Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSecurity Enterprise ServicesSecurity Education & Training

Embracing New Alert Technology for More Effective Response

How to embrace alert and notification technology in the age of risk and response.

By Jim Romeo
Embracing New Alert Technology for More Effective Response
From active shooters on campus, to major safety accidents

From active shooters on campus, to major safety accidents, and even traffic and weather alerts, notifications have come to alert masses in only seconds.

Embracing New Alert Technology for More Effective Response
From active shooters on campus, to major safety accidents
April 1, 2017

Cleveland Ohio’s E Prep and Village Prep School has a system that notifies a parent when a student is absent.

But when 14-year-old Alianna DeFreeze boarded a public bus in late January of 2017, the alert system failed to notify her parents. She was found dead four days later.

Such tragic incidents raise concern about the reliability and efficacy of emergency alert notification systems. Such systems are useful and essential for facilities and locations that need to automatically notify anyone about anything important. However, the technology is still maturing and its integration with emergency plans and policies continues to develop.

The Air Force is using such systems to alert Air Force personnel who carry a firearm to arrive armed at their duty station on base. The California Department of Corrections is using an alert system to notify victims of crimes that the offender incarcerated for crimes against them is being released. And Carroll University in Waukesha, Wisconsin, was able to put its campus on lockdown instantly when campus police received a call that a suspicious person was spotted trolling with a firearm.  Mass notification and alert technology is becoming part of the infrastructure of many facilities of all types; its reliability and effectiveness are paramount concerns as this technology develops and becomes widely adopted.


Staying Tuned

It’s important to stay tuned to the capabilities of mass notification and alert technology. You must know how the technology is advancing, what’s new and available, and how such technology can make things go right in notifying persons in a crisis or a routine process.

Overall, a key point to understand about mass notification technology is that basic alerting is not enough, says Guy Miasnik, President, AtHoc, a Division of BlackBerry.  Sending a text message to everyone in a single all employee database only can do so much for an organization. He notes that as we are living in the age of the Enterprise of Things (EoT) that connects and shares information across devices, teams and organizations, a more robust communication solution is required that can securely collect information from many sources and then pass it along efficiently to specific users, improving safety for people and operations and even pass it along to other organizations.

Often the first step in embracing the whole enterprise is to conduct a risk assessment of your facility. According to Imad Mouline of Everbridge, Inc., there is a paradigm shift in the way that the security industry views and approaches mass notification technology. Traditionally, mass notification solutions were designed to support infrequent one-way, “blast” messages. These systems relied on reaching employees and stakeholders based solely on their static home and office locations, and rarely had the capabilities required to quickly and contextually reach anyone on any device, anywhere, at any time.

But as global threats have increased in complexity and unpredictability – from sophisticated cyber incidents to all-to-frequent incidents involving workplace violence and active shooters – enterprise security leaders should, if they haven’t already, embrace new targeted and contextually relevant critical communication solutions.

Realigning Technology

Mass notification and alert solutions have grown in parallel to other technologies. First we became wired; next we become more wireless; now we all carry smartphones – information is literally at our fingertips anyplace, anywhere.

Tragedies, crises and other emergencies, though unfortunate, demonstrate and suggest the high value of alert notification technology. From active shooters on campus, to major safety accidents, and even traffic and weather alerts, notifications have come to alert masses in only seconds.

Technology that makes this all happen in seconds will continue to advance in the years ahead.

And the severity and frequency of critical events and their implications for personal safety or business performance are driving demand for more effective notification solutions. Data from Frost & Sullivan predicts that critical communications software represented a $15.6 billion worldwide market opportunity in 2015.

This potential may derive from the fact that many enterprises still have not notification system or technology at all. Everbridge’s own research (in conjunction with their partner BCI) found that more than 60 percent of businesses are not prepared for location-specific events, such as workplace violence or terrorism; and 65 percent felt that simply locating people who may be in an impacted building was their biggest challenge in a workplace violence or terrorism situation. The report also showed that 29 percent of businesses don’t have emergency crisis communication training and education programs.

Clearly, there is some planning, preparation and training that needs to be done, and organizations should begin by establishing the right incident response policies and workflows, and then deploying the right infrastructure and technology, to gain accountability for their workforce, responders and key stakeholders at all times, says Mouline. This is a great opportunity for a security professional to demonstrate leadership and own this function.

Begin by integrating your critical communication system with your physical access control and network access solutions to ensure a more accurate visualization of their employee locations within a facility. Even better, you can integrate the same system with travel management programs and itineraries to account for global travelers. In the future, by taking these steps, security professionals can make the name “mass notification” virtually immaterial by ensuring that all of their critical communications are anything but “mass,” and instead, are targeted and location-aware.

 

Being Proactive with Alert Notification Systems

Imad Mouline of Everbridge, Inc. urges planning, preparation and training in order for notification strategies and systems to be most effective.

In its research (in partnership with the Business Continuity Institute), The Emergency Communications Report 2016, Everbridge discovered that the majority of organizations have an emergency communication plan, and use it across departments.  However, employees are less likely to be confined to a single physical location – and critical event management plans need to reflect this growing reality. This is in spite of organizations using multiple communication channels to improve the reliability of getting information to employees.

Here are the highlights of their findings:

  • 84 percent of organizations report having an emergency communications plan.

  • Plans are used across departments and the most common triggers for emergency communications are unplanned IT and telecommunication outages (42 percent), power outages (40 percent), adverse weather (39 percent), facilities management incidents (23 percent), cybersecurity incidents (22 percent) and natural disasters (22 percent).

  • One out of three organizations (32 percent) have more than 100 employees who travel internationally.

  • 32 percent of organizations have staff traveling in “high risk” areas of the world.

  • More than 60 percent of businesses are not prepared for location-specific events, such as workplace violence or terrorism.

  • 30 percent of respondents have no communications plan in place to communicate with employees during workplace violence or terrorism.

  • 56 percent lack confidence in their preparation for workplace violence or terrorist incidents, and only 6 percent are “very much prepared.”

  • 65 percent felt that simply locating people who may be in an impacted building was their biggest challenge in a workplace violence or terrorism situation; 76 percent indicated that the ability to communicate with those people and confirm their safety was a major concern.

  • 29 percent do not have emergency/crisis communications training and education programs.

  • 26 percent of organizations said it takes more than 30 minutes to activate their emergency communications plan; 12 percent take an hour or more. Only 24 percent activate their plan in less than five minutes.

  • Of the 16 percent of organizations that do not have an emergency communications plan, 64 percent said they would only consider putting a plan in place after a business-affecting event.

  • More than half of organizations (55 percent) use three or more methods to communicate with employees during an incident. Email and text messaging are the two most common modes; 56 percent said they still use manual call trees.

KEYWORDS: mass notification security alert security risk assessment security risk management threat alerts

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jim Romeo, Contributing Writer

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Hacker in a hoodie

    Why this moment in cybersecurity calls for embracing hackers

    See More
  • security guard freepik

    The fine line of security’s role as a deterrent: How people process and technology influence response

    See More
  • surveillance-room freepik

    Advanced technology applications drive new opportunities for video management systems

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing