Transformative Advances

Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity.

Opportunities in Security and Operations
In physical security, machine learning can speed up investigations by assisting security teams in finding relevant information quickly. Machine learning helps analyze data that hasn’t been organized or labeled. By identifying patterns or possible relationships between data, such tools help security teams, law enforcement, and other staff gain a better understanding of an incident or important correlations between trends.

On the operations side, machine learning helps organizations better leverage their physical security investments. Machine learning can help glean actionable insights from the system data to ramp up productivity. This often leads to improved operations.

For example, machine learning can help automate people counting, monitor traffic flow and enhance cybersecurity by identifying and blocking malware. It can also enable automation that helps organizations adhere to various industry standards and regulations through streamlined processes.

Deep Learning to Structure Data
One type of machine learning that has been particularly influential in the physical security world is deep learning. It uses task-specific algorithms to train computers to classify data.

Programmers begin with data sets that have been carefully organized or labeled. Then deep learning tools take unstructured data, such as hours of video footage, and turn it into structured data. The computer recognizes matching patterns or correlations that it can apply to other instances. As a result, teams can more easily find the specific items or events they are looking for.

For example, modern video analytics systems may use deep learning to “read” the letters and numbers on license plates. Other teams may use the tools to count how many people pass through a door or pick out a certain model of a car that passed by on a busy road. An operator can ask the system to display video that includes a red truck with a specific license plate or a person wearing blue jeans, a plaid shirt, and a brown baseball cap. Quickly sorting through data helps speed up processes and allows teams to operate more efficiently.

Combining Video Analytics with Automation
Using machine learning, systems can compile data from cameras and use video analytics to detect specific activities or items. Then, through automation techniques, the system can respond in certain ways if such an event occurs.

For example, when an intruder is detected, the system is programmed to alert the security team. Video and sensor data help track the intruder’s progress on a map, so responders find them more easily. The system may take additional actions, such as locking interior doors and notifying law enforcement. Throughout the process, it is important to note that every action follows criteria established by the programmers who set up these workflows in the system. The automation tools simply follow the steps based on the inputs received and identified.

Unification, Privacy and Human-centered Design at the Core
Unified physical security systems that leverage machine learning can collect and interpret a wide variety of data from many sources. Likewise, open architecture systems give security professionals the freedom to explore applications from various manufacturers. As new solutions come to market, teams can try them out and select the ones that best fit their objectives and environment.

Regardless of the applications selected, it is important to use the technology in ethical ways. Confirm with your manufacturer that the data your deep learning system is trained on is properly sourced and allowed to be used. People must give consent, and the manufacturer should ensure their right to privacy is respected.

While machine learning has come a long way in the last few decades, it is important to remember that it is not magic. To be useful, machine learning technology must be combined with human-centered design that is grounded in real-world customer problems.

When exploring options, begin by clearly identifying the challenges you want to address or the outcomes you seek. Then explore if machine learning is the right tool for that. It is not about simply implementing the latest application but understanding how that solution will impact your goals.

Likewise, humans need to be the final decision-makers and confirm that best practices are in place in all situations. While machine learning systems can streamline processes, sort through data, and help ensure procedures are properly followed, they do not replace human expertise.

This article originally appeared in the July / August 2024 issue of Security Today.

Featured

  • Security Today Announces The Govies Government Security Award Winners for 2025

    Security Today is pleased to announce the 2025 winners in The Govies Government Security Awards. The awards honor outstanding government security products in a variety of categories. Read Now

  • Survey: 60 Percent of Organizations Using AI in IT Infrastructure

    Netwrix, a cybersecurity provider focused on data and identity threats, today announced the release of its annual global 2025 Cybersecurity Trends Report based on a global survey of 2,150 IT and security professionals from 121 countries. It reveals that 60% of organizations are already using artificial intelligence (AI) in their IT infrastructure and 30% are considering implementing AI. Read Now

  • New Research Reveals Global Video Surveillance Industry Perspectives on AI

    Axis Communications, the global industry leader in video surveillance, has released its latest research report, ‘The State of AI in Video Surveillance,’ which explores global industry perspectives on the use of AI in the security industry and beyond. The report reveals current attitudes on AI technologies thanks to in-depth interviews with AI experts from Axis’ global network and a comprehensive survey of more than 5,800 respondents, including distributors, channel partners, and end customers across 68 countries. The resulting insights cover AI integration and the opportunities and challenges that exist with regard to security, safety, business intelligence, and operational efficiency. Read Now

  • SIA Urges Tariff Relief for Security Industry Products

    Today, the Security Industry Association has sent a letter to U.S. Trade Representative Jamieson Greer and U.S. Secretary of Commerce Howard Lutnick requesting relief from tariffs for security industry products and asking that the Trump administration formulate a process that allows companies to apply for product-specific exemptions. The security industry is an important segment of the U.S. economy, contributing over $430 billion in total economic impact and supporting over 2.1 million jobs. Read Now

  • Report Shows Cybercriminals Continue Pivot to Stealthier Tactics

    IBM recently released the 2025 X-Force Threat Intelligence Index highlighting that cybercriminals continued to pivot to stealthier tactics, with lower-profile credential theft spiking, while ransomware attacks on enterprises declined. IBM X-Force observed an 84% increase in emails delivering infostealers in 2024 compared to the prior year, a method threat actors relied heavily on to scale identity attacks. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.