Security Technology Executive

MAY-JUN 2018

Issue link:

Contents of this Issue


Page 36 of 79

www. • May/June 2018 • SECURIT Y TECHNOLOGY E XECUTIVE 37 equipment operators has now been replaced with texting. Texting while operating machinery or driving clearly should not be done under any circumstances. The emergence of technology into the security sector offers more opportunities for security sys- tem enhancements and program integration than ever before. A great advance in the sector is the bur- geoning role of autonomous data machines (ADMs or robots) and drones that are purposely built for security programs seeking to increase threat aware- ness and management through the strategic inte- gration of people, processes and technology. Consider this example of a major automobile manufacturer using new technology for enhanced intelligence. The company implemented an elec- tronic platform to consolidate all reporting, metric collection, post orders and other security-related documentation via a central desktop. It locates and tracks its data online via one portal, eliminating the need for about 80-90 percent of paper records across multiple facilities. A GPS key ring tracking system can locate and recover each set of keys in use by the security force in the event they are misplaced or lost. This helps ensure the integrity of the site while reducing liability and exposure to the company's security vendor of high-security keys in daily use. Additionally, this major automobile manufac- turer is working with Intelligent Drone Systems, which offers state-of-the-art drone technologies for government and industrial organizations. In place is a 360-degree field-of-view GroundAware GA1360 Surveillance Senor and Information Sys- tem, which enables automated real-time monitor- ing of and response to physical security threats at critical sites and a Drone Home Aerial System that provides an advanced active response for external security missions. Threats, crime and disruption do not operate on a timetable, nor do they sleep. Drones and robots provide 24/7 autonomous patrolling and moni- toring including automatic recharging without human intervention so that a company 's assets can be secure 24/7. Some manufacturing facilities use drones or robots for perimeter security patrols, which provide "smart eyes and ears" that enable security personnel to do their job more effectively. Some industrial companies are benefitting from the extra bells and whistles concerning access con- trol that this sophisticated technology provides. What if during certain hours of the night there absolutely should be no people wandering through the premises? Both ADM and drone technology are capable of sending real-time detection alerts to relevant personnel, based on pre-programmed traffic or condition parameters, including corre- sponding recorded video. Additionally, with time- stamped data provided, users can search through all the other detections in the deployment to better understand the conditions on the ground at that point in time. What is the protocol when vehicles are not authorized to be on the premises for more than a certain period of time? Drone or ADM technology can inform securi- ty personnel that a vehicle has been parked at a loca- tion for more than 24 hours, with an alert. It can also provide data on the top 10 stationary vehicles in an area and the parking meter readout for each, by the hour. What if a domestic dispute arises with the spouse of an employee continuing to pay visits to the plant, or the company fears a disgruntled and/ or terminated employee will return to cause a dis- turbance? The drone or robot can be programmed to recognize license plate information or MAC addresses from mobile devices and push an alert upon detection. Intelligent Real-Time Monitoring Remote video monitoring—and other end-to-end security solutions that include cameras, access control, traditional alarms, and remote audio fea- tures—are gaining attention as a powerful secu- rity force-multiplier for industrial enterprises. By leveraging video analytics with real-time, event- based monitoring , companies are able to more successfully manage risk. Employing Monitoring and Response Centers and establishing Security Operations Centers (SOCs) or Global SOCs helps detect threats and deter crime. Not only does real - time threat monitoring improve situational awareness for the existing security force, but it also enhances day-to-day security operations and can improve cost efficien- cies. Building an effective world-class manned protection force for the industrial sector requires industry knowledge, continual planning and training and oversight. Organizations that thrive empower their security teams to be competitive, resilient and inspired in a 21st-century society so they can continue to be relevant, challenged, engaged and productive. » The best security training begins with a solid foundation. «

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - MAY-JUN 2018