Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Keeping Your Assets Safe

February 14, 2002
SECURITY magazine recently talked to some leaders in the asset tracking industry to discuss some of the new technologies on the market. Kim Warne, director RFID business development, ADT Security Services, Boca Raton, Florida, Chuck Stringham, marketing manager, Secure-It Inc., East Longmeadow, Mass., and Jeffery Ross, product marketing manager, Lenel Systems International, Pittsford, N.Y., share their insights.

Q. Briefly explain asset tracking.

Warne: Asset tracking refers to the ability to identify, locate or count individual items in a commercial or retail setting.

Stringham: Asset tracking is the process of monitoring and tracking valuable equipment at all times in case of theft of loss.

Ross: Asset management involves the tracking of physical assets through tagging mechanisms, including their current location, past locations and movements throughout a facility. It involves tracking individuals who are in possession of assets as well as the history of the asset.

Q. What are some of the most common products that have asset tracking devices installed? And why?

Stringham: The most common product we see using this method of security are laptop computers. The main reason is due to the mobility of the device and the cost of the unit.

Ross: It really depends on the application. Generally, high-value assets are the first products to be protected. In your typical business this may be items including PCs, projection equipment or office chairs. In addition, any piece of equipment that stores intellectual property, such as a laptop, is a candidate to be tagged and tracked.

Warne: A variety of asset tracking systems exist, with various systems designed to fit specific market niches. A common element of these systems is the use of radio frequency identification or RFID technology as the core enabler for asset tracking.

In corporate environments, asset tracking solutions generally employ some type of portal identification system along with special asset tags affixed to items to be tracked. In retail stores, readers may take the form of portable handheld units or bulk tunnel readers for scanning cases of goods.

Q What are some of the different asset tracking systems on the market?

Ross: At the most architectural level, there are two types of systems on the market; passive asset tracking systems and active tracking systems.

Warne: For corporate asset tracking, ADT offers several different portal tracking systems. One of the newest portal systems to enter the market is CoCure Watch, which ties asset tracking to access control using a passive RFID tag.

Stringham: LapTrak, a computer tracking and recovery service, STOP-ID tracking tags and RFID tags.

Q. What are some of the most important features in an asset tracking system?

Warne: For asset tracking systems to offer the most value to their users, they must be accurate, user friendly, aesthetically pleasing, secure and able to be integrated into existing system infrastructures. Tags need to be small enough to fit on or inside assets to be secured. Similar requirements exist on the retail side. Users seek a relatively long read distance from RFID systems, which can help yield greater usability and efficiency.

Stringham: Reliability of the monitoring service that tracks the unit is the most important because that is technically what is being purchased.

Ross: There are numerous features that should be built into a robust asset management system. The ability to classify assets is extremely important. This allows system administrators to assign certain classes of assets to individuals. The ability to automatically assign an asset to an authorized individual is also important from a workflow standpoint.

Q. What are some of the most recent technological advancements in asset tracking?

Stringham: Most recently, we have heard of global positioning satellite (GPS) tracking which is very expensive, but should become an excellent method of tracking a device anywhere in the world.

Ross: The ability to disable the basic input/output system (BIOS) on a laptop that leaves a building with an unauthorized individual is a great advancement in the fight to protect intellectual property. The ability to integrate asset management with other subsystems, digital video especially, has also been a huge advancement.

Warne: Perhaps the greatest technological advancement is the past year or so has been the ability to move smart RFID technology into mainstream applications like corporate asset tracking and retail merchandise tracking. Applying RFID technology at the item level enables a visibility to assets that was only dreamed of in the past. Retailers can have full visibility of inventories on demand, enabling more accurate replenishment, better merchandising and ultimately improved sales.

Q. What are the pros and cons of asset tracking?

Warne: Among the more important benefits of RFID are its high data storage capacity, its read range capability and its ability to read a tag even without line of sight. Another important benefit of RFID is the read/write capability of the tag, meaning new information can be added to asset tags. The whole history of a product will be available at your fingertips, allowing the benefits of RFID asset tracking to extend into areas like service and warranty tracking and automatic product returns.

While RFID has many advantages, the technology still has room to grow. Since RFID is an emerging technology, it does not enjoy the depth in product offering found with other more mature technologies like bar coding or electronic article surveillance (EAS).

Stringham: The benefits include the ability to monitor your equipment if lost or stolen. It can be a great tool for inventory control, may reduce insurance costs and it can act as a theft deterrent. Some downsides include cost, depending on the product And with the ID tags, recovery can only be achieved if the theft is reported to a 800-phone number.

Ross: There are a number of benefits to deploying asset tracking. At the highest level, you have the increased protection of intellectual property and of high value assets. Most facility managers who have deployed asset tracking will tell you the ROI is very quick, as soon as 8-12 months in some cases. Any downside outside of changing some operational processes is relatively minor, and the benefits far outweigh them.

Q. Where do you see asset tracking technology heading within the next five years?

Stringham: We see asset tracking having a very large niche in our security market. Technology available will allow us to track and monitor equipment at a cost-effective rate and offer many features that could benefit companies that purchase them. We feel GPS technology will become more popular and less expensive.

Warne: While it is impossible to predict the exact landscape of RFID and asset tracking in five years, we are confident that the next few years will bring a large number of technology breakthroughs. Some of the developments that are imminent are increasingly smaller RFID tags and a wider variety of multi-functional readers, all of which are cost reduced as volumes increase.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • health

    Third-Party Risk Management: Keeping Your Healthcare Organization’s Information Safe

    See More
  • Hacker launches cyberattack

    Are your critical IT assets safe from cyberattacks?

    See More
  • Keeping Customer Data Safe in an Evolving Threat Landscape

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing