Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and Management

Do You Consider Communication Critical?

By Phil Aronson
Phil Aronson

Phil Aronson is the second generation owner of Aronson Security Group (ASG) a provider of risk, resilience and security solutions within the emerging Security Risk Management Services (SRMS) industry. Aronson is heavily invested in a legacy of value for the industry by hosting an executive leadership forum called The Great Conversation, by participating in the International Security Management Association (ISMA) and by leading his company to the next generation of security services.

Communication Critical
Phil Aronson
Communication Critical
August 1, 2016

We believe one of the key pillars of any risk, resilience and security program is critical communications. However, it barely registers for many security solutions integrators.

If an integrator evolves into the Security Risk Management Services (SRMS) market, they must develop a methodology that ensures they are subject matter experts in how people perform roles in a process using technology. In regards to critical communications, they must be keenly aware of how security, safety and operations are impacted by their technology decisions.

For example, a port that handles both cargo and cruise lines may have similar IP  intercom, public address and messaging systems for handling operations, crowd control and parking as they do for notifying people where to muster in an emergency.

It is critical that the SRMS provider look at both. After all, our main goal is to align the business of security with the business, helping us avoid unnecessary redundancies in our clients' commerce, IT and security deployments.

We have found the following methodology to be successful in helping our clients determine their critical communication approach:

  1. Risk. What is the current risk profile of the organization? When was the last time the organization performed a risk, threat and vulnerability assessment?

  2. Operational. Assess the core operational and security workflows: How do people perform their roles today using technology or some other tool?

  3. Technology. What is the current technology infrastructure and how does it perform today? Where are the gaps that can cost effectively be bridged today?

  4. Evaluate (benchmark) critical communication vendors for intelligibility, interoperability, and the back end IT demand for high availability, scalability, reliability and maintainability.

  5. Pilot. Create a pilot that conforms to and, ultimately, confirms the use cases you have discovered using your evaluation scorecard.

  6. Collaborate. Work closely with the chosen technology vendor to ensure their roadmap aligns with how the solution might be scaled in the future.

  7. Deployment plan. This must include a communications plan for all stakeholders.

  8. Document measures of performance and do an annual business review for continuous quality improvement (CQI).

The capability and resources to identify a scorecard for a technology segment of a market and benchmark technology for clients is a key attribute of an SRMS provider.

One of the challenges in critical communications is the inability of consultants, integrators and end users to stay current with emerging technologies. There is a tendency for products to be quoted off data sheets or from an experience they had from a number of years ago with the assumption that the components should work together. Without a proper assessment of risk, threats and vulnerabilities of the organization which also includes operational workflows where communication is critical, your starting point for evaluating communication technology is deficient.

We just completed a client engagement where we evaluated an advertised integration between Zenitel’s IP Intercom, Motorola Radios and Lenel Access Control. We first did this in the ASG Testing Center to determine how the different components worked together and then migrated the testing to a proof of concept. This allowed the client to not only understand the nuances of the integration confirming true interoperability but also confirming the IT department's concern over high availability, reliability and scalability. But most important for IP intercom and audio is intelligibility, or the ability to hear, be heard and be understood. This is a challenge for most of the technology vendors in this market. Without SRMS vendors objectively evaluating, benchmarking and then deploying a proof of concept, the client may compromise their ability to respond in an emergency, endangering assets and people.

KEYWORDS: critical communication mass notification security risk management security system integration testing security tools

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Aronson 2016 200px

Phil Aronson is the second generation owner of Aronson Security Group (ASG) a provider of risk, resilience and security solutions within the emerging Security Risk Management Services (SRMS) industry. Aronson is heavily invested in a legacy of value for the industry by hosting an executive leadership forum called The Great Conversation, by participating in the International Security Management Association (ISMA) and by leading his company to the next generation of security services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • How Do You Measure Success?

    How Do You Measure Success?

    See More
  • Phil Aronson

    Why Do We Need a Great Conversation in Security?

    See More
  • The Corner Office

    Do Security Vendors Have Solutions Looking for Problems?

    See More

Related Products

See More Products
  • Security of Information and Communication Networks

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

See More Products

Events

View AllSubmit An Event
  • May 22, 2025

    Proactive Crisis Communication

    ON DEMAND: Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing