On a panel with OSAC-ASIS Bangalore discussing a shift that’s making a lot of legacy clients nervous: Remote security for the modern GCC.
The truth is, the Bangalore GCC landscape has hit a “Phygital” tipping point.
We are moving away from the era of “guards at gates” and into the era of Predictive Resilience. Today’s talent values flexibility—and our security professionals are no different.
So, can a security pro actually work from home? Yes. But let’s be honest about what that looks like:
- The “Remote” Layer: Threat intel, CCTV command center oversight, and identifying anomalies in access logs. These are data tasks. They don’t need a desk in a lobby; they need a high-speed dashboard and a focused mind.
- The “Physical” Anchor: You still need boots on the ground for emergency response, crisis handling, and the literal enforcement of access. These are the non-negotiables.
The real hurdle isn’t tech—it’s the client mindset. Clients are used to seeing a body in a uniform to feel “safe.” To change that, we have to prove that a Hybrid Model isn’t just about convenience—it’s about Economy and Reliability.
My advice? Don’t try to flip the switch overnight.
- Pilot-First: Pick a narrow scope (like remote vendor supervision).
- Data Over Presence: Let the KPIs prove that a remote analyst caught the anomaly that a distracted on-site guard missed.
- Governance: Build the trust through hyper-transparent reporting.
If we want to attract the next generation of security leaders, we have to stop measuring them by their “seat time” and start measuring them by their impact.
The Evolution of Security in GCCs: How Far We’ve Come Since 2019
Security in Global Capability Centers (GCCs) has changed more in the last six years than in the previous two decades. What used to be a straightforward, office-bound function focused on physical protection has transformed into a sophisticated, tech-driven discipline that blends physical, cyber, and intelligence capabilities.
Here’s a clear, side-by-side look at how GCC security has evolved from the pre-pandemic era to today’s hybrid, always-on world.
Work Model
2019: Most employees showed up at the office every day. The workplace was predictable and contained.
Today: Teams are spread across homes, co-working spaces, and international travel. This distributed model has expanded the attack surface dramatically — the “office” is now everywhere.
Security Focus
2019: The primary job was physical security — guards at the gate, access badges, and CCTV cameras.
Today: Security teams manage an integrated approach that covers physical threats, cyber risks, and the fast-growing overlap between the two (cyber-physical convergence).
Threat Landscape
2019: Main worries were theft, trespassing, and occasional insider misuse.
Today: Threats are far more sophisticated — from advanced insider risks and data exfiltration to attackers who combine digital and physical tactics.
Perimeter Definition
2019: There was a clear boundary — the office walls defined the perimeter.
Today: The perimeter has dissolved. Data and people move constantly between home networks, coffee shops, airports, and cloud environments.
Surveillance & Monitoring
2019: Traditional CCTV systems monitored locally, often watched by security staff in a control room on-site.
Today: AI-powered video analytics, facial recognition, and remote monitoring from centralized or global Security Operations Centers (SOCs) are the norm. Systems can now detect unusual behavior in real time.
Access Control
2019: Card-based or basic biometric entry.
Today: Zero Trust architecture, identity-based access, adaptive authentication, and continuous verification have become standard. It’s no longer just about where you are, but who you are and what you’re trying to access.
Manpower & Operations
2019: Heavy reliance on large guard forces and on-ground teams.
Today: Technology handles routine monitoring and alerts, allowing smaller, highly skilled teams to focus on high-value work. Automation and smart systems have optimized manpower significantly.
Incident Response & Intelligence
2019: Mostly reactive — something happens, then teams respond.
Today: Proactive and predictive. Advanced analytics, threat intelligence feeds, UEBA (User and Entity Behavior Analytics), and real-time dashboards help teams spot and stop issues before they escalate.
Data Protection & Compliance
2019: Physical security came first; data protection was important but secondary.
Today: Protecting sensitive data is a core part of the security mandate, deeply integrated with operations. Compliance has shifted from periodic audits to continuous, real-time monitoring and reporting.
Vendor, Contract Staff & Travel Risks
2019: Managed mainly through physical supervision and badging.
Today: With remote work and logical access, third-party risks have grown. Travel risk management now includes real-time intelligence and duty-of-care platforms.
Cost & Decision Making
2019: Capital-intensive — heavy investment in infrastructure and manpower.
Today: A balanced model with more operational expenses on technology subscriptions, managed services, and cloud-based tools. Decisions are increasingly data-driven rather than purely experience-based.
Employee Awareness
2019: Basic security training, if any.
Today: Regular awareness programs, phishing simulations, and ongoing education have become essential parts of the security culture.
Key Takeaways: The New Reality of GCC Security
- From Physical to Phygital: Security is no longer just about locks and guards — it’s the seamless integration of physical and digital risk management.
- From Guarding to Intelligence-led: Human oversight is still vital, but intelligence, analytics, and foresight now drive the strategy.
- From Perimeter to Identity: “Who” you are and your behavior matter far more than “where” you are.
- From Reactive to Predictive: Early warning systems and proactive interventions have replaced the old “respond after the incident” approach.
- From Local to Global: Security command centers now operate with a centralized, 24×7 global view.
The role of security in GCCs has evolved from a cost center focused on protection to a strategic business enabler that supports resilience, business continuity, and confident growth in a complex world.
Organizations that treat security as a technology + intelligence + people partnership are the ones best positioned to thrive in this new era.
Compiled by –
Col Vineet Seth, VSM (Retd)
CEO
VS4 Security and Services Pvt Ltd





