Creating Harmony From Discord

5 Min Read
Gain Maximum Efficiency With Orchestration

There are dozens of solutions providers that help reduce theft, increase security, and decrease crimes. Some methods include locking shopping carts, security tags, or simple motion detection systems. To simplify the process for their security teams, end users of all this technology pull it into one point, one room, or computer. The problem with this strategy is you still need people to watch and manage that single point. It is not scalable because even though the information is coming to a single point, how do you decide how many people you need to manage, process, and act on that incoming information?

The challenge with this solution is it will continue to compound as you add more technology. Every piece of technology you add to that single access point requires more workers to use it and derive any benefit from it. The most expensive part of this workflow becomes the person or persons sitting at that single access point. And each person can only do so much before they need more help from another. This is an expensive way to secure your property.

For example, say you have cameras, sensors, and an alarm system all sending information to a single computer. All alerts are viewed on that screen by your guard. Anytime an alert is triggered, that guard has to go through their standard operating procedures before any action can be taken, whether that is sending a patrol or calling local law enforcement. That human guard is the bottleneck. They can’t act until they process all of the information from all of the inputs.

But what if there were another way to expand your security efforts to not only make it more scalable but also increase its efficiency?

Meet orchestration.

What is Orchestration?

Orchestration is the automated configuration, management, and coordination of computer systems, applications, and services. It helps manage complex tasks and workflows. The goal of orchestration is getting the technologies to work together without needing human input. It will amplify the humans you already have in the chair and help them detect threats more accurately without increasing the number of people you need to manage it.

Security Meets Orchestration

Security systems are currently full of silos—single systems that work on their own. In 2023, the physical security market was valued at $117.7 billion and is expected to nearly double to $211.7 billion by 2030. Also, the Bureau of Labor Statistics states that there are more than 1.4 million jobs in security and protective services with the expectation that it will continue to grow. The numbers speak for themselves—the industry isn’t slowing down, and new products and services are offered daily.

Each service or product may fill an important gap in security offerings, , but each camera or access control system you add to your security infrastructure is a new independent system for your employees to juggle. Each component is functioning on its own instead of building off of each other to form a cohesive whole. Legacy systems add another layer of complexity to the issue.

For example, you have a system of cameras set up around your buildings but now you are being asked to increase security and need to add access control systems for employees. The cameras function on an entirely separate system than the access control and now instead of your teams monitoring one station, they have to monitor two. Then you are asked to secure the parking lot with mobile surveillance systems. These systems have their own video management system (VMS) that doesn’t integrate with your other camera system. Now your team has three systems to monitor. Instead of making their jobs easier, it ends up giving teams more work, which can be especially hard with limited personnel and budget. Also, because the systems function independently, things can be missed, and criminals can slip through your defenses.

Mike Lamb, a renowned loss prevention and asset protection expert with more than 40 years of experience, says it is vital for security systems to start working together. He spent his career trying to increase safety and security while maintaining a pleasant shopping experience for honest customers. This included working for Walmart, The Home Depot, Kroger, and others. Often, said Lamb, companies have dozens of solutions that are trying to solve theft, shrink, and other issues. But they have two main issues—they don’t understand their problem and don’t have the right equipment to solve their problem.

“Some companies have AP/LP teams that utilize tech and all too often it becomes a launch and leave scenario,” said Lamb. “AP/LP teams perhaps have a great idea, stand up the solution, and never truly monetize the value or see the value from the solution.”

Which is where orchestration can help. True orchestration isn’t just one system or one solution. True orchestration is business logic. It is all of your solutions working together to create more of a “force multiplier” effect in terms of value.

“Orchestration helps everyone win,” said Lamb. “The solution providers grow their business, and the client also benefits.”

What’s the Hold Up?

Why don’t different solutions already work together? One reason is coding or the language the solution speaks. Currently, each system uses its own, often proprietary way of speaking. Essentially, it’s as if one were speaking Japanese while the other system is trying to communicate in Greek. They are completely different and use different alphabets. The only thing they have in common is that they are both languages. That is how it is with computer code—each is using its own language that doesn’t cross over to another system. The machines have got to be able to talk to each other. They've got to be able to make decisions together. And they've got to be able to take action on their own without requiring a human to be involved. That's the only way that these can be effective systems.

Augmenting Security, Law Enforcement, and Prosecutors

According to Lamb, orchestration of security systems is the answer to helping security teams not only be more efficient, but also to increase safety and security without creating friction for green customers. “Customers are looking for convenience and we all know they vote with their wallet,” said Lamb. Currently, businesses are coping with increased theft by placing merchandise under lock and key. “They don’t want to wait for an associate to unlock the laundry detergent, razors, or cordless power as an example. If that trend continues, it will arguably only grow e-commerce,” said Lamb. “Orchestration can help security teams plan a strategy on ‘trust but verify’ instead of punishing honest customers for the 3–5% which are bad actors.”

A good example is computer vision systems that track behaviors (i.e. pacing, biometrics, erratic behaviors, etc.) that can alert teams to potential threats. These systems work together with in-store cameras, body cameras and store personnel to mitigate against theft and safety liabilities. “It’s not just the value of one solution, it’s the power of multiple solutions,” said Lamb.

Lamb also sees orchestration as a way to help businesses coordinate with law enforcement, district attorneys, and more. “It can help build a case for law enforcement and district attorneys and serve to galvanize those relationships. Instead of data from multiple inputs at multiple locations, businesses can deliver conglomerated data and can even work with other businesses to link criminals to multiple crimes.” From start to finish, the harmonization of security tools helps law enforcement find and arrest criminals and gives prosecutors a complete case against them.

What’s Next?

Lamb sees a shift coming. “Solution providers are seeing the increase in value proposition if they use orchestration,” he said. Security orchestration will help businesses enhance their security posture without increasing staff and workload. It will transform security from a reactive, human-dependent bottleneck into a proactive, scalable, and efficient defense.

Drones on the Rise

7 Min Read
What Eyes in the Sky Mean for Boots on the Ground

The Security Runway

2 Min Read
A Fashion Show of Wearable Cameras

How Legacy Becomes Legendary

5 Min Read
Using AI to Enhance Your Existing Security Systems