software can “learn” a scene and identify a wide range of atypical actions and events. Audio sensors can detect specific noise signatures like arguing, gunshots, or calls for help, while air monitoring sensors can detect overall air quality, smoking, vaping, carbon monoxide, and other hazardous gases, making integrated sensors an essential part of the VMS's overall safety and security effectiveness. An open VMS enables the synchronisation of audio, video, and other data with a facility's other existing safety systems such as access control, lighting, and intercom creating a comprehensive, proactive approach to security. VMS technologies today can quickly ingest, process, and present vast amounts of data to security personnel, allowing them to monitor events in real-time and make informed, proactive decisions as they occur, greatly improving overall safety and security.
Predictive analytic capabilities are an important component of realising proactive security efforts. By analysing historical data and identifying trends and correlations, security systems can help security pioneers anticipate potential risks. For example, AI algorithms can identify high-risk areas based on past incidents and allocate additional security resources accordingly. This predictive approach allows for proactive measures to be implemented, thus enhancing overall security preparedness. Also, the integration of AI and situational awareness software brings intelligent automation to security systems. Routine tasks such as monitoring cameras or analysing logs can be automated, reducing human error, and freeing up human operators to focus on critical responsibilities. This automation improves the efficiency and effectiveness of security efforts, enabling a more proactive approach.
With security systems growing beyond video and access control to include additional IoT sensors as well as analytics and other data inputs, many aspects of a system response can now be automated, allowing it to become more proactive rather than reactive. System behaviours, settings, and controls can now be driven by correlating seemingly unrelated events. For example, an IoT sensor detecting a rise in room temperature, combined with an error or alarms from IT systems, can alert an operator to an issue or even automatically activate extra cooling within an area. When an incident happens, security systems can also automate certain tasks, like triggering alarms, notifying security personnel, or activating automated countermeasures before a breach occurs.
Video surveillance with analytics and artificial intelligence (AI) has evolved into automated and proactive deterrence systems. Intruders are detected and classified within seconds followed by immediate and unpredictable deterrence reactions resulting in most intruders (98%+) choosing to swiftly exit. Those who continue to breach are met with escalating actions, including blinding strobes of red and blue LEDs; piercing 120 dB sirens; situation-appropriate voice-down messages; and intimidating sound effects. Immediate deterrence has also been proven to significantly reduce the frequency of intrusions on a property. The use of AI to classify the success of an automated deterrence sequence allows monitoring personnel to narrow their focus on events that matter, reducing labour costs and the overuse of PSAP response. AI has changed the formula of video surveillance from labour-intensive monitoring to a proactive and strategic solution that can prevent crime and significantly lower the total cost of ownership to the user.
Power has become increasingly interactive, predictive, and essential to security system continuity. Power is now part of a proactive network that gives a comprehensive, 24/7 analysis of system health and viability. Continued technology refinement brings visibility to the well-being of connected locks, access control, and other systems across the enterprise. Network-connected solutions help integrators and end users assess power continually with notifications that protect against outages or damaging environmental conditions. For example, network-managed power systems report problems immediately, or even before they happen, to the end user and the systems integrator via email, a central dashboard, or by integrating directly into the access manufacturer’s interface. In addition, remote power management provides the ability to schedule automated battery testing, proactively staying on top of battery conditions. Other proactive alerting capabilities include the ability to monitor environmental conditions and report abnormal issues as well as remotely power cycle devices.
From cloud-based networks to Near Field Communication (NFC) technology, the adoption of modern access control systems continues to change our approach to building security. Following years of innovation, interconnected security systems are now enabling end users to prevent security risks in their buildings before they transpire intuitively verifying and granting access in large-scale facilities and keeping our homes safe and secure while we are away. The ability to remotely access front doorbells, locking systems, and cameras around our homes has been a major turning point in residential security for example, and now provides homeowners with a practical remedy to ward off potential intruders. Similarly, agile and adaptive cloud-based security systems are presenting decision makers with ready-made, buy-off-the-shelf security products that proactively reduce the vulnerabilities of their buildings by fitting the needs of the environment, no matter the scale or requirements of the space.
Security systems can be proactive in their use and, also, beyond their use in security. For example, by counting people and segmenting those counts by space and time of day, it is possible to better plan for attendants or reorganise the flow in a building. In addition, knowledge about the health of the system including its individual components can enable security staff to proactively adjust, repair, or replace a camera or recorder before the video is potentially lost or rendered unusable by equipment failure, environmental conditions, or malicious act.
Security systems can be proactive by incorporating unified communications solutions, which integrate various systems and allow organisations to enhance their situational awareness and respond to security threats more effectively. Frequently, unified communications solutions can be integrated with incident management systems, enabling seamless communication and coordination during security incidents. When an incident is detected, the unified interface can automatically trigger workflows, such as initiating emergency response protocols, notifying designated personnel, and escalating the incident to the appropriate authorities. By leveraging unified communications, organisations can stay ahead of potential security threats and take proactive measures to safeguard their assets, people, and operations. Another way security systems can be proactive is by utilising new technology, such as artificial intelligence through voice assistants. AI can enhance the efficiency of security operations and incident response by automating routine tasks, freeing human security personnel to focus on more critical activities.
Many physical security systems can be mostly reactive, but how you design your programme with them can help create proactive capabilities. Incident reporting and analytics that capture where incidents are happening, the frequency of those incidents, and how long they take to resolve can inform programme managers where the best places are to install a new security camera or add an additional stop for a guard tour. Device health alarms help proactively ensure that your security systems are still performant. And noise reduction creates more time for operators to do proactive work by removing false positive alarms from their task lists. Taken together, the shift from reactive to proactive can be a force multiplier for security teams and leadership.
Security systems become proactive tools when they’re designed to anticipate and prevent threats rather than only reacting to an incident. The key is preventative detection and deterrence. These preventative actions are critical, particularly in cases like retail theft where grab-and-go crimes may only take a couple of minutes. A video security solution with advanced analytics can detect potentially threatening activities, from entering a protected area to crowding or loitering, and instantly activate deterrents like alarms, sirens, or strobes all before an intruder actually enters the building. Now, you can even programme automatic responses on talk-down speakers to play custom sounds, scaring away intruders before they can do any damage. All of this before human intervention ultimately saves valuable time, resources, and money.
One overlooked area in the proactive capabilities of security systems is predicting system health. What is the probability that certain components might fail because the operating environment temperature exceeds the recommended spec, or the likelihood the image will become blurry, or the dome needs cleaning? The industry will benefit from a variety of analytics and algorithms that can answer these questions and over time offer predictions on device and system health and lifecycle management.
Video surveillance's deterrence capabilities are vital in proactive security strategies because it discourages bad actors from engaging in criminal behavior. Containerised video management systems (VMS) can greatly enhance these capabilities. These platforms, encapsulated within software containers, deliver consistent performance across different computing environments because the containers include everything from the code and runtime to system tools and libraries. The advantages of a containerised VMS extend to its scalability, supporting swift changes in security resources to accommodate changing needs. The inherent flexibility of these systems supports their deployment across a variety of infrastructures, including on-premises, cloud-based, or a hybrid setup. The resulting scalability and flexibility are what make a containerised VMS such a critical asset in improving an organisation's proactive security strategy.
Proactive security measures play a crucial role in maintaining a safe and secure environment. The primary benefit is proactive crime prevention, including theft, vandalism, data breaches, and more. Acting ahead of time can effectively avert these security incidents, safeguarding physical and digital assets. It also enables rapid response to threats and contributes to creating a strong security culture within an organisation. Proactive video monitoring is becoming the most effective crime prevention service within the remote video monitoring services category. This actively monitored security measure, overseen by skilled security personnel, is designed to preemptively identify potential threats. Rather than solely recording for post-incident analysis, PVM is engineered to issue real-time alerts when suspicious behaviour is observed. Stakeholders can immediately respond to potential security threats, as opposed to discovering them post-event. This contributes to fostering a heightened level of security consciousness and safe environments.
It’s no longer acceptable for security teams to simply document impactful events that happened in the past for their organisations. The overarching goal is to try and prevent events from occurring in the first place. This shift from a reactive stance to a proactive one is a major focus at i-PRO. AI-based cameras are a first line of defense when it comes to helping security teams be more proactive. For example, the ability to detect and notify operators when a human is loitering after hours is highly valuable. Likewise, if a truck pulls up to a loading dock at 4 a.m., security teams should get an alert. New analytics like Scene Change Detection take this even further with the ability to report on anomalies that occur from normal in the camera’s field of view. Such powerful AI-based analytics running on the edge can even inform operations when stock is running low on shelves.
Cybersecurity pros can make security systems more proactive by performing ongoing risk management activities to prevent as many security incidents as possible instead of being reactionary and waiting until after incidents occur. This can include applying security and privacy patches to operating systems, applications, and other network components as soon as they become available to prevent cyber crooks from exploiting associated vulnerabilities. Additionally, access to networks and data should be restricted by using charge-only USB ports and cables in your facility’s public and meeting areas. Physically checking those charging stations regularly to ensure they have not been replaced with data transfer cables or have had USB charge-only ports replaced with USB data ports can help with proactivity. Finally, providing security and privacy training regularly to all personnel with access to the organisation’s systems, along with sending frequent reminders, awareness activities, etc., will proactively make all humans in the system security protections instead of being security vulnerabilities.
Regardless of its size and scope, making sure any security system operates proactively comes down to three things: 1) documenting and knowing where all your devices are located on a map 2) understanding what state they are in, and 3) ensuring they are maintained and operational. After all, security systems are dynamic. As devices age and threats to organisations evolve, it’s normal for security personnel to relocate, upgrade or replace technology. To make sure a system remains proactive, it’s important to incorporate a dynamic system design and lifecycle management software tool that can evolve at the same pace your system does. Many organisations rely on static forms of documentation, such as PDFs and spreadsheets, to keep track of this information; but incorporating a digitised as-built helps organisations break down communication silos between the stakeholders involved in overseeing a security system, making it easy to participate and collaborate system maintenance.
There are a few ways security systems can be proactive. First, utilising a centralised incident and investigation process allows for effective cross-functional collaboration between teams, reducing the need for security teams to manually collect and connect data from different point solutions to piece together a picture of an impending threat. Additionally, incorporating integrated research capabilities with ongoing monitoring will uncover critical signals faster and allow teams to take action proactively. Historical data can help provide additional context when an incident occurs and uncover potential patterns allowing teams to stay ahead of those threats. Finally, ensuring your security systems provide situational awareness and can identify where threats exist will help teams keep track of changing events, such as weather, to quickly react to early risk indicators. When all these elements come together in a single platform, organisations can have a more holistic view of potential threats, make better-informed decisions for proactive and reliable risk mitigation, and avoid business disruption.
When designing a proactive security system, it isn’t enough to install video surveillance cameras and turn them “on.” Security personnel must ensure their hardware is operating at its best, around the clock, to ensure their systems alert them to potential threats so personnel can respond to them proactively. It’s a proven fact: Without proper lighting, video security systems cannot deliver clear images in challenging lighting conditions. By integrating external illumination devices, such as Infrared (IR) or white light illuminators, video surveillance devices can capture high-quality images and video, 24/7. With proper lighting, personnel will be able to both detect and deter perimeter intrusions, as part of an effort to anticipate and mitigate crime before it occurs.
Editor Summary
Our Expert Panelists provide a variety of thought-provoking examples of how security systems are evolving to be more proactive. Among the proactive tools are artificial intelligence (AI), real-time monitoring, and analysis of past trends to predict likely future events. Proactively preventing a future event or loss is one of the best ways that a security system can demonstrate its value and contribute to the bottom line.
- Related links
- Axis Communications CCTV software
- Axis Communications Intruder warning devices
- Axis Communications Digital video recorders (DVRs)
- Axis Communications Access control software
- Genetec Access control software
- Genetec CCTV software
- Milestone CCTV software
- Verkada CCTV software
- Verkada Access control software
- Verkada Intruder warning devices
- Axis Communications Access control readers
- Axis Communications IP cameras
- Genetec IP cameras
- Verkada Access control readers
- Verkada IP cameras
- Axis Communications Network video recorders (NVRs)
- Genetec Network video recorders (NVRs)
- Milestone Network video recorders (NVRs)
- Verkada Access control cards/ tags/ fobs
- Verkada Network video recorders (NVRs)
- Axis Communications Video signal devices & accessories
- Networkable Access control readers
- Self Contained - External Intruder warning devices
- Intelligent motion detection Video motion detectors
- Internal Intruder warning devices
- Detection Software CCTV software
- Network IP cameras
- IP Surveillance Software CCTV software
- Management Software CCTV software
- Smart Card Access control software
- Recording Software CCTV software
- Monitoring Software CCTV software
- Surveillance Software CCTV software
- Video Signal Generator Video signal devices & accessories
- User tool for control panel Access control software
- Version Upgrade Access control software
- Visitor Management tool Access control software