Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Guards on Tour

August 14, 2003
Looking for the latest in high-tech guard tour systems? Then check out what one Hawaii facility did to revise its guard tour system. In Honolulu, it’s the 1.4 million-square-foot, four-story Hawaii Convention Center. While the local area focused on the cost of the facility, the economic boost to the community and potential traffic issues, the center’s security manager, Joseph Miller, kept his focus on making sure the facility was safe for visitors.

Miller has a security staff of 18, along with additional contracted help. They use a state-of-art guard tour system that works with touch tags, pre-labeled incident buttons and Palm devices. The Protrac security system, from Tiscor of Poway, Calif., helps regulate the security tours in and around the convention center.

Change from the Past

"I have to be honest, I was completely against the system at first,” Miller says. “I go back to the days of the old key systems.” Now, he says, there’s a feeling of confidence with the system in place.

The Protrac software system works with hand-held computers for establishing and monitoring security tours and facilitating equipment inspections. The convention center places small touch tags along various security routes at the center. When security officers make their rounds, they simply carry a small computerized touch-tag reader along with them in a waist-strap holder and quickly scan the tags in designated locations. When the device touches the various tags, it immediately records the date, time and location of each checkpoint visited.

If specific incidents occur, the security officers can quickly scan pre-labeled incident buttons carried in a handy pocket-sized case. This process keeps the officers accountable and alleviates paperwork. All scanned information is uploaded to a personal computer where it is retrieved as needed for reporting purposes.

There’s a Protrac software application that drives on a Palm device, too.

Officers using this system can record information by choosing specific preprogrammed incidents from pick lists on the hand-held or by entering answers to preprogrammed questions.

Since the the implementation of the guard system in 1999, tours have run more efficient.

“We don’t have as many security issues to contend with here in Hawaii in comparison to the mainland, so I didn’t believe that we needed a full-scale security tour system,” Miller says. “I also knew that our building was constructed with a lot of additional safety features. I wanted to make sure that we were not duplicating efforts. However, I discovered that with all of the many high-tech features our new building offers, there’s nothing that compares to the system we are using.”

“It is an excellent application,” Miller says. “I like the increased flexibility that the system creates when we need to use a ‘temporary’ tour. For example, from time to time, we encounter problems with people congregating in particular spots just outside of the center.” Using the system, the security operation can more easily add a ‘temporary’ route to regularly monitor the specific location.

The system was so easy to install, Miller recalls that it was up and running in less than one day.

“I began in the morning and finished up in the early afternoon,” he says.

In addition, Miller took advantage of the equipment inspection feature that the system offers. Barcodes placed on each of the facility’s 110 fire extinguishers make checking on that equipment routine. Setting up the system for fire extinguisher and safety equipment inspections took approximately four weeks.

“I took my time setting it up because I was strategically establishing the various routes for each one of my supervisors to monitor,” says Miller. “I’m a firm believer that if you invest a little extra time at the beginning to assure quality, it will pay off in the end. And, it has paid off for us tremendously.”

Upload Data to Computer

When the security team uploads the touch-tag reader to a personal computer at the end of each tour, the information is immediately ready for access and report preparation. Miller likes the fact that he can go back years later and quickly research security tour and equipment-inspection activities.

“While we don’t have to submit information to regulatory agencies, we do file reports with the state of Hawaii and the local fire department,” he says. “The fire department realizes that we use the hand-held computer system and are well organized as a result of it. They used to approach us about various extinguisher violations; however, they have not found anything wrong since the implementation of the system. The fire extinguisher and safety equipment inspection aspect of the system is one of the greatest.”

Another advantage: the system automatically identifies the location of each of the center’s 110 extinguishers at all times. If someone moves a fire extinguisher, the system quickly identifies the new location of it. And, inspection information still is maintained.

“We are also currently evaluating the feasibility of incorporating the automated incident reporting capability into our security patrols,” says Miller. An enhanced system, used with Palm devices, can prompt officers to record maintenance information and other incidents that could affect the center.

“The ease of recording more detailed information with this method is attractive to us, and there is a high probability that we will add this feature in the near future,” Miller concludes.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • GW Bridge Guards Fired for Sleeping on the Job

    See More
  • On Tour, But More Business Benefits

    See More
  • Dallas Love Field Airport on Tour by Latin American Airport Executives

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing