Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

On Tour, But More Business Benefits

By Bill Zalud
June 1, 2009


It’s an information world even for guard tour systems. New generation equipment lets enterprises get more information and do more with it – for security, life safety and facilities management.
     
Recent guard tour product offerings take all customers’ needs into account. Some devices are mirroring cellular phones. Mobility is the key. For instance, Wackenhut has developed its own guard tour system. Last year, the firm launched Secure Trax, a security administration application using PDA units. Built upon the latest mobile computing technology, the units optimize security programs for clients by providing detailed and reliable incident notification in real-time.
     
Such technology adds value to other areas of the organization such as facilities and risk management, legal, safety, engineering and building services departments, by capturing and disseminating valuable data that is often vital to these functional units and was difficult or impossible to capture in real-time in the past.


SHARING AND RESPONSES

In another example, Walter Chan, with the City of Toronto, corporate security division, also sees business benefits in the use of a guard tour system called TourTrax from Digital Security Concepts.
     
“Our business unit, under the facilities and real estate division, is the corporate body responsible for setting security standards and partnering with city divisions for the protection of city employees and assets. This is completed using a mix of proactive and reactive security measures. The sharing of resources, knowledge, and expertise allows for security to be provided in a standardized and cost-effective manner,” Chan said.
     
“We are committed to supporting and enhancing the safe delivery of city services. We do this by providing and maintaining an appropriate level of sustainable proactive and reactive security and life safety measures through highly qualified, knowledgeable, trained security professionals, contracted services and current technology.
     
Chan helps provide a wide range of security staffing options through in-house and contracted services for City-owned and leased properties. These options include:
  • Security mobile alarm response.
  • Security mobile patrols
  • Contract security guard management.
  • In-house corporate security officers.
“To enhance the delivery of security staffing services in a comprehensive multi-site municipal environment, we initiated a project that instituted an enterprise guard tour system” that enabled harmonization of processes, common reporting, a single database, and supporting:
  • Multiple tour routes;
  • Different types of tours (i.e. fire, security, etc.);
  • Tours of multiple buildings at multiple locations;
  • Random tour routes – guards may change their routine and arrive at different tour checkpoints in a random order;
  • Full reporting capabilities and integration with corporate security’s existing enterprise incident reporting software;
  • Reliable, anti-vandal and durable, and easy-to-use equipment
  • Network based synchronization facilities for transmitting data between hand-held devices and the core application;
  • An intuitive user interface;
  • The ability to annotate or enter follow-up commentary for any event recorded while on tour;
  • Tour checkpoints able to withstand outdoor weather conditions;
  • Alerts and notifications for tour non-compliance; and
  • Multiple security permissions, controlled through the application to access reports, reporting areas and administrative functions.


HOSPITAL USE

Protecting the hospital’s staff as well as the patients and their visitors is a clear priority for Bernard Scaglione, director of security for the New York-Presbyterian Hospital – Weill Cornell Campus. And to help him achieve this goal, he relies on an efficient and comprehensive physical security solution that includes state of the art key management and guard tour systems from Morse Watchmans.
     
“Hospitals are traditionally designed for ease of access and use and this provides a challenge when developing and maintaining security strategies,” said Scaglione. “The systems give us more control in providing a safer environment and better address the requirements for protecting today’s health care facilities.”
     
New York-Presbyterian Hospital - Weill Cornell Medical Center, located in New York City, is one of the leading academic medical centers in the world, comprising the teaching facility of New York-Presbyterian Hospital and Weill Cornell Medical College, the medical school of Cornell University. Its security solutions must effectively protect patients, staff, visitors and facilities without interfering with hospital operations and must also be convenient and simple to assure compliance with various government regulations such as JCAHO (Joint Commission on the Accreditation of Healthcare Organizations) and IAHSS (International Association for Healthcare Security
& Safety).
     
“The hospital has been using these solutions for over ten years because they meet these challenges and requirements,” added Scaglione. “Their systems have allowed us to increase security without negatively impacting convenience for patients, staff and visitors.”
     
A PowerCheck guard tour system with multiple tour capabilities, integrated functions and reporting options is an integral part of the hospital’s security regime. Scaglione explained that stations are set up around the facility, and as the officer walks by with the handheld device, the system reads and records the time. The device can be programmed to prompt either sequential or random tours for the officers, so their movements can’t be predicted, and the officer can enter a standardized code at any station to report incidents instantly.
     
Just as physical security information management (PSIM) is impacting security operations (See this issue’s cover story.), guard tour is going beyond collecting and reporting. Technology from ForgeHouse, for instance, runs on the enterprise network or through the Internet. Rules based, the security leader sets what the officer has to do for each post, inspection or maintenance task. It’s really dynamic post management. Specific to event response management, events are gathered from multiple systems and presets within the system understand that the event is at this site and that it needs this response.
     
Systems such as those from ForgeHouse can track assets as well as inspect environment and fire systems.
     
The bottom line: guard tour systems can secure staff, critical infrastructures and business continuity.


SIDEBAR: What About the Keys?

The Southeastern Pennsylvania Transportation Authority (SEPTA) has deployed a unique system to keep track of hundreds of keys used at its various bus garages, maintenance shops, an operations control center and a money-counting facility in and around Philadelphia. KeyWatcher cabinets from Morse Watchmans installed in the multiple facilities automatically record the access history of each key, including the user, date and time of checkout or return. The system releases assigned keys only to users with the proper authorization code, and cannot be manipulated or easily tampered with.
     
“Our reason for having the system is to minimize our risk and exposure,” said Chris Ruhl, surveillance systems specialist for SEPTA. “We need to know who took what key and when, and the system is a very honest employee. It literally lives up to its name as a key watcher.”

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • healthcare 3 responsive default

    Healthcare Industry Spending More on Security But Not Ready for Cyberattack

    See More
  • smartphone2-900px.jpg

    Most Social Media News Consumers Concerned about Inaccuracy, but Many Still See Benefits

    See More
  • IBM is using a PSIM to create a centralized command and control center

    Counting Up PSIM Benefits for the Business

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing