Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and Management

Do You Consider Communication Critical?

By Phil Aronson
Phil Aronson

Phil Aronson is the second generation owner of Aronson Security Group (ASG) a provider of risk, resilience and security solutions within the emerging Security Risk Management Services (SRMS) industry. Aronson is heavily invested in a legacy of value for the industry by hosting an executive leadership forum called The Great Conversation, by participating in the International Security Management Association (ISMA) and by leading his company to the next generation of security services.

Communication Critical
Phil Aronson
Communication Critical
August 1, 2016

We believe one of the key pillars of any risk, resilience and security program is critical communications. However, it barely registers for many security solutions integrators.

If an integrator evolves into the Security Risk Management Services (SRMS) market, they must develop a methodology that ensures they are subject matter experts in how people perform roles in a process using technology. In regards to critical communications, they must be keenly aware of how security, safety and operations are impacted by their technology decisions.

For example, a port that handles both cargo and cruise lines may have similar IP  intercom, public address and messaging systems for handling operations, crowd control and parking as they do for notifying people where to muster in an emergency.

It is critical that the SRMS provider look at both. After all, our main goal is to align the business of security with the business, helping us avoid unnecessary redundancies in our clients' commerce, IT and security deployments.

We have found the following methodology to be successful in helping our clients determine their critical communication approach:

  1. Risk. What is the current risk profile of the organization? When was the last time the organization performed a risk, threat and vulnerability assessment?

  2. Operational. Assess the core operational and security workflows: How do people perform their roles today using technology or some other tool?

  3. Technology. What is the current technology infrastructure and how does it perform today? Where are the gaps that can cost effectively be bridged today?

  4. Evaluate (benchmark) critical communication vendors for intelligibility, interoperability, and the back end IT demand for high availability, scalability, reliability and maintainability.

  5. Pilot. Create a pilot that conforms to and, ultimately, confirms the use cases you have discovered using your evaluation scorecard.

  6. Collaborate. Work closely with the chosen technology vendor to ensure their roadmap aligns with how the solution might be scaled in the future.

  7. Deployment plan. This must include a communications plan for all stakeholders.

  8. Document measures of performance and do an annual business review for continuous quality improvement (CQI).

The capability and resources to identify a scorecard for a technology segment of a market and benchmark technology for clients is a key attribute of an SRMS provider.

One of the challenges in critical communications is the inability of consultants, integrators and end users to stay current with emerging technologies. There is a tendency for products to be quoted off data sheets or from an experience they had from a number of years ago with the assumption that the components should work together. Without a proper assessment of risk, threats and vulnerabilities of the organization which also includes operational workflows where communication is critical, your starting point for evaluating communication technology is deficient.

We just completed a client engagement where we evaluated an advertised integration between Zenitel’s IP Intercom, Motorola Radios and Lenel Access Control. We first did this in the ASG Testing Center to determine how the different components worked together and then migrated the testing to a proof of concept. This allowed the client to not only understand the nuances of the integration confirming true interoperability but also confirming the IT department's concern over high availability, reliability and scalability. But most important for IP intercom and audio is intelligibility, or the ability to hear, be heard and be understood. This is a challenge for most of the technology vendors in this market. Without SRMS vendors objectively evaluating, benchmarking and then deploying a proof of concept, the client may compromise their ability to respond in an emergency, endangering assets and people.

KEYWORDS: critical communication mass notification security risk management security system integration testing security tools

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Aronson 2016 200px

Phil Aronson is the second generation owner of Aronson Security Group (ASG) a provider of risk, resilience and security solutions within the emerging Security Risk Management Services (SRMS) industry. Aronson is heavily invested in a legacy of value for the industry by hosting an executive leadership forum called The Great Conversation, by participating in the International Security Management Association (ISMA) and by leading his company to the next generation of security services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Banking security

How Banks Can Protect Their Most Valuable Asset: Customers

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • How Do You Measure Success?

    How Do You Measure Success?

    See More
  • Phil Aronson

    Why Do We Need a Great Conversation in Security?

    See More
  • The Corner Office

    Do Security Vendors Have Solutions Looking for Problems?

    See More

Related Products

See More Products
  • Security of Information and Communication Networks

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

See More Products

Events

View AllSubmit An Event
  • May 22, 2025

    Proactive Crisis Communication

    ON DEMAND: Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most? We'll share strategies for managing internal and external communication during a crisis. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing