Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Zalud Report: In the Palm of Your Hand

By Bill Zalud
July 1, 2006


Enterprises big and small share goals when it comes to security. When it makes business sense, they want to leverage what exists; speed up the delivery of more accurate information to the appropriate decision maker; improve a process that’s essential to the organization; piggyback one solution to help solve sometimes unrelated others; and save time or money or both.

Daniel Gohl, principal at McKinley Technology High School in Washington, D.C., knows better than some boardroom-oriented CEOs that – when there’s an incident – wasted time can cause exponential harm.

Middleware can access a database, display student names and document an incident – all in a uniform and fast way.

Leverage existing tech

Gohl’s assignment: Leverage the school’s existing technology to improve student services by increasing his faculty’s access to student information such as emergency contacts and medical records as well as grades and schedules.

His solution was in the hands of his staff – WiFi-enabled PDAs. Mobility was the overriding key. Before the improvements, “We were able to access student information only on desktop systems, which isn’t helpful to school personnel monitoring school grounds.”

To meet his business needs, Gohl saw value in the two “Ms” – middleware and mobile technology – to deliver secure, wireless data to school administrators. In an instant, they can access emergency and truancy information and other critical student information wherever and whenever they need it. It’s a solution being shared by more and more corporations and government agencies, where the chief security officer can pull up access and security video from a laptop or where an officer at an outdoor entrance can check IDs by pulling up a person’s database info and even her portrait on a sophisticated, wireless device. Next generation Web-based access control systems now allow first responders to go online to determine not only the number of people in an impacted building or floor but also more detailed information on each one.

More security executives, often working more closely with their IT colleagues, are also bringing in middleware or what some call enabling technology to bridge existing computer and communications infrastructure to do better or more or faster or all of these outcomes. Middleware comes from sources not usually found in the traditional security market or are brought into a design thanks to a systems integrator.

The charm of middleware

For McKinley’s Gohl, “Now we have an application (Mobile Guardian from Defywire, Herndon, Va.) that roams wherever our personnel and students are. This has greatly enhanced our ability to secure the school and significantly cuts down on staff hours spent completing paperwork associated with disciplinary incidents.”

The real-time nature of such incident reporting applications creates accurate, uniform and instantaneous documentation of incidents. To me, it also sounds like guard tour systems on steroids.

And just like those early guard tour systems, Gohl aims to expand uses for his mobile devices. His future plans include adding teachers to the user base and using sophisticated wireless technology to evaluate teachers and provide instant feedback at the end of the class.

SIDEBAR: My Twist on Security Happenings

It’s Zalud’s Blog. You can access it at http://blog.securitymag.com or through Security Magazine’s Web site at www.securitymagazine.com. Every day – including weekends – I post items of specific interest to you. Some you can’t see anywhere else. The blog also allows you to comment on items so your colleagues can gain from your insights.

Links

  • Zalud’s Blog
  • Zalud’s Blog
  • Zalud’s Blog
  • Zalud’s Blog
  • www.securitymagazine.com
  • www.securitymagazine.com
  • www.securitymagazine.com
  • www.securitymagazine.com

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

Head in front of monitors

Ransomware Response: How Businesses Regain Control Under Pressure

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Get Your Water Bottle in Hand When Flying Again, If You Fly Out of Europe in 2013

    See More
  • 2016 Technology Report: New Security Solutions and Risks Go Hand-in-Hand

    See More
  • Zalud Report: The Art of Theft

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing