Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResiliencePhysical Security

Modernizing security with data fusion

By Ryan Schonfeld
Risk management and intelligent security operations
July 26, 2021

In today's world, modern-day enterprises have to place a strong emphasis on leveraging intelligence to drive operations. Various organizations worldwide, such as airports, retail establishments, safe cities, and government agencies, are looking to solve the same challenge: identify what risks are around the corner and mitigate them efficiently. From people, to property, to brand, the risks faced by businesses continue to shift, which also means they need security solutions to evolve and help mitigate these concerns for the safety and success of their organization. It’s no secret that COVID-19 has placed an increased load on corporate security programs with newly distributed workforces. 

While security is always a top priority due to inherent risks, such as theft and workplace violence, long gone are the days of this function being a company's only concern. The emphasis on cybersecurity is on the rise, with forecasts estimating that cyberattacks will cost $6 trillion this year (this stat is from before some significant breaches occurred including the Colonial Pipeline).

This fact increases the need for video surveillance, physical security, intelligence, and cybersecurity solutions to come together to provide holistic, actionable intelligence for mission-critical organizations. 

Intelligent Operations

Businesses looking to adopt a more proactive approach to enterprise risk management must shift toward more automation and stronger resource allocation.  But in the security world, this can be a difficult concept to embrace. More often than not, devices and systems don’t talk to each other. A camera system may not communicate to the access control system; the intrusion systems may be standalone; and then there may be disparate cameras, access control, and intrusion systems deployed at facilities around the world. Now layer in the complexities around intelligence, situational awareness, social media, employee travel (once that starts again), and all the new security responsibilities with “return to work” programs and the amount of data has never been higher.

How can an organization build an effective global program with siloed systems? In the past, the options were limited: a large capital project to rip and replace or buy a physical security information management system (PSIM). Both options were expensive, complex to deploy, and time consuming to manage.

But today, stakeholders can leverage advanced technologies, like sensor fusion platforms, to combine data from a company's disparate monitoring systems and security sensors to give operators a single-pane-of-glass to evaluate and respond to alerts. By centralizing data, security program noise is reduced and only events that require a human response are elevated. Automation helps maximize staffing and time, freeing up individuals to focus on the things that truly matter, and not vast amounts of false alerts. Technology will never completely replace the needs for humans in physical security, but it can certainly optimize them.

Why is this an important concept to understand? This approach is a solution to address the data problem. Data derived from both internal and external systems and activities play an essential role in achieving a strong security posture. Still, in today's business environment, the amount of data far outweighs the ability of many organizations to organize what's collected and make it intelligent. This inability to determine what is valuable and what's not limits the ability to make rapid, informed decisions.

By aggregating data from multiple systems onto a single interface, security operators can assess threats across an organization and its infrastructure. This approach also empowers leaders to continuously monitor and investigate cyber and physical hazards, leveraging overarching threat intelligence to unfold attacks in the making and using a proactive defense approach to prepare enterprises for new threat scenarios. 

But that's not where the challenge ends. After collecting data, enterprise security leaders must correlate it with other sources and share it with the right stakeholders so that the appropriate response can occur quickly and efficiently. But by deploying technologies that unify data into one pane of glass, there is a more substantial opportunity to realize a predictive threat model. Furthermore, when security components — IT, physical, and cyber — correlate, businesses can increase operational efficiency. 

Enterprises can improve incident response times and be more proactive with their security programs by utilizing this approach. Combining technology, domain expertise, and intelligence can assist in protecting multiple entities simultaneously and improve threat intelligence. 

KEYWORDS: coronavirus corporate security COVID-19 enterprise enterprise physical security enterprise security intelligence intelligence sharing risk management risk mitigation

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sec 0624 edu slide3 1170x658

Ryan Schonfeld is CEO of HiveWatch.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • data intelligence

    Why modernizing your mainframe is essential for enterprise security

    See More
  • Glowing blue fibers in darkness

    Modernizing patch management in an evolving IT security landscape

    See More
  • software code on computer

    Modernizing application security to retool DevSecOps

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • Risk Analysis and the Security Survey, 4th Edition

See More Products

Events

View AllSubmit An Event
  • April 16, 2025

    Modernizing GSOC Operations: Ensuring Full Control and Complete Situational Awareness

    ON DEMAND: For many organizations, physical security management can be a daunting task. Threats are on the rise and risks are becoming increasingly diverse. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing