Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSecurity Leadership and Management

IoT, Robots and ROI: Asset Tracking Industry

Security makes asset tracking a core business function.

By Adam Stone
SEC0719-Asset-Feat-slide1_900px
SEC0719-Asset-slide2_900px

“When we produce a product, we are responsible for that product until it gets to the consumer,” says Bhavesh Patel, Senior Director, Security Services & Technology.

Photo courtesy of Bhavesh Patel.

SEC0719-Asset-slide3_900px

Co-founder of Art Guard, Bill Anderson says he would love to use GPS to track stolen artworks, but the batteries are simply too big.

Photo courtesy of Bill Anderson

SEC0719-Asset-slide4_900px

“A back-door to front-door system is very expensive. The tags themselves might be $1.25 and you need thousands and thousands of them,” says Senior Asset Protection Manager, Alan Greggo, CPP, CFE.

Photo courtesy of Alan Greggo.

SEC0719-Asset-slide5_900px

“Without a doubt technology is the driver behind a broad array of asset tracking solutions,” says Ty Richmond, President of Integrated Security Solutions and Technology for Allied Universal.

SEC0719-Asset-slide6_900px

“A robot can work 24/7, it never takes a break, it’s always ready to work, whereas a guard can call in sick,” says Brett Morrison, head of Global Security Solutions. 

SEC0719-Asset-Feat-slide1_900px
SEC0719-Asset-slide2_900px
SEC0719-Asset-slide3_900px
SEC0719-Asset-slide4_900px
SEC0719-Asset-slide5_900px
SEC0719-Asset-slide6_900px
July 11, 2019

Asset tracking is a critical security function at bio-pharma company Sanofi.

“When we produce a product, we are responsible for that product until it gets to the consumer,” says Bhavesh Patel, Senior Director, Security Services & Technology.  “If we can’t track it, we have to dispose of that product, because we don’t know if it was tampered with.”

Across a wide spectrum of industries, security professionals leverage a range of tools and best practices to keep track of products and people. While technology is changing the game, asset tracking requires a delicate balancing act. How can enterprise security maintain transparency across assets, without breaking the bank?

Flawed Tools

The basic tools of asset tracking have been stable for some time. Enterprise security executives will use GPS to track people, vehicles and shipments of goods over big distances. They’ll turn to RFID chips and scanners for managing warehouses and controlling inventories. But these basic tools can be tricky to implement. Even as the price of RFID chips falls, the cost of a widespread deployment still can be prohibitive.

GPS has its limits, too. At security provider Art Guard, co-founder Bill Anderson says he would love to use GPS to track stolen artworks, but the batteries are simply too big. The tracking device “would be easily recognizable and just ripped off the piece. If by some chance it evaded detection, the batteries would die in about 90 minutes,” he says.

Given the limitations, enterprise security professionals often will tread a fine line. RFID would be great for tracking inventory, but it's too pricey. “A back-door to front-door system is very expensive. The tags themselves might be $1.25 and you need thousands and thousands of them,” says Senior Asset Protection Manager, Alan Greggo, CPP, CFE.

He’d like to be able to depend on GPS as shipments make their way through potential hot spots, but that’s also problematic. “In Mexico there’s a big issue where there are more truck hijackings, or drivers will park their trucks and offload some stuff on the side. You need to know where your trucks are at all times to ensure that merchandise doesn’t just disappear,” he says. But GPS alone doesn’t cut it. “If the truck driver is working with the thieves, they can either remove the GPS or find a way to block it, to jam the signal.”

Greggo often goes manual: He’ll tether product in stores, securing pricey devices in place and put tamper-proof locks on the trucks. Given the limitations, some security experts say they are looking to the IT community to deliver better solutions.

Emerging Tech

“Without a doubt technology is the driver behind a broad array of asset tracking solutions,” says Ty Richmond, president of Integrated Security Solutions and Technology for Allied Universal. He points to the rise of IoT, the Internet of Things, as one major trend shaping asset tracking. Smart-chip enabled devices can be leveraged to share geospatial information, and emerging 5G communications networks will make information more readily available to the security community.

 “Tracking is all about connectivity and speed of communication, so 5G technology is going to escalate the usability and scalability of all of this,” he says. In the past, “you did have some control, but you had major vulnerabilities and gaps and you had to use many manual resources. It was very expensive and time consuming. IoT will enable us to track location with a high degree of accuracy.”

Along those same lines, some are looking to robotics and automation as emerging capabilities in the asset-tracking arena. Brett Morrison served for a decade as Senior Director Asset Protection and Security – International at Walmart. He now heads up Global Security Solutions in Bentonville, Arkansas. He envisions robotics as a potential boon in settings where assets are frequently being checked in or out.

