Automated Critical Security

Automated Critical Security

Trusted ID solutions will make smart buildings safer

Thousands of people pour into and out of high-rise office buildings each day, and each must be kept safe and secure. Two of the biggest challenges in accomplishing this are guard tour management and ensuring that all fire and safety equipment complies with inspection and maintenance regulations. Trusted identities can be used to automate and improve both processes.

Guard management is actually a three-part problem. Keys must be tracked, guards must visit all their checkpoints as efficiently as possible, and there must be a process for auditing billable contractor hours. An identity solution that combines trusted near field communications (NFC) tags and a cloud-based authentication system can be used to automate each of these processes, integrating key management, security patrol and contractor services into a single solution.

The resulting system enables secure proof-of-presence with frictionless authentication while delivering more accurate and actionable information in real time. It also can be deployed using an organization’s existing IT infrastructure along with standard NFC-enabled smartphones, tablets and other mobile devices.

To implement an automated key management solution, an organization can use trusted NFC tags to provide unique identities to keys. The way the system works is easy: To check out a physical key, a user first taps a tablet or other mobile device with the trusted NFC tag and enters an authorized identity. The user is then notified when the key is due to be returned, and again taps the tablet to check it back in. Automated key management significantly reduces the amount of time and resources spent managing and replacing lost or stolen keys. Organizations can account for each key in real time, and they have access to historical issuance and return activities so they can better understand which keys are in most demand.

Connected Guard Tour and Contractor Management

To manage guard tours and patrols, various tag formats must be placed at each patrol checkpoint throughout the building, and heavier- duty tags can be used to designate outdoor checkpoints. From there, guards simply tap each checkpoint visited with their NFCenabled smartphone. The system identifies each checkpoint by name, and automatically uploads timestamp information and updates databases in real time, providing digital proof that a security patrol took place at the proper location, and at the proper time. Alerts can be triggered if too much time passes between checkpoints. If a guard encounters an incident, the smartphone can be used to generate a detailed report, including photo or video evidence, and to escalate activity, when needed, according to protocol. A simple tap is the only training needed to ensure effective system deployment.

Automated guard tour management makes it possible for guards to deliver more timely and detailed reporting, while reducing how long it takes for each individual security patrol. Facility managers currently using these systems also note improvement in the management of their contract employee partners.

Using a similar “proof of presence” system for contractors has resulted in more precise, auditable time and attendance, and ensures facility managers are paying only for services rendered. Contractors are ensured fair compensation for the work they have completed. Reports detail all necessary information about site visits and activities, providing management insight along with substantiation for contractor invoices.

Streamlining Fire & Safety Inspection and Maintenance

Similar efficiencies are realized when trusted tags and authentication platforms are combined with Computerized Maintenance Management Software (CMMS) to simplify fire/safety equipment inspections and compliance. With these solutions, those tasked with equipment maintenance and compliance can ensure that physical objects like water valves and various sprinkler equipment can transact securely to provide “proof of compliance” and “proof of presence.” This enables field technicians to easily respond and record each inspection digitally, in a secure and trusted cloud environment.

To use these systems, a technician simply taps his or her smartphone or other NFC device to a tag that has been embedded or attached to the piece of fire or safety equipment. Each tap provides digital proof of each inspection report, and provides the technician easy online access to service requests and automated maintenance records. The same tap also verifies the identity of the field worker or technician, and ensures that the person’s skillset or credentials align with the qualifications needed to service specific equipment, and that the correct field worker is servicing that piece of equipment.

There are numerous benefits with this type of system.

First, it automates the maintenance and inspection process, reduces field inspection time, and accurately reports with proof of compliance, resulting in a quantifiable cost savings from a reduction in labor costs. Additionally, work orders are completed faster and there is an overall reduction in the number of onsite visits. Both of these benefits help increase overall cost savings. Tags can perform in a variety of environments without compromising readability, and are flexible enough to adhere to multiple types of surfaces, shapes and sizes, including metal and rounded objects like alarm and control valves.

Demand is growing for cloud-based authentication platforms that add trust to “proof of presence” applications to enhance building safety and security. Facility managers can accurately track security check points and instantly dispatch guards for instant response to and reporting of fraudulent activities throughout the building. Security guards can patrol areas more easily and efficiently with automated patrol stops that replace manual sign-in processes.

Organizations can also tag fire and safety equipment to connect it to the Internet, so that technicians can use their mobile devices to tap the tag and access cloud-based CMMS applications, track activities, and automate all of the previously manual processes involved with making sure these assets are ready for an emergency. From every guard checkpoint to every piece of fire and safety equipment, trusted tags and cloud authentication platforms help make buildings both smarter and safer.

This article originally appeared in the May 2018 issue of Security Today.

Featured

  • Report Reveals Security Training Reduces Global Phishing Click Rates by 86%

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, today launched its “Phishing by Industry Benchmarking Report 2025” which measures an organization’s Phish-prone Percentage (PPP) — the percentage of employees likely to fall for social engineering or phishing attacks, indicating the organization’s overall susceptibility to phishing threats. This year’s report found a global average baseline PPP of 33.1%, meaning a third of employees interact with phishing simulations before taking part in best-practice security awareness training (SAT).COVER 2025-PIB-NA-Report_EN-US Read Now

  • TSA Begins REAL ID Full Enforcement Today

    Today, the Transportation Security Administration (TSA) announced the imminent implementation of its REAL ID enforcement measures at TSA checkpoints nationwide. Read Now

  • Body-Worn Cameras on the Rise

    On the evening of Oct. 29, 2024, the owner of 300 Guard based in Houston, was shot while on duty at a convenience store. He returned fire. He was wearing a plated vest and thankfully recovered in the hospital. Read Now

  • Brazil Port Enhances Surveillance and Supports Wildlife Conservation with Sustainable Technology

    Ferroport, which operates the iron ore terminal at the Port of Açu in São João da Barra, Rio de Janeiro, Brazil, has deployed state-of-the-art video surveillance cameras from Axis Communications to enhance nighttime security and visibility, while decreasing environmental impact and prioritizing sustainability. With cutting-edge technology, the port now has precise surveillance cameras that capture high-quality nighttime images, while reducing the amount of artificial lighting that negatively impacts the surrounding ecosystem. Read Now

  • Fast-Forward from 1,000 B.C.E. to Today

    The lock and key have been around since time immemorial. In fact, the locksmith profession is one of the oldest in the world when you consider the earliest wooden tumbler lock debuted three-plus millennia ago. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.