Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesEducation:University

3 Key Capabilities for Corporate Campus Mass Notification and Alert Systems

By Daniel Graff-Radford
campus-enews
September 26, 2017

Emergency mass notification services (EMNS) don’t tend to garner a lot of attention – except when man-made events or natural disasters, such as severe weather, earthquakes, floods, cybersecurity breaches, terrorist or active shooter incidents occur and cause interruptions in critical business activities. Gartner estimates that the unplanned downtime caused by these types of events can cost organizations as much as $5,600 per minute, which makes access to information and the guidance needed to restore operations and protect employees incredibly valuable.

 

For businesses with corporate campuses of any size or location, communicating effectively with employees, vendors and visitors during any of these events can be very complex. Depending on the size of the campus or the total number of locations impacted, there may be the need to notify and inform hundreds, thousands, or even hundreds of thousands of individuals. At other times the event may be much more geographically concentrated to a single campus or building, limiting the scope of the notification to a much smaller group of employees or individuals.  

 

In addition to the complexity created by the size of the audience, emergency management personnel must be able to address the form factor preferences of each audience member. Gone are the days of sending a single email, as audience members have individual preferences ranging from text to email and phone calls to pre-recorded voicemail messages. Organizations can’t dictate how individuals should choose to communicate or respond, but rather must assess the mediums used by employees across corporate campuses, and enable these individuals to set their preferred communications medium, whether it’s email, text message, voice or even social media. Planning for these events also allows differentiation of messages for different people, i.e. the communications team can be brought together for one purpose and the security team for another.   

 

For executives already leveraging mass notification systems for IT alerting or just evaluating available solutions, three key capabilities are worth considering:

 

Reliable Two-Way Communication

Ensuring employee safety and continuity of operations is difficult to achieve by simply pushing out alerts. Business and security decision-makers need a way to ensure the delivery of real-time, mission critical notifications in any message format needed, as well as a method for individuals to “respond” back to an alert in order to deepen event context when possible.

 

Two-way notification is a necessary capability for IT and security administrators seeking to gather receipt confirmations and feedback on how individuals are responding to those alerts. With this information in hand, decision-makers can better determine when to share more information, adjust the recipient group, initiate a quick conference call with key stakeholders or continue to gather information.

 

Automated Notification

Ultimately, businesses want to ensure the safety and security of any individual at one of their facilities, while shortening the time between the occurrence of emergency events or incidents impacting business continuity such as a network outage, and the resolution of that incident. This requires removing as many manual steps as possible by automating alerts based on predefined rules and event triggers.

 

IT incident management alerts and escalations is a prime example of where automation proves valuable. While manual notification solutions can assist in the process, IT personnel typically don’t have the time to identify an incident, then manually launch and monitor responses from a notification solution. When events happen, automated alerts are sent to the appropriate groupings of individuals, taking into account whether they are on duty, on call or out of office, letting recipients quickly fix problems before they cause downtime or delays and ultimately delivering a recognizable return on investment by reducing response time for IT incidents.

 

Ultimately, this type of notification enablement follows the same principles of planning for messages about general business interruptions or crisis communication. A process for messaging must be defined that identifies who should get the notification, what the message should say, when should it be delivered and, importantly, when escalation might be required.

 

The IT incident might require the definition of unique groups and different messages. Obviously the IT resources that have responsibility for resolution must be notified, but information must also be provided for IT management and stakeholders (employees, customers, suppliers, etc.) who have a need to know about the incident. And each incident and the criticality or severity of that incident might require a different definition of these groups for notification and the timing for those notifications.

 

Geo-Targeting

Businesses with highly distributed corporate campuses are going to find situations when alerts need to be directed to a specific area ranging from a building, to the entire campus, or even multiple campuses worldwide, to ensure only those recipients are notified.

Geo-targeting is often considered for emergency response or law enforcement organizations seeking to alert citizens in defined geographic areas about various threats and incidents, but it is a capability that can be leveraged by enterprises as well – particularly those with employees spread across a large geographic area or multiple locations.

Through combining speed and relevancy, organizations can help increase employee adoption rates and use of notification systems and ultimately ensure that alerts effectively reach, inform and positively impact your organization.

KEYWORDS: alert systems corporate campus security mass notification security management security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Daniel Graff-Radford is Chief Product Officer at OnSolve.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • UCFstadium_edu

    UCF Protects Campus with Integrated and Redundant Mass Notification System

    See More
  • business continuity responsive default

    Report Highlights Growth of Mass Notification Systems

    See More
  • Product Spotlight: New Intercoms and Mass Notification Systems - January, 2018 - Security Magazine

    Product Spotlight: New Intercoms and Mass Notification Systems

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products

Events

View AllSubmit An Event
  • March 26, 2025

    Boost Emergency Preparedness: Mastering Mass Notification in Healthcare

    ON DEMAND: In today’s rapidly changing healthcare environment, reliable and timely communication during emergencies is crucial. A well-implemented Mass Notification System (MNS) can differentiate between chaos and control during critical natural disasters, medical emergencies, or security threats.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!