“You can have an unmanned robot take the place of a guard who has to check out that item. A robot can work 24/7, it never takes a break, it’s always ready to work, whereas a guard can call in sick,” he says.

Tracking ROI

The discussion starts with a consideration of risk versus value: What is the asset worth, and what would it cost to track it?

At digital security firm Agio, Associate Director of Cybersecurity Compliance Deana Fuller helps hospitals and other healthcare organizations track their stuff. There are always trade-offs, she said.

“You are not going to walk out the door with an IV stand, but you could try to make off with a wheelchair. We have done penetration testing and we’ve been able to walk away with a laptop from the nurse’s station, and then you lose not just the laptop but all personal data. What’s on that laptop and what can somebody do with it? That’s part of how you determine your tracking strategies,” she says.

Morrison has leveraged RFID for big items. “When you have high-value items, you want to know where it’s at and who has it. Then ROI is more easily justified. It’s part of your business model based on the risk of losing that item.”

From a business perspective, that risk assessment suggests that in some cases, security needs to be tracking not just the location of an item, but also how it is being used. At Mastercard, Deputy Chief Information Security Officer Shelbi Rombout uses sophisticated analytics to track the ways in which IT assets, including phones and laptops are put to use: Who’s logging in, from where, to do what? Behavioral tracking forms a key part of asset management within the IT security ecosystem. “By ensuring each user has the right access, you help to protect the entire environment,” Rombout says.

Looking across a range of industries, it’s possible to see how asset tracking brings security front and center in conversations about business processes.

“Say you have a construction company that wants to track high-value tools, to ensure they get to the proper person on site. They have to ask themselves: Is my construction site working on time and under budget because the tools are getting there on time? If not, where is the lag? Would tracking insight help to close that gap?” says Booz Allen Hamilton VP Andy Linn.

“On the retail side or in a warehouse, protection starts with knowing where it is. Then you have to have a plan to back that up, you have to know how you will take action or respond to that alert in real time,” Linn says.

That’s really the final piece of the asset tracking puzzle. Say you’ve identified the right tracking tool and justified the ROI. You’ve aligned the tracking program with the business need. What’s left for security to do? Mostly it’s policies and procedures.

Security executives need to consider the legal implications of their tracking programs. “Different courts would give you different answers,” says Mike Overly, an attorney with Foley & Lardner. At a minimum, “you need to disclose to people that their location is being tracked and what that information is being used for. ”

For security leaders, this suggests a new and emerging role that takes asset tracking well beyond the task of mere inventory management. It requires input from IT, from business line leaders, from legal counsel and others.

“Security is part of an enterprise-wide collaborative process,” Richmond says. “We talk about enterprise risk management, the sharing of information, the commonality of systems and process. In asset tracking, we are seeing the value in that growing every day.”

KEYWORDS: asset tracking Internet of Things (IoT) return on investment robot

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Adam Stone is a contributing writer for Security magazine. He has covered IT issues in the public and private sectors for more than 20 years. In addition to following security trends, he writes on military technology, education-tech, government IT and diverse others issues.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1018-note-Feat-slide1_900px

    Automation, IoT Enhance Mass Notifications

    See More
  • Asset tracking protection for loss prevention

    Reliable asset tracking: The importance of IoT, battery life and location accuracy

    See More
  • SEC0221-Hosp-Feat-slide1_900px

    Hospitality security adjusts to COVID-19 constraints

    See More

Events

View AllSubmit An Event
  • September 19, 2012

    Oil & Gas Critical Infrastructure & Asset Security Forum 2012

    The Forum will cover security issues related to both offshore and onshore oil and gas arising out of civil unrest, terrorist activities, and a competitive global market.
View AllSubmit An Event
×
“When we produce a product, we are responsible for that product until it gets to the consumer,” says Bhavesh Patel, Senior Director, Security Services & Technology. Photo courtesy of Bhavesh Patel.
Co-founder of Art Guard, Bill Anderson says he would love to use GPS to track stolen artworks, but the batteries are simply too big. Photo courtesy of Bill Anderson
“A back-door to front-door system is very expensive. The tags themselves might be $1.25 and you need thousands and thousands of them,” says Senior Asset Protection Manager, Alan Greggo, CPP, CFE. Photo courtesy of Alan Greggo.
“Without a doubt technology is the driver behind a broad array of asset tracking solutions,” says Ty Richmond, President of Integrated Security Solutions and Technology for Allied Universal.
“A robot can work 24/7, it never takes a break, it’s always ready to work, whereas a guard can call in sick,” says Brett Morrison, head of Global Security Solutions. 

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!