Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalTechnologies & SolutionsNew Security TechnologySecurity ServicesSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceFire & Life SafetyPhysical Security

Product Spotlight

Product spotlight on pandemic management and contact tracing solutions

Security magazine spotlights solutions that aid enterprises in their efforts to mitigate COVID-19 risk, including disinfecting robots, employee wellness checks and more.

By Madeline Lauver
product spotlight
March 14, 2022
Battery Operated Barrier

battery operated productControls Access at COVID-19 Checkpoints


Battery Operated Barrier’s Heavy Utility Gate aims to aid security leaders in setting up COVID-19 checkpoints at schools, colleges, hospitals and businesses throughout the U.S. The security gate is solar-powered and can be deployed in various locations for short- or long-term use without external power. The battery-operated gate has numerous additional options, such as radio control, ultra-high frequency readers and keypad/keycard exit wands. The heavy-duty security gates come with adjustable steel leveling pads, a reflective tower and gate arm, urethane coating, security loops and an enclosed battery box. Image courtesy of Battery Operated Barrier

Find out more at www.batteryoperatedbarrier.com


Blackline Safety

blackline safetyIdentifies High-Risk Exposure Areas and Monitors Contact


Blackline Safety’s cloud-enabled G7 wearable safety devices detect gas leaks, falls and other health events in business environments. They can also be used for contact tracing purposes or to determine how often workers travel through high-risk areas. The devices operate on available cellular, with optional satellite connectivity. Workers are alerted to emergencies to facilitate streamlined evacuation and emergency response procedures, and if workers themselves are harmed or injured, their location is pinpointed for use by emergency responders. G7 wearables are backed by cloud-based software solutions to enable centralized safety monitoring from internet-connected devices. Image courtesy of Blackline Safety

Find out more at www.blacklinesafety.com


Boschbosch

Monitors Safe Social Distancing Capacities


Bosch’s Intelligent Insights include a software widget update that can support safe social distancing. Intelligent Insights is an Artificial Intelligence of Things video software solution that combines the connectivity of physical products with the application of artificial intelligence. The Area fill level traffic light widget offers a graphical interface that can help users comply with social distancing regulations. The widget visualizes the current and maximum number of people allowed in a particular area at a specific time, illustrating three different states — normal, serious and critical — along with corresponding information, aiming to alert security professionals when safe limits are reached. Image courtesy of Bosch

Find out more at www.boschsecurity.com


Everbridge

wellnes check

Manages Employee Wellness Checks


Everbridge’s COVID-19 Return to Work software solution maintains real-time risk intelligence that tracks aspects of the COVID-19 pandemic, including virus hotspots, travel restrictions, quarantines, states of emergency, production stoppages and resumptions, and civil unrest. The Return to Work solution aims to quicken contact tracing efforts by providing an automated approach to tracking an individual’s exposure to the virus at work by integrating calendaring applications, corporate travel itineraries, building access control and visitor management. The solution can create a channel for employees to complete wellness checks, which can be used to determine candidates prepared to return to work. Image courtesy of Everbridge

Find out more at www.everbridge.com


Infrared Cameras Incorporated

EverbridgeDetects Body Temperature Abnormalities


The Biorisk Cloud Platform combines infrared technology and a cloud-based data management solution to aid organizations across industries report and manage biorisks such as COVID-19. The Infrared Cameras Incorporated (ICI) platform streams data from thermal cameras to ICI’s cloud platform to identify biorisk patterns and threats before they cause operational issues like facility closures or shuttering of distribution centers. The cloud platform, supported by Amazon Web Services, can be integrated into an organization’s current business intelligence and operational platforms. Image courtesy of ICI

Find out more at www.infraredcameras.com


Invixium

Infrared Cameras Incorporated

Reduces Contact Through Biometric Access Control


Invixium has integrated with AEOS by Nedap to deploy biometric capabilities in access control systems and reduce touchpoints at entries and exits. Access control administrators can enroll biometric data to cardholders that are continuously synchronized with AEOS. The touchless facial recognition solution aims to limit exposure to COVID-19 by reducing contact between users and operators. Image courtesy of Invixium

Find out more at www.invixium.com


OhmniLabs

InvixiumSanitizes High-Touch Areas Without Human Contact


OhmniClean is an autonomous robot that disinfects utilizing the power of UV-C light. Intended for use in hospitals, schools, hotels and other environments requiring deep cleaning in high-touch, hard-to-reach places, OhmniClean aims to eliminate the risk of bacteria and viral transmission and can help disinfect a 3,000-square-foot space. The robot has motion sensors, remote switches and a safety system to help ensure teams are safe when working with UV light. Detailed cleaning reports are also available to verify and monitor the effectiveness of cleaning sessions. Image courtesy of OhmniLabs

Find out more at www.ohmnilabs.com


TruyoOhmniLabs

Tracks Employee Testing and Vaccination Status


Health-Check Management from Truyo and Egnyte can collect and maintain employee COVID-related information in accordance with emergency regulations. The software automates the collection of employee vaccination status and testing results and maintains personal health information in a secure environment to facilitate privacy compliance. Health-Check Management aims to set levels of access and restrict access to sensitive medical information and produce reports on the state of organizational COVID-19 testing or vaccination rates. Image courtesy of Truyo

Find out more at www.healthcheckmanagement.com



KEYWORDS: access control artificial intelligence (AI) enterprise security ISC West traffic monitoring

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Madeline Lauver is a former Editor in Chief at Security magazine. Within her role at Security, Lauver focused on news articles, web exclusives, features and several departments for Security’s monthly digital edition, as well as managing social media and multimedia content.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • product-spotlight

    Product spotlight on identity management solutions

    See More
  • healthcare product spotlight

    Product spotlight on healthcare solutions

    See More
  • product-spotlight

    Product spotlight on mass notification solutions

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!