Evaluating AI in Security: 13 Questions to Ask at ISC West
Key Highlights
-
AI-driven security technologies deliver the most value when integrated into system-of-systems architectures that improve detection, response and situational awareness.
-
Evaluating solutions through an operational and architectural lens — not as standalone tools — can significantly enhance effectiveness and ROI.
-
A structured vendor-questioning approach helps security professionals assess AI effectiveness, integration readiness, cybersecurity posture and long-term scalability.
Each year ISC West reveals how rapidly security technology is evolving. AI continues to transform nearly every aspect of the security industry, driven by companies investing heavily in AI-enabled products. Security and building management systems predominantly employ narrow AI, known for its reliability and low error rates compared with general or generative AI.
However, for physical security applications, narrowly focused generative AI can play a critical role in translating real-time data into actionable, scenario-based situational awareness explanations.
Additionally, increasing connectivity and computing power elevate the cybersecurity risks, making Zero Trust architectures essential.
Platform-level AI, intelligent system and device integrations and system-of-systems architectures are transforming what for more than 50 years has been a device-centric industry into highly scalable, real-time situational awareness infrastructure. These architectures increasingly depend on interoperability between systems from multiple vendors within the overall security operational architecture. As a result, open standards and vendor-neutral integration approaches are becoming important design considerations for future-ready security deployments.
For a clear picture of how these changes affect security system design and operations — and how they may reshape your thinking about what your security capabilities are today versus what you’ve wanted them to be — see my articles:
Leading companies such as Ambient AI (23005), Allied Universal Services (27099), Brivo Systems (20031), Cobalt AI (9123), Eagle Eye Networks(20037), IQSIGHT [formerly Bosch Video Systems] (11053) and Milestone Systems (18053) — which has adopted the ethical G7 Code of Conduct for AI — and many others continue to significantly expand their AI capabilities.
High ROI perspective
Walking the ISC West exhibit floor can be exhilarating — and overwhelming. New AI-powered cameras, analytics engines, drones, robotics platforms and sensors promise dramatic improvements in security effectiveness. But evaluating these technologies individually can obscure an important reality: the greatest operational value often comes from how well they work together.
Artificial intelligence will again dominate many conversations and product demonstrations at the show. In recent years, however, the discussion has begun to shift. Rather than focusing only on individual AI-enabled devices or analytics features, security professionals are increasingly evaluating how technologies interact to improve operational outcomes.
Many emerging technologies — AI analytics, autonomous drones, robotics, advanced sensors and situational awareness platforms — deliver their greatest value when integrated into a larger operational architecture. Increasingly, enterprise physical security deployments resemble what the National Institute of Standards and Technology (NIST) describes as cyber-physical systems — interacting networks of devices, software platforms and human operators functioning together as a coordinated system of systems.
Evaluating technologies within that broader context can significantly improve both operational effectiveness and return on investment. A drone platform, for example, becomes far more valuable when integrated with perimeter detection systems, AI video analytics and security operations workflows.
Another example of innovative sensing technology comes from Acoem (Stand: 28039). Drawing on more than three decades of acoustic engineering expertise, Acoem has developed an AI-enabled acoustic sensor capable of detecting gunshots, sniper events, explosions, firecrackers and vehicle accidents. Each sensor can monitor areas up to roughly a 500-foot radius and can trigger automated PTZ camera slewing and audio replay within seconds of detection.
Like many advanced sensing technologies, however, its greatest value emerges when integrated into a larger automated response workflow that informs security personnel and other stakeholders with the appropriate situational context — such as that provided by platforms like Cobalt AI.
Architectural lens for evaluating technologies
Many technologies on the show floor are presented as standalone capabilities. In practice, their greatest value is typically achieved when they operate as part of a larger system-of-systems architecture.
Evaluating technologies and designing systems through this architectural lens — how well they integrate with other systems, contribute to situational awareness and support coordinated detection, verification and response — can significantly improve operational effectiveness and long-term return on investment.
Recommended AI Education Sessions at ISC West
ISC West’s SIA Education program includes several sessions offering deeper insight into AI-driven security technologies and cyber-physical architectures. Select those that most closely fit your interests.
First and foremost, the session I recommend the most — especially for in-house security practitioners—is the one that addresses the single largest and most common shortcoming in security system design: requirements development. Designing for fully capable security operations requires scenario-based design against a properly-assessed site and its environs.
Although this session is addressed to consultants and integrators, it will also benefit security practitioners to get a good understanding of what underlies well-designed security systems. Typically, you get what you ask for.
The Consultant and The Integrator, why a Quality Risk Assessment Is a Necessity
- Wednesday, March 25, 2:15-3:15 PM, Casanova 504
The rest of the session listings follow in their calendar order, Mon.-Thu. These sessions emphasize operational impacts and architectural thinking rather than simply highlighting product features.
- Monday, March 23, 12-1 PM, Venetian 303
Building Communication Systems that Support Safety and Trust
- Monday, March 23, 2:30-3:30 PM, Venetian 101
Security Automation for Cyber-Hardened Facilities
- Tuesday, March 24, 10-11AM, Venetian 308
Leveraging Physical Security for Cybersecurity
- Tuesday, March 24, 11:15 AM-12:15 PM, Venetian 303
AI in Physical Security: What’s Working, What’s Stalling, and What’s Next
- Tuesday, March 24, 1-2 PM, Venetian 303
Data Centers are the Next Physical Security Design Frontier
- Tuesday, March 24, 2:15-3:15 PM, Venetian 101
What will Security Operations Centers (SOC) of the Future Look Like?
- Tuesday, March 24, 3:30-4:30 PM, Venetian 303
Unlocking AI and What the Future Holds
- Wednesday, March 25, 10-11 AM, Casanova 506
- Wednesday, March 25, 11:15 AM-12:15 PM, Casanova 506
Purpose-Built: Unlocking the Real Power of AI in Physical Security
- Wednesday, March 25, 1-2 PM, Casanova 502
Built to Act: Designing for Autonomous Security Response
- Wednesday, March 25, 3:30 PM-4:30 PM, Venetian 303
The AI Revolution Happening Behind Your Security Camera: Are You Ready?
- Thursday, March 26, 11:15 AM-12:15 PM, Venetian 303
Questions to ask vendors
With the above broader perspectives in mind, the following question topics can help security practitioners evaluate the technologies they encounter on the ISC West show floor.
AI Operational Value
1. AI TIME-TO-VALUE
How quickly does your AI-enabled solution reach full operational effectiveness? Does it require a learning or training period, and what performance should be expected during initial deployment?
2. AI OPERATIONAL IMPACT
How does your AI capability improve security outcomes rather than simply generating additional alerts?
Ask vendors to describe measurable improvements in:
- incident detection
- response time
- operator workload
- guard force effectiveness and efficiency.
System Architecture
3. SYSTEM-OF-SYSTEMS INTEGRATION
How does your solution integrate with other security technologies to create coordinated operational capabilities rather than standalone functions?
4. MULTI-SENSOR INTEGRATION
How does your platform incorporate information from multiple sensing technologies such as video analytics, acoustic sensors, access control systems, drones, or other detection systems?
5. HYBRID EDGE–CLOUD ARCHITECTURE
Where are AI models executed — on devices, at the edge, or in the cloud? How does the system continue operating if cloud connectivity is lost?
AI Interpretation, Operational Workflows and Governance
6. AI-GENERATED INCIDENT INTERPRETATION AND RESPONSE WORKFLOWS
Can your AI system generate contextual explanations of events — such as incident summaries, situational assessments, or automated reports — rather than simply detecting activity?
How does the system support automated response workflows, including alert prioritization, camera control, and notification of appropriate stakeholders across integrated systems?
Does the platform support human-in-the-loop security operations, such as remote GSOC monitoring and operator verification of AI-generated alerts, similar to the operational model used by Cobalt AI?
7. AI GOVERNANCE
Who develops and maintains the AI models used in your system? What data was used to train them, and how are updates validated before deployment? What data privacy capabilities are built into the product or system?
Cybersecurity and compliance
8. CYBERSECURITY AND PRIVACY OF AI-ENABLED DEVICES
What cybersecurity protections are built into your devices and systems? How does your system help organizations manage privacy and regulatory compliance when AI analytics generate potentially sensitive data?
9. DIGITAL CERTIFICATE SUPPORT
How do your devices support customer-provided digital certificates?
10. PRODUCT LIFECYCLE AND SECURITY SUPPORT
How long will your products receive firmware updates and cybersecurity patches?
Operational Design
11. RISK SCENARIO DESIGN
What specific risk scenarios drove the development of your product’s new capabilities?
12. EXISTING SYSTEM VALUE
How does your solution add value to existing security systems rather than requiring replacement?
Future Architecture
13. SOLUTION ARCHITECTURE AND ROADMAP
How will your platform architecture evolve over the next three to five years? Ask how the roadmap addresses integration, AI capabilities, cybersecurity requirements, privacy concerns, and hybrid architectures. These are important evaluation factors for enterprise IT Review Boards.
Final Words
With a bit of planning, ISC West remains one of the best opportunities to explore emerging security technologies and learn from peers across the industry. The ISC West experience continues to improve its information accessibility, and this year provides an excellent way to find the right balance among show-floor learning activities, educational sessions, and the booth (stand) landscape.
And last but not least, remember that the most valuable insights often come not from individual products, but from understanding how multiple technologies can work together to improve security outcomes.
About the Author

Ray Bernard, PSP, CHS-III
Ray Bernard, PSP, CHS-III, is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities (www.go-rbcs.com). In 2018 IFSEC Global listed Ray as #12 in the world’s top 30 Security Thought Leaders. He is the author of the Elsevier book Security Technology Convergence Insights available on Amazon. Ray has recently released an insightful downloadable eBook titled, Future-Ready Network Design for Physical Security Systems, available in English and Spanish.
Follow him on LinkedIn: www.linkedin.com/in/raybernard.
Follow him on Twitter: @RayBernardRBCS.
