Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Firing Up Guard Tour

November 11, 2003
The integration of fire protection and security systems continues after overcoming reluctance and debate, especially from authorities with jurisdiction. But there are other, simpler ways to integrate fire and security at diverse types of facilities.

One way is to use guard tour verification technology to check fire extinguishers, tamper switches, fire pumps and safety exits.

One example: Mercy Medical Center in Baltimore, Md. The Center covers nine buildings of about one million square feet. With two fire and safety employees, there is a challenge to cover 2,500 or so checkpoints. The challenge is met, according to the Center’s fire marshal, by using guard tour technology that has been customized for fire and life safety needs. Called FireProof, the system from Tiscor of Poway, Calif., consists of a compact, portable device that records the time, date and location of each piece of equipment and checkpoint.

Mercy Medical Center, because of its mission and type of facility, must meet compliance with regulations from federal, state and healthcare commission agencies.

Detailed Reports

FireProof’s report-generating feature allows Center staff members to produce accurate and detailed reports documenting inspection activities. Such reporting capability also helps the Center deal with vendors seeking specific equipment history. The bottom line: less time spent on inspections and more accountability. For instance, many times a technician will encounter fire extinguishers with missing pins. The tech simply swipes a special barcode from a carry-around card. The barcode denotes the piece of equipment that needs to be fixed.

The handheld device also can be programmed for so-called “roaming” routes. When an inspector doesn’t want to be guided from one location to the next, he or she can select the “roam” route.

FireProof is a software management tool that tracks the inspection and maintenance activities for fire extinguishers; fire hoses; ladders; sprinkler systems; eyewash stations and showers; emergency exits; safety signs and more. Such technology streamlines equipment tracking by eliminating log sheets and manual data entry.

In addition to Tiscor, there are additional sources of guard tour systems that both are based on other data collection technologies and can be adapted to integrating into fire and life safety inspection and maintenance tasks.

The PulseStar from Videx of Corvallis, Ore., for example, uses touch memory buttons. The system’s portable touch memory reader can accommodate up to 5,400 button reads prior to downloading and the reader has no need for rechargeable batteries.

The PulseStar download station provides the communications link between the reader, which is carried by an officer or life safety inspector, and a personal computer or an organization’s computer network. Downloading is via infrared.

One unique aspect of the Videx approach is the ability of PulseStar to work in harsh outdoor conditions. The reader’s cylindrical metal case is sealed against dirt and moisture. In addition, the unit indicates a successful read not with a tone but with a pulse so that the unit can operate in a high-noise environment such as a factory or in a no-noise environment such as a hospital.

Another, similar approach comes from TimeKeeping Systems of Solon, Ohio. It markets The Pipe, a guard tour data collector. Also using touch memory, The Pipe is made of corrosion resistant stainless steel alloy and the case is sealed, making it tamper-resistant and waterproof. TimeKeeping Systems matches The Pipe with its Guard1 Plus software.

What’s even more important for life safety and security executives needing to analyze and maintain fire prevention systems, Guard1 Plus creates a diversity of reports that also can be customized.

At Carnegie Museums of Pittsburgh, for instance, the alarms technician prints a main report once a week for review. If there is an incident or exception, there is additional or more frequent reporting.

The Boss from Morse Watchmans of Oxford, Conn., has a display screen and keypad on the data recorder unit. As life safety inspectors make their rounds, they can enter in a user-programmable code on the keypad. Working with The Boss, the Tour-Pro guard tour software from Morse Watchmans downloads tour information, programs the data recorder, generates custom reports and manages maintenance files.

Miami-based Deggy Corp. goes one better in integrating guard tour systems into fire prevention equipment maintenance. It integrates its guard tour equipment with digital video recording. The Deggy approach uses a pen-like reader and touch memory buttons. In addition, a supervisor’s portable unit can connect to a vehicle cigarette lighter adapter for pen downloads on a remote facility site.

Radio frequency identification (RFID) technology also plays a role in guard tour systems being integrated into fire prevention missions.

ProxiPen from Detex Corp. of New Braunfels, Tex., senses and reads tags whenever the acquisition unit comes in read-range contact with tags. The RFID tags can be concealed behind nonmetallic surfaces.

SIDEBAR 1: Electronically Monitored Extinguisher

Forget walking around to check fire extinguishers.

Mija of Rockland, Mass., has technology that uses solid-state technology housed in a standard spiral-wound Bourdon tube pressure gauge to actively monitor portable fire extinguishers. The approach signals an alert when a portable fire extinguisher falls below a safe pressure level. It also signals an alert when an extinguisher is removed from its designated location, when access to an extinguisher is obstructed or even when the system’s battery power falls below an acceptable level.

Called EN-Gauge for electronic notifying pressure gauge, the system is battery-powered to reduce cost on new or retrofit installations and can be interfaced to other systems via wires or wirelessly.

For extinguisher pressure, the system tests every 15 hours. It is a higher safety standard when compared to the NFPA-10 physical inspection requirement.

For obstruction, the system uses sonar, sending out a pulse of sound. If it bounces back, the sensor within the system design determines that there is an obstruction around the extinguisher.

For presence, the fire extinguisher is connected via an electronic tether, which simply disconnects when the extinguisher is removed from its mounting bracket or hanger.

SIDEBAR 2: Video-based Fire Detection

As advances in machine vision seep into the life safety and security arena, new applications evolve.

One unique one that integrates fire and security comes from AxonX of Baltimore, Maryland. Its SigniFire system uses security video and machine vision to detect fire and smoke and alert to those conditions.

Machine vision, also called image processing, is a technology that combines video imaging and computerized pattern recognition. By using standard video cameras and a computer, the system becomes a volume sensor that looks for the fire condition.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Salaries, Hiring, Firing and Security’s Value Are All Up…What’s Changing?

    See More
  • Not the Same Old Guard Tour

    See More
  • Danville Hospital, Hendricks Regional Health System

    Collecting Insights and Metrics with Guard Tour Software

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!