Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityTop Guard and Security Officer CompaniesSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingAccess ManagementPhysical SecurityCybersecurity News

Mobile and IoT Devices: Enabling Remote Access

By Steven Turney
Office building
February 21, 2019

As many industries adopt IoT solutions for increased security, reduced costs and new opportunities, the buildings industry is looking to do the same by incorporating IoT and mobile functionality into a range of facilities, including around building security systems. For a growing number of today’s security executives, understanding how to use new IoT-connected tools is now an important part of your job.

By properly understanding how to use these powerful tools, you can become far more efficient and effective than ever before. One of the most powerful examples of this is the use of remote monitoring tools – through remote monitoring, you can access all of your building’s security systems including video monitoring, intrusion detection and visitor management through mobile devices. Moving beyond the control room, security teams can stay visible throughout the entire facility while also monitoring real time information through devices connected to the cloud-enabled services. Security staff can make clearer decisions and provide faster responses by accessing this information at any time, from any place. And as security management tools continue to develop, you and your integrators need to be aware of how changing building security management, and how this affects your future.

The changing building management landscape

The International Facility Management Association (IFMA) estimates that with active controls and IoT-enabled technology, facilities can expect a 50 percent increase in cost efficiency, including energy, maintenance and other recurring costs. Providing facilities with IoT capabilities allows building managers to implement predictive maintenance and analytics technology, allowing facilities to save up to 20 percent per year on maintenance and energy costs. The use of IoT devices and services helps create intelligent buildings that minimize energy use, optimize the performance and lifespan of physical assets, and ensure the safety, security, and efficiency of the electrical system itself and of building tenants. And this is fast becoming a reality. For example, Navigant Research has predicted that the total number of smart devices in buildings has the potential to reach as many as 10 billion as soon as 2020.

As the use of cloud and IoT-enabled devices continues to grow, it is becoming more commonplace for you to have mobile devices connected to your building’s systems. As multiple industries integrate mobile devices into their daily workflows, giving more opportunities for the benefits of remote access to be realized, it is likely that mobile tools with remote access will become an increasingly important part of building security and management, as security teams consistently use their devices to monitor various aspects of their building to ensure their occupants’ safety.

Getting IoT Ready

Before integrating mobile or remote devices into everyday operations, you will need to ensure the proper steps have been taken to maximize operational efficiency. Whether for a large multi-national entity or a medium-sized business, you can deliver significant transformation to your security systems by implementing IoT enabled technology. Before fully implementing IoT into their workdays, you should take into account:

  1. Testing out the use of IoT: Before totally revamping a system to include IoT capabilities, organizations should start by taking small steps. For example, this could include employing a pilot project that focuses on a specific facet of the security system, such as video surveillance. However, keep in mind that this and other systems need to have end-to-end configurability.
  2. Build a solid plan: Outline the specific goals that the organization hopes to accomplish through an IoT-leveraged building management system through measurable achievements.
  3. Include all key stakeholders in the decision: Planning out IoT integration should involve all of a facility’s stakeholders to determine how and why the integration would be meaningful to them. The stakeholders should establish their own separate goals and objectives that align with the values and mission of the organization, in addition to evaluating ROI. After outlining the specific goals, you should collaborate with contractors and vendors to produce an effective implementation strategy.
  4. Technology integration and interoperability: Building managers should integrate IoT platforms holistically yet with a safe degree of separation. If the integration is siloed, systems may remain disparate despite the incorporation of IoT. The devices and systems must also be scalable, adaptable, and easy to integrate. Organizations may need to expand these systems in the future as new technologies emerge with more features and capabilities to consider.
  5. Intelligent data analysis: Advances in technology based systems can aggregate, filter, and translate large amounts of data, providing managers with actionable insights. As such, facilities managers and other employees need the proper training to both assess and analyze the data to make smart decisions.

Protecting buildings against outside threats: practical steps

In order to become IoT ready, it is also critical that IT teams implement IoT-based cybersecurity solutions, such as the use of dual authentication and encryption to protect communications between mobile devices, controllers, and workstations.

You are not alone in the effort to ensure that IoT-enabled systems for buildings are protected. This effort is being taken extremely seriously across the wider industry, and as IoT-connected building management systems become more popular, new standards and protocols are being implemented to ensure cybersecurity is maintained and managed across each system connected to mobile applications. For example, system manufacturers are incorporating threat modeling, secure code practices and extensive testing to ensure that their teams are following best practices. End users are providing security training to team members and even application developers to ensure system users are complying with company rules.  In addition, many of you are also beginning to dedicate specific staff to cybersecurity teams to help provide installation services, maintenance and support with incidents or vulnerabilities.

As attacks become more common and sophisticated, businesses need to keep up to date with the latest solutions as hackers continue to familiarize themselves with existing security solutions and work around them. Evolving processes and procedures with changing security needs will be vital to ensuring facility success. Network managers should also plan to continually train staff to ensure cybersecurity systems and protocols continue to evolve and are continually updated and followed across the organization.

Looking ahead

The digital transformation of multiple industries, including the facilities industry, is creating a need for the adoption of IoT and mobile technology into everyday practices. Incorporating mobile devices into daily workflows has increased productivity among facility staff by enabling remote work, and new levels of efficiency and effectiveness for your security staff. As part of this, your vendors need to be cognizant of how this will affect the growing need for cloud solutions to include components that enable easy, quick and efficient access to databases and security systems from the palm of a security professional’s hand.

Prior to implementing IoT-enabled platforms, ensure that you have the proper ability to do so by undergoing a thorough planning and testing process, including employing pilot programs and assessing the goals of each stakeholder. By having the tools to work from anywhere at any time, buildings can be more secure than ever.

 

 

 

KEYWORDS: facility security Internet of Things mobile security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steven turney headshot

Steven Turney has been with Schneider Electric’s security line of business for over 17 years and is responsible for developing security strategies within Schneider Electric’s North American Buildings business. He is an active member of ASIS International and has worked within the security industry for more than 20 years. Steven’s expertise includes developing security solutions that mitigate risks and building a successful sales organization.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Using IoT security devices to get more value at your enterprise

    If IoT devices are being cyber-certified, why aren’t mobile applications?

    See More
  • internet of things

    Australian government releases best practices on securing IoT devices

    See More
  • Security newswire default

    Research Says One in 10 IoT Devices Offer Adequate Security

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!