You can scroll the shelf using and keys

How to beat the terrorists… with tablets and apps

July 9, 2013



Introduction to my article published in TabTimes – July 9, 2013. Read the full article here

The recent Boston terrorist attack once again demonstrates that with the tragic loss of life and terrible injuries, comes an extraordinary impact – with a ripple effect on businesses beyond the blast zone.

The Facility Security Officer (FSO) of any large business understands the magnitude of these challenges – and that the best solution is prevention.

The foremost FSO team challenge is employee security and safety. But these professionals also know the collective impact that a breach in security can have on a business; loss of revenue, severe brand repercussions and perilous drops in market value.

The FSO is always looking to stay one step ahead of the threat, and now he/she is paired with a new ally, the CIO, to help avert tragedy.

What’s changed?

While the FSO can have monitoring electronics and cameras strategically placed throughout a facility, these aids are typically fixed in place, unable to account for countless security variables.

Fortunately, today’s tablets and smartphones are mobile handheld intelligence dream machines. The rapid evolution of mobile device technology has armed the mobile user with a powerful monitoring and security platform to capture and communicate detailed data.

  • Images
  • Video
  • Detailed and descriptive voice annotations (that can be auto-converted to text)
  • GPS and time stamps

Tablet and smartphone Apps such as Presence by People Power turn mobile devices into real-time video and audio streaming monitors.

All of this data can be connected to the enterprise security analytics system. Moreover, since tablets and smartphones are easy to use and are cost efficient for deployment, familiarity means low maintenance and training costs.

Three ways the CIO can help the FSO use tablets to improve security

Tablets aren’t simply for checking email or browsing the Web anymore. The CIO’s buy-in is critical to help devise top notch facility security policies and protocols. Here are three ways in which the FSO can benefit directly by working with the CIO:

  • The CIO can help the FSO carve out mobile technology compliance with security procedures and policy that the security personnel must then follow
  • With the help of the CIO’s team, security administrators can define and modify protocols remotely and deploy orders or other information at the touch of a button. As such, new protocol doesn’t need to wait to seep into the field, it happens in real time
  • The FSO can also measure security personnel compliance, identify gaps and react more swiftly to employee challenges with CIO-led monitoring tools

It’s about data quality AND quantity

Part of safeguarding any facility is the ability to collect and analyze data as quickly as possible.

Thus, manual data collection and subsequent repeat entry is not only laborious and slow, but it’s also potentially dangerous as well, leading to human error. Moreover, while simple electronic text has its uses, it tells a limited dimension story. Hence the emergence of mobile form apps like ProntoForms, which collects data in the field and instantly connects it with back office systems, cloud services and other destinations.

Taking advantage of mobile technology, the FSO must look at adding layers of intelligence to company security protocols, as it can exponentially raise the value of key available data. Acquiring information in the form of GPS, images, video, signatures, and other elements, permits the FSO to make more informed decisions.

Introduction to my article published in TabTimes – July 9, 2013. Read the full article here

%d bloggers like this: