Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

More than Dots on a Map

By Bill Zalud
April 1, 2008
Simple and seamless integration of GPS and wireless communications, such as this hardware from Qualcomm, can handle a multitude of applications, including security.


The hottest holiday gift this past year is already an enterprise mainstay when it comes to cargo security, fleet management, asset tracking and even law enforcement applications.

The combination of global positioning systems (GPS) with wireless communications is a one-two punch that attracts chief security officers and transportation directors. An indication of the sophisticated growth of GPS for security and fleet management was the entrance, just weeks ago, of  Qualcomm, with strength in digital wireless communications products and services based on CDMA and other advanced technologies.

That firm’s first OmniVision Metro service offering, called Service Fleet Manager, aims at service-based businesses that are centered in metropolitan areas and have mobile resources. Beyond security, Service Fleet Manager helps businesses gain visibility into their assets to increase their revenue, decrease operational expenses and improve customer service and loyalty. Similar to other security systems that now provide business advantages, such a new service can better manage enterprise workloads and improve response time to know where their resources and employees are, where they have been and where they should be. 

Systems that combine global positioning and wireless communications can provide security for fleets but also is a very strong management tool.

IDENTITY AND ASSET MANAGEMENT

The OmniVision Metro service provides customers with visibility into their mobile assets via management dashboards driven by data from in-vehicle GPS hardware for improved workforce and asset management, routing and scheduling.  As a benefit of Qualcomm’s unique approach to the user experience, companies gain the business intelligence they need to manage their service fleets proactively.  Leveraging the graphical user interface of this Web-based OmniVision Metro service, companies can identify the location of vehicles, monitor vehicle use, analyze and manage asset costs and increase overall operational efficiency and productivity.

Created for the mobile resource management market, Service Fleet Manager, as well as other new generation GPS-wireless solutions, incorporate industry-specific capabilities and features, including detailed maps and reports that provide a snapshot of an entire fleet for improved logistical planning.

The technology already has a visible footprint in law enforcement.

For example, BrickHouse Law Enforcement, a division of BrickHouse Security, told Security Magazine that it experienced a significant sales spike in 2007, with more than 1,000 new GPS tracking units deployed by over 200 local and federal agencies. In this case, the firm designs battery-powered magnetic GPS tracking devices specifically for use by law enforcement and private investigators. Popular police applications for GPS technology are real-time location-based security, property theft investigations, undercover operations, fugitive and bail recovery as well as fleet management.

SIDEBAR: Is GPS Tracking Complicated to Install and Use?

Most fleet tracking systems are comprised of the same basic components: a GPS receiver installed within each vehicle, and some kind of software operating on PCs that organizes and displays the information gathered. Both installation and use of these systems are actually fairly simple – but may seem complicated to those unfamiliar with the technology. This is why security’s relationship with a GPS tracking provider is always much more important than the tools they provide. A reputable, experienced GPS tracking vendor will:
  • Work to make the implementation of a fleet management solution as seamless as possible within an organization;

  • Ask for guidance to interpret the data received and apply it to improve the efficiency of field operations; and

  • Seek knowledgeable, accessible technical and sales support to cover any service issues that may arise.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Poor Sister No More: Access Enters Spotlight, Again

    See More
  • hospital corridor

    How to Build a Complete Access Control System

    See More
  • Smartphone used for security

    Another Evolution?

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing