Technology Trends: Security Technologies for Non-Security Stakeholders

0

This article originally appeared in the September 2022 issue of Security Business magazine. When sharing, be sure to mention Security Business magazine on LinkedIn and @SecBusinessMag on Twitter.

Historically, the primary actor behind security technology projects has been the security professional or person related to a company’s security function. While this is still true in many circumstances, a new era of security technologies serves more than the needs of security professionals.

By involving other stakeholders in the process of planning the design and deployment of security technology, a security integrator or consultant can leverage the business objectives of these stakeholders to create security technology that serves all an organization.

When planning a security technology project, think outside the box and bring together as many relevant stakeholders as possible. Security technology can be leveraged to maximize its organizational benefits. Sometimes this requires thinking outside the box; other times the benefits of a technology to a sister ministry are obvious. Soliciting input from security-adjacent stakeholders will not only lead to better overall security technology design, but it may also reveal funding in places that the integrator and security department were not expecting.

As an integrator, consider the needs of these five key organizational stakeholders. If you do, you have a much better chance that funding can be secured to greenlight a project.

1. IT

Your security technology will most likely run on a network backbone, and for that to happen, both the security integrator and end user will need a strong working relationship with the technology player – typically, the computer science.

This is important because IT is responsible for a company’s overall “data highway”. Leveraging this relationship can create synergies for purchasing, deploying, securing, and managing network technologies. Don’t go alone.

2. Facility management

This stakeholder runs the show, literally. They need information on all aspects of the facility and its operations. Bringing this stakeholder to the table will provide insight into what is important outside of the security department’s perspective. For example, managing contractors such as snow removal, landscaping, cleaning, deliveries, and repair and maintenance services are all critical to the smooth running of a business. Visitor management technologies and applications are a key area to help with this.

In fact, security-based mobile apps are often developed to help companies meet the technology needs of customers.

These mobile apps provide their client users with a wealth of valuable information at their fingertips – from access control to wayfinding, duress and incident reporting.

It is now possible to use the technology to create a mobile application for access control. For example, STid, whose card readers work with any permanent access control system, can integrate access control credentials into a company’s mobile application.

SaaS solutions such as VOLO and Everbridge can support real-time stress and incident reporting. The use of these technologies is low friction, promoting easier adoption into a culture.

3. Sales and Marketing

With facilities enjoying better CCTV coverage than ever before, new automated intelligence (AI) platforms can leverage these video feeds to provide valuable data for making business and security decisions.

There are many video analytics-based solutions from surveillance and VMS vendors that aim to increase business intelligence, from retail to industrial manufacturing.

A solution from DeepNorth (www.deepnorth.com) uses existing video cameras to generate data-rich reports of foot traffic to, from and within a facility. This data can be used to create heatmaps of traffic patterns, dwell times, peak times and throughputs – all of which can be used to drive sales of rental space, merchandise and real estate, as well only to adjust staff, space planning, and increase customer service.

Specific to marketing, many organizations – especially retail establishments – seek to attract people to their facilities. You never know when security technology can provide a vehicle to drive traffic to a customer. Example: A client I worked with has hawks nesting on his roof every year. They installed a “Falcon Cam” and posted this video on their website, along with information about bird migration and conservation efforts in the city. The addition to the website was a success and brought much more attention and traffic to the building and to the company’s website.

4. Risk Management and Compliance

While a company’s security function typically determines video surveillance coverage to aid in investigations and situational awareness, risk and compliance can play a significant role in determining video storage and archiving. . While most security incidents are discovered and investigated within 45 days, disputes can take a much longer time to discover.

In some industry-specific cases, such as cannabis cultivation, archiving requirements can span multiple years. This can be very expensive if this storage requirement is met as hot, on-site storage.

Introducing this player to software solutions like that of Tiger Technology (www.tiger-technology.com) can make the difference. Tiger Technology’s software combines local VMS with cloud-based hot, cold and glacier storage solutions, which can significantly reduce the overall cost of long-term video retention requirements.

5. Law Enforcement

Many cities now have formal public/private partnership programs where the company can choose to share real-time camera feeds with local law enforcement. This allows police to observe and respond quickly to criminal incidents involving company property. If a facility is in a high crime area, or if it is iconic or high profile in nature, this could significantly improve the police response on or around your client’s property. Integrators and consultants should be a trusted resource for customers by helping them initiate and participate in these public/private partnerships.

Paul F. Benne is a 35 year veteran in the protective services industry. He is president of Sentinel Consulting LLC, a New York-based security consulting and design firm. Connect with him on www.linkedin.com/in/paulbenne or visit www.sentinelconsulting.us.

Share.

Comments are closed.