Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

2010: The Time for Proactive Security

By Cindy H. Dubin
March 1, 2010
WellPoint’s proactive security approach helps the company understand potential risks before they get to the front door.

The economic downturn and the growing concern about foreign threats has placed increased pressure on CSOs today to beef up protection of physical, informational and personnel assets in their enterprises. This is a very different security world than a decade ago and one that requires Proactive Security Management (PSM). Such a plan enables CSOs to efficiently plan for worst-case scenarios rather than react to them inefficiently. A thorough understanding of a company’s physical, personal and informational assets helps foster such focused security policies. The desire to reach this level of security has prompted many CSOs to restructure their policies toward a PSM approach.
 

In 2006, the security function at Caterpillar Inc. underwent a complete redesign to its core security processes. The industrial manufacturer put a Risk-Based Security Program in place that standardizes protection of people, information, plant, product, reputation and brand at its worldwide locations. The global security team provides consultation and oversight while the local sites are accountable for execution.
Through proactive planning like this, response time and cost are reduced when a reactive situation occurs, says Steven P. Seitz, global security contract and strategic planning manager at Caterpillar. “By identifying threats and vulnerabilities ahead of time, we structure the response with the necessary resources.”

Mobile and Global

While no manufacturing occurs at Ernst & Young, Washington, D.C., the company’s Director of Security John Imhoff says the organization has something just as valuable: information. To protect corporate and client information, Imhoff says an access control system is embedded with an enterprise system to ensure authorization. E&Y physical security is coordinated with information security to afford comprehensive protection.


Additionally, he notes the company has refocused its PSM to harden the workplace environment against threats, which he says is a direct result of the economy. “Security is about deterring and forestalling a crisis any way you can,” says Imhoff. “CSOs should understand that we are in a changing threat environment and should have flexible procedures in place to recognize these changes and secure their organizations.”
 
Securing the Ernst & Young can be challenging, with 140,000 employees in 700 offices in 140 countries. Adding to the pressure is the fact that the company’s employees are very mobile, often working at remote sites and traveling extensively. “While on the road, we take every precaution to ensure the information on the laptops is not exposed to threat,” says Imhoff. A travel locator system allows security personnel to remain in contact with employees. The system allows E&Y to know current and future business travel itineraries, proving information on about where people are traveling, when, by what mode of transportation, and where they are staying. The system also supports messaging to travelers either en masse or by location. “If an event occurs at a given destination, we can quickly message people to help them avoid trouble spots and determine that they have not been impacted personally by the event,” he says.
 
A greater emphasis on international travel has also occurred at the Van Andel Institute of Grand Rapids, Mich., whose scientists are working on cures for diseases like cancer and Parkinson’s, among others. 
 
Kevin M. Denhof, CPP, physical security manager, says his security team – comprised of 30 percent internal staff and 70 percent contractors – expends a significant amount of time and effort on PSM to ensure that skill levels are high during emergency events. 
 
To combat emergencies happening overseas, the Institute is currently testing a geospatial informational system from IDV Solution that will allow the security team to track employees traveling internationally. 
 
“It’s important for us to know about world events that may have an impact on our employees who are traveling,” says Denhof.

Safety is Vital in Healthcare

For companies like WellPoint, a health benefits company, and Lancaster Regional Medical Center (LRMC), protecting employees and assets is vital, but so is assuring the safety of visitors to their sites. WellPoint’s proactive security approach helps the company understand potential risks before they get to the front door. “We reside in multi-tenant buildings around the country, which can pose certain risks, and we are in the healthcare business, which is a hot topic today and one that presents challenges to our security,” says Eric Levine, staff vice president and director of corporate security.


WellPoint hired Koorsen Fire and Security, Inc., a national integrator, to upgrade the security of the organization by installing a new access control system and implementing security standards. “A customer visiting our site must have a good experience and their safety is in our hands,” says Levine.
 
At LRMC, and its sister hospital just 10 miles away, Heart of LRMC, proactive security management is in place to protect all aspects of the hospital workplace, particularly the emergency rooms. An integrated system of access control, security cameras, and two-way radios from Triangle Communications, Inc., along with ID badges from ColorID, and simple hallway monitoring helps ensure that patients and staff are well protected.
 
“The economic downturn can cause some to enter the ER intoxicated or combative, while others are homeless and look to us a warm place to stay for a while,” says Hatfield. “Our PSM gives us greater control over who is entering the buildings.”
 
Strengthening control is what security in 2010 is all about. And there is no time to be stagnant, as this is a dynamic time in risk management. The pros agree that proactive security management addresses this changing environment and keeps CSOs ahead of the curve, a strategy not deployed in years past. “If we look back just 10 years ago, we would see that our security efforts were misfocused and not as in-depth as they needed to be,” says Imhoff. “We were weak compared to today.”

Best in Class Living with Best in Class Security

Escala is a condominium tower that adorns the skyline of Seattle at the corner of 4th Avenue and Virginia Street. The building has private elevators to most units, a private club, large balconies and upscale finishes. Escala will eventually include 280 condominium units ranging in size from 950 sq. ft. to 16,500 sq. ft. 


In a high-end project like Escala, providing a high level of protection for residents is part of the unique selling proposition for the condominium. The architects were looking for an integrated approach with video surveillance and access control all managed through a single system. Access to the building is managed in sections; residents are allocated a specified elevator for their section that they use to gain entry to their apartment. They do not have access to other sections or elevator lobbies. Residents see this level of security as part of the benefit that differentiates Escala from other condominiums in the area.
 
To maintain the security level, all lobbies had to be completely covered by video surveillance using multiple cameras across each floor. Residents also control who has access. The entry control system lets residents view who is requesting entry to the building and can independently allow or deny access on a person-by-person basis.
 
The Architects’ and Engineering Specification (A&E) for the building required operators to be able to control doors and monitor video from both their security head-end (control room) and the concierge’s desk in the main entrance lobby. All the cameras are recording video 24/7 at 25 FPS (frames per second) with video being archived for 30 days. The architectural design also specified that all cameras be unobtrusive and the ambience lighting in the lobbies required cameras to deliver high quality video even in low light conditions.
 
The security is provided by an integrated solution using Infinova cameras for video surveillance, S2 Security for access control and On-Net Surveillance Systems for video management. The final system uses more than 100 low-profile minidome cameras to cover the elevators that service Escala’s 31 floors with all doors being on camera and controlled electronically.
 
Indoor color-fixed minidome cameras feature a high-resolution sensor that provides high resolution and low light sensitivity. The architect’s specification required the cameras to disappear in the residents’ areas, and at the same time, they had to be a visible deterrent to potential perpetrators externally and in the parking garages.
 
The cameras’ design worked well with Escala’s high-end décor. They were small and discrete so as not to be obtrusive to residents.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Cindy Dubin is a contributing writer for Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Changing the Classroom Climate for Proactive Security

    See More
  • 2010 Security 500: The State of the Art

    See More
  • How to manage physical security at large venues, concerts, sports and other events amid COVID-19

    Physical security for large venues in the time of COVID-19

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products

Events

View AllSubmit An Event
  • November 9, 2010

    The Security 500 Conference

    The Security 500 Conference is the industry's break through conference focusing on the business impact of security leaders. The Security 500 brings together security leaders from leading organizations.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing