Baseball and Security at ASIS 2015

I had the pleasure of attending last night's Angel's baseball game with Altronix and LRG here in hot, muggy California. The air-conditioned suite at the stadium was a much-appreciated detail. As I heard the crack of the bat, the cheer of the crowd and the buzz of conversations that were going around me, I couldn't help but notice how baseball and security are related.

In baseball, each plate is manned by a baseman, similar to the way in which a security guard monitors a facility. The job of each baseman is to guard his particular base and eliminate the threat of the opponent's team getting to it just as the job of a security guard is to "man" his/her particular area, preventing threats from invading.

Baseball uniforms are also a big deal, as they not only represent visually which team a player is dedicated to, but they also allow players to embrace their team by displaying emblems and colors that represent a particular baseball team. This brought to mind G4S.

Founded in 1954 as The Wackenhut Corporation, G4S takes pride in carefully screening potential security officers according to their talents, qualifications and experience to patrol, inspect and use communication to provide safety and security. One of the ways in which to do this is to provide a quick visual of a security presence, which, in my opinion, is shown through G4S security guard uniforms.

On the 2015 ASIS show room floor, G4S security guards manned the company's booth in all their splendor. With a G4S patch sewn onto the upper sleeve of the khaki button-down shirt, people are able to immediately identify them as part of G4S. In addition, this patch represents which "team" the individual is dedicated. Finishing out the uniform is a pair of matching khaki pants, a hat as well as black, polished, patent-leather, lace-up shoes, all of which demonstrates company cohesiveness and team camaraderie.

Needless to say, team work is an essential element in baseball. A baseball game is won not by a single individual, but by a team of players, all dedicated and working toward the same goal. The same is true in the realm of security. By having a group of dedicated guards whose goals are to serve and protect, they become an unstoppable safety force.

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3