Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementSecurity & Business Resilience

Using Technology for COVID-19 Response

By Maggie Shein
avatars-5615501_1920
October 8, 2020

As security professionals around the globe are involved in their organization’s COVID-19 response, many security staff are contemplating how to assess their protocols and procedures, as well as what new protocols and procedures to put in place. Most successful COVID-19 response plans have included a unified response that takes on input from across the organization, assesses risks to business continuity and determines how to safely reopen or continue operations. Initiatives large and small are often the answer and include mixing and matching technology-filled solutions, with practical non-technological solutions.

While technology may be able to help detect mask or maskless staff or visitors, for example, physical barriers, signage and regular communication with employees is imperative to getting the results you want.

So how can security technologies be a part of the overall COVID-19 response for an enterprise and how can security professionals use technology now that will serve them well in the future with continued enterprise risk mitigation?

The first considerations security professionals need to make, according to Jonathan Moore, Vice President Product Management at AMAG Technology, is what your facility needs in order to be safe: do you need to require masks and PPE, do you need to reduce traffic in certain areas, reduce building occupancy, and/or have employees and visitors self-assess their health?

“When it comes to technology, there are a number of analytics that can help with mask detection, social-distancing detection, etc.,” Moore says. Aside from using your video surveillance and video management system to help with detection, using your access control system for COVID-19 response can bring a huge amount of value to an enterprise.

“If you need to control who is coming back to work or who shouldn’t be coming back to work, there is a lot of room for access control systems to help with these Return-to-Work initiatives,” Moore says. Enterprises can tie thermal detection or thermal temperature screening into their access control systems, for example. When an employee or visitor walks through the door, if their temperature is elevated, the access control system can immediately turn off their access credentials, for example.

Another area where enterprises can get value out of access control with COVID-19 response is by enabling mobile credentials. Mobile credentials allow employees to have a touchless experience, and allow security professionals to enable, disable and manage credentials all remotely.

AMAG’s new Symmetry Mobile app allows security teams to set up access control credentials directly to a mobile device, eliminating the need to interact with the security team or go to a badging office, enforcing physical distancing. Companies can even require that employees respond to a questionnaire within the app before their physical or mobile credentials are activated.

If the employee’s answers do not align with your company policies, the employee’s credential can be disabled. Companies can choose how often employees answer the questions; for example, perhaps an enterprise would like an employee to fill out a symptom questionnaire each morning before coming into the office. Such initiatives allow organizations to be proactive about risks, says Moore. “You can implement these procedures to prevent people from coming in unnecessarily and exposing others,” he says.

Mobile credentials also allow the employee to have a contact-free experience with the access control system, swapping their mobile phone as their touchless badge, rather than needing an additional ID badge.

“If certain entrances require a pin at a card reader, you can even have the user enter the pin code or biometric all on their phone so there’s no touching at all,” Moore says.

The other important piece to using access control for COVID-19 response is using the data. There is a breadth of important information garnered from an enterprise’s access control system that can be particularly helpful for COVID-19 response.

“For one thing, access control data allows you to keep track of who is where. You can see how many people are in a building at any time which is very useful for tracking occupancy and even contact tracing in the event that someone gets sick,” Moore says. Building occupancy tracking can allow security professionals to pinpoint particular times of day or areas of a building where there are too many people, allowing them to implement certain protocols or procedures based on that data.

Tools such as Symmetry’s Movement Impact Tool can track an employee or visitor and determine who else was in the same area at the same time as someone known to be infected. This audit trail is critically important because the security team can notify those who have come into contact with the infected person or put protocols in place per their response procedures.

Though this technology and data help with COVID-19 response, many technologies and solutions available at the enterprise level were made to tackle or mitigate other risks and will be just as valuable to organizations in the future, post COVID-19.

For example, the same data used to track building occupancy or help with contact tracing now, can also be used to track insider threats and risky individuals within an organization. If for example, an employee that normally works daytime hours during the week, starts coming into the building on a Sunday night, the employee can be flagged so that security professionals can take a look and see if the changed behavior garners a response.

Adds Moore, “The data has so much value and it’s immensely useful trying to plan for an unusual situation like the pandemic. But, even when the pandemic is long gone, there will definitely be a place in security for these types of technology due to the value they add to an organization.”

KEYWORDS: COVID-19 organizational resilience security integrators security technology security technology strategy

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maggie shein

Maggie Shein was Editor in Chief at Security magazine. She has been writing, editing and creating content for the security industry since 2004. She has an experienced background in publishing, communications, content creation and management. Within her role at Security, Maggie handled the overall direction of the brand, organized and executed the annual conference, facilitated Solutions by Sector webinars, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column. She has both an undergraduate degree and master's degree in journalism.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0521-Covid-ADM_Feat-slide1_900px

    ADM unlocks the power of existing data for COVID-19 response

    See More
  • SEC1220-Access-Feat-slide1_900px

    Managing access in higher education during COVID-19

    See More
  • boeing

    Boeing values information as the backbone to pandemic response

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing