Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalTechnologies & SolutionsSecurity Leadership and ManagementSecurity & Business ResiliencePhysical SecurityVideo SurveillanceTransportation/Logistics/Supply Chain/Distribution/ Warehousing

Improving worker safety and security on the plant floor

By Bryan Christiansen
factory worker
January 21, 2022

When we talk about the use of technology in factories, the bulk of the conversation is on the operational advantages brought about by technology. The efficiency of operations, cost advantages and waste reduction are often highlighted. But the introduction of technology in factories brings forward many benefits besides the operational ones. Security of premises and worker safety are two areas where technology has a big impact but is often overlooked.

The impact of technology on plant security and safety

Manufacturing plants need to secure their physical premises, machinery and other capital goods. Unauthorized access and pilferage have to be avoided. Another area of concern would be the protection of intellectual property. Implementing security in an analog way is a daunting and expensive task. Conventional methods are not capable of delivering adequate security even with higher costs.

Modern technology can assist businesses in securing valuables on the plant floor. The advantage of using digital technologies is that they are scalable and easy to implement at a low cost. Aside from advantages for security, modern technology improves worker safety.

Improvements for worker safety could be achieved by making standard operating procedures (SOP) and checklists available to employees in easy to access way (usually using handheld display devices or overhead display devices) and by ensuring regular and proper plant maintenance with the help of CMMS. This eliminates the chances of equipment failures causing damage to employees.

Surveillance

Surveillance is required to ensure the physical security of the plant and its premises. Earlier, this was fulfilled with security guards on-premises. Later, CCTV technology increased the scale of video surveillance by requiring less staff for monitoring and incident handling.

Modern deep learning solutions further automate video surveillance, reducing the manpower and energy required to perform surveillance duties. This technology is supported by an industry shift — it is estimated that the global video surveillance market will increase by about $30 billion by 2025.

Ensuring adherence to OSHA standards and practices with automated monitoring undoubtedly helps with worker safety as well. 

Access control

All employees and personnel visiting the plant need not have access to every part of the plant; there will be areas in the facility that necessitate restricted access. Access to those areas has to be given to a selected cohort of employees and managers. Earlier, access control was achieved with physical barriers guarded by security personnel to limit access.

With technology, access control can be algorithmically coded and implemented without security personnel. The safes, doors, gates and other means of access can be automatically locked and unlocked, restricting unauthorized access. With ingeniously coded programs and artificial intelligence, dynamic modification of access control is also possible, making it more flexible and fluid according to current requirements.

Access control positively impacts worker safety because employees or other parties without proper credentials could be automatically denied access, preventing a potential safety incident. Digital technologies can also be used to deny access to employees not adhering to recommended safety practices.

Authentication

Once access control strategies are in place, security professionals must prioritize authentication to know who has and does not have authority to access different zone. Historically, security leaders implemented this with identity cards and badges. With technology such as biometric authentication, these physical authentication peripherals are not needed. The identity of authorized individuals can be verified with biometric data, such as fingerprints, facial or voice recognition or iris scans.

These authentication methods can be used standalone or in combination, according to the level of security required.

Cybersecurity

With additional technology being adopted in factory operations, the chances of cyberattacks are increased. Many malicious cyberattacks can be used to debilitate plant equipment and devices. Data exfiltration is also a huge challenge in plants that need to protect sensitive information. Technology is, again, the solution for problems introduced by technology. Implementing firewalls and secure network devices and following cybersecurity best practices is the way to protect assets from cyberattacks.

All of this has an indirect impact on worker safety. By securing network technology against potential cyberattacks, security professionals leave less room for a safety incident.

Technology has a wide-ranging, positive impact on manufacturing plants and their operations. The most obvious improvements are in increasing efficiency and reducing waste, however, technology is also beneficial in improving plant security and worker safety. Security leaders can implement solutions at a large scale and a minimal cost. The functionalities and capabilities technology can provide for manufacturing security teams are unbounded. More improvements in technology are expected in the future, improving technology and further reducing cost. It is high time for manufacturing facilities to use technology to improve security and worker safety on the plant floor.

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: access control authentication biometric authentication cyber security identity (ID) management manufacturing security warehouse security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bryan Christiansen is the Founder and CEO of Limble CMMS. Limble is a mobile CMMS software that takes the stress and chaos out of maintenance by helping managers organize, automate and streamline their maintenance operations.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • From the Front Door to the Plant Floor

    See More
  • Surveillance, video wall

    Improving situational awareness via video content analytics is the key to business safety and compliance for COVID-19

    See More
  • doctor in hospital

    OSHA highlights healthcare worker safety on National Caregivers Day

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing