Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management

    Is Your Workplace Security System Working as It Should?

    While implementing physical security tech solutions on-premises is essential, the real question is: do they form a perfectly aligned, error-proof, and visitor-friendly security strategy?

    By
    eWEEK EDITORS
    -
    August 19, 2021
    Share
    Facebook
    Twitter
    Linkedin

      Ever since the serious talks of re-opening began, it’s became abundantly clear that in this new post-pandemic era, workplaces will demand a higher level of physical security. Companies have gotten the memo (at least, most of them did).

      Business leaders have been adopting the best practices to protect their business and workforce, while landlords have been increasingly investing in high-tech solutions to give their buildings a competitive edge.

      However, implementing physical security tech solutions on the premises is just half the battle. The real question is: do they form a perfectly aligned, error-proof, and visitor-friendly security strategy?

      Achieving this perfect end-to-end physical security protocol is much easier said than done. For some businesses, finding this perfect alignment is a never-ending process, practically a North Star. But if the you didn’t nail down the ideal security process, the truth is, you don’t have security.

      Here are some of the considerations you might find useful when fine tuning physical security on your premises.

      Are all elements of your security system aligned into one cohesive flow?

      Implementing a solid security tech stack, like automatic occupancy tracking, a digital check-in, or an access control system, is, of course, important. The real challenge, however, is making sure that all the elements are integrated properly and are “talking” to each other.

      Back in the final quarter of 2020, we surveyed over 300 CRE professionals around the globe. According to the survey results, 87% of CRE experts believe only half (or less) of their workplace tech solutions integrate with one another.

      Here is an example (based on a true story). A company implemented two critical elements that were meant to enhance physical security:

      • The guests were issued temporary passes which they used to enter the building.
      • Before a visit, guests were emailed NDAs.

      This company had two crucial pieces of the security puzzle here – a digital guest check-in and a health screening, which is great. The issue was that the temporary pass on guests’ phones granted them access regardless of whether the NDAs were completed. The security protocol wasn’t really working.

      This gap was easy to fix once those two pieces got connected properly. From then on, a guest would receive a QR code that granted them access only after they successfully signed the NDA.

      How prone to human error is your physical security setup?

      Here’s a couple of examples that are also based on true stories:

      • A lobby personnel accidentally gave a candidate who came for an in-person interview access to all the building floors instead of one floor they were supposed to visit. As a result, the guest ended up on the wrong floor, where another tenant company resided —and the tenant was not thrilled.
      • One of the tenant’s guests failed to stop at the building lobby on the way out and didn’t return the plastic card they used to go through the turnstile. The lobby personnel also forgot to revoke the guest’s access, as it needed to be done manually. The guest retained access to the building for weeks.

      Both situations above happened because of human error and could have easily been avoided if access had been granted and revoked by the automatic system based on the pre-set rules.

      Does a security setup stand in the way of creating a high-end, guest-friendly experience?

      Physical security is a major competitive differentiator for commercial buildings, but so is tenant experience. If these elements are at odds, it becomes a problem.

      Here is the last example (and yes, it is also based on a true story).

      As a part of one building’s enhanced security protocol, all visitors were required to stop at the lobby and announce themselves to the lobby personnel, who, in turn, notified the host. At certain times of the day, the lobby got very crowded. As a result, a C-suite level guest to one of the larger tenant companies spent an hour waiting in the lobby because the lobby personnel, busy with the other guests, failed to notify the appropriate party.

      This guest’s experience could have been much better if the security protocol was more efficient, for example, if visitors were pre-approved in advance and sent a QR code with an access to the turnstile.

      About the Author:

      Gregory Blondeau is CEO of Proxyclick

      eWEEK EDITORS
      eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×