Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementTechnologies & SolutionsNew Security TechnologySecurity ServicesSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business Resilience

Product Spotlight

Security technology: Mobile security solutions

By Maria Henriquez
Product Spotlight
October 14, 2022

In an increasingly mobile and remote workplace, mobile security solutions can help organizations become more proactive by managing, identifying and responding to security threats from the palm of their hand.

Security magazine highlights mobile security solutions, including video surveillance, access control, lone worker protection, healthcare safety, emergency response and more.


Arcules

Centralized Security Management of All Locationssmart phone

 Arcules Unified Cloud Security Platform, a Video Surveillance as a Service (VSaaS) platform, is available via a mobile app. From the app, users can view security cameras, monitor live video and play footage from any device. Whether working from home, on vacation or away from the office, users can get notified of security events, from doors left open to environmental issues, and act on potential security incidents. Users can customize settings to receive notifications for important events and tap to view alarm events from a push, SMS or email notification; access personal and shared camera views; and view cameras by location. Image courtesy of Arcules

Find out more at www.arcules.com


Avigilon

Remotely Connect to Video Surveillance Feeds

AvigilonACC Mobile 3 extends Avigilon Control Center (ACC) video management software to mobile devices, allowing security professionals to monitor ACC systems and respond to incidents from any location with network connectivity. The ACC Mobile 3 app provides remote access to cloud-connected ACC sites, alleviating the need for firewall configuration. With the ACC Mobile 3 app, users can sign in for access to an organization’s cloud-connected sites; view live or recorded video; stream live or recorded HD video; receive push alarm notifications to detect, verify and act on events such as motion or video analytic rule triggers; and review recorded video using the recorded video timeline. Image courtesy of Avigilon

Find out more at www.avigilon.com


Brivo

Keyless Entry With Mobile Access Control

BrivoThe Brivo Mobile Pass provides tenants, employees, residents and guests with an easy way to unlock connected doors. Property managers can use Brivo mobile access control management to grant necessary access and control the property. The app utilizes device biometrics like fingerprint and facial recognition for additional security. In addition, users can customize a health questionnaire to monitor and record the health of visitors before they enter the facility. The app features Brivo Onair Management, which allows users to remotely control access, assign and remove credentials, view access events, and lock and unlock doors. Image courtesy of Brivo

Find out more at www.brivo.com


Cobalt Robotics

Enterprise Mobile Video Chat for RobotsCobalt

Cobalt Robotics’ enterprise mobile video chat allows enterprises to connect staff and visitors with a live employee from the organization or security team, or a backup from Cobalt’s Command Center. Each robot has a screen for communication between remote security specialists and people onsite. The Robotics as a Service solution includes more than 60 sensors, including day-night cameras, 360-degree cameras, thermal cameras, depth cameras, light detection and ranging (LIDAR), and badge reading capabilities. Over time, the autonomous patrolling robot can help organizations facilitate data collection throughout a facility to help get insights into security, safety and facility trends. Using machine learning, semantic mapping and novelty detection, the robot can identify and flag security-relevant anomalies such as people, sounds, motion, open doors and windows, and missing assets. Image courtesy of Cobalt Robotics

Find out more at www.cobaltrobotics.com


EVERYWHERE Communications

Helps With Remote Worker Safety and Duty of CareEverywhere

EVERYWHERE Communications’ software check-in capabilities can help monitor remote personnel who are in and out of cell coverage. Scheduled Check-ins give administrators the ability to tailor check-ins on an hourly, daily, weekly or monthly basis to address the unique needs of remote personnel and help simplify the duty of care process. Remote Check-ins allow personnel to create their own check-in recurrence directly when paired with a Garmin inReach device with EVERYWHERE software. If an unexpected situation occurs while outside cellular coverage, remote personnel can feel confident that their safety is being monitored even if they miss a check-in; initiate a new check-in schedule; or send a “not safe” report that triggers an alert and multi-channel notifications via SMS, email and automated voice call. Image courtesy of EVERYWHERE Communications

Find out more at www.everywherecomms.com


Interface Security Systems

Offers Personal Protection Monitoring ServicesInterface

Interface Security Systems’ expanded suite of Personal Protection Monitoring services uses active radio frequency identification (RFID) tags from GuardRFID to protect infants from abduction, prevent mother/infant mismatches, and monitor memory care patients in healthcare environments. The expanded suite includes an infant security system for newborn infants in birthing centers and hospitals to prevent abductions and accidental pairing of the infant with the wrong parent and a management system for patients in hospitals, behavioral health facilities and memory care centers. The solution is deployed with GuardRFID’s RFID active tags and locating systems and integrated with onsite alarm systems and video cameras to provide alarm management and video verification of alarm events. The solution can be used to protect at-risk lone and mobile workers in retail, restaurant and hospitality brands. Image courtesy of Interface Security Systems

Find out more at www.interfacesystems.com


LenelS2

Access Control and Video From Mobile DevicesLenel

LenelS2’s Mobile Security Professional is an app for iOS and Android devices that allows both management and staff to operate access control and video management systems from anywhere. Users can switch between separate systems or partitions directly in the app. Mobile Security Professional is administered from a central location, and security actions are displayed at the command center. In addition to delivering live video and event-based video recording from LenelS2 VRx or NetVR cameras, the app allows for sharing of images via email or text message, displays event activity and video of interest, enables momentary unlocking of any door in the system, tracks evacuations, allows for management of multiple mustering points and more. Image courtesy of LenelS2

Find out more at www.lenels2.com


Resolver, a Kroll Business

Bolsters Security Operations Management

Resolver


Resolver’s Command Center combines alarm management, computer-aided dispatch and incident reporting. The application allows users to plot alarms, incidents and guard locations onto real-time maps to see which personnel are available for incidents. Resolver’s Command Center is available on the Resolver Officer Mobile app for iOS and Android and allows security teams to connect dispatchers directly to officers and share dispatch details, locations and standard operating procedures to manage organizational safety. The Officer Mobile app also provides security officers with tools to respond to critical events, follow procedures and document incidents via their mobile devices. Image courtesy of Resolver

Find out more at www.resolver.com


Silvertrac Software

Streamlines Security Officer OperationsSilvertrac

Silvertrac’s security guard management software includes a mobile guard app that guides officers on patrol throughout each shift via digital checkpoints and can be set up across multiple properties through the Issue Monitor. In addition to enabling officers to scan checkpoints using QR codes, barcodes or NFC tags, the app can send instructions to the phone for each hit; log GPS and time-stamp on each scan; show time left before each tour is due; and cross out each checkpoint as it happens. The Issue Monitor gathers scanned checkpoint data from the field and prepares daily activity and incident reports. Image courtesy of Silvertrac Software

Find out more at www.silvertracsoftware.com


Trackforce Valiant

Increases Security Guard Performance and ProtectionTracforce

The Trackforce Valiant Guard Tour app is a configurable solution that enterprises can use to help conduct tours and patrols for security operations. The application, part of Trackforce Valiant’s guard management solution, can provide operational insight into a guard’s tasks during their shift and helps security teams stay focused. As guards conduct tours, for example, they are guided through daily tasks via the app, including post orders, logbook history, checkpoints and shift information. In addition, the app enables lone worker protection with manual panic alarms, true fall detection, phone tilt detection technology to indicate an emergency or requested assistance, and a danger zone timer to indicate a safe amount of time before assistance is required. Image courtesy of Trackforce Valiant

Find out more at www.trackforcevaliant.com


TrackTik

Tracks Frontline Security Teamstracktic

TrackTik Guard Tour is a mobile and web-based software that can connect field personnel to management and clients through a suite of guard management tools and business intelligence modules. The TrackTik Guard Tour module enables users to look at operations and develop a security strategy that maximizes the value delivered to stakeholders. Working with stakeholders, users can identify their most valuable assets and tailor guard tours accordingly. In the app, users can define what happens at each checkpoint for a security officer, including logging, displaying a message, opening a report form, asking exception questions, or triggering incident alerts. The mobile support is compatible with iOS and Android and works using a variety of checkpoint types such as NFC, barcode, QR code, Aztec, GPS and manual check-ins. Image courtesy of TrackTik

Find out more at www.tracktik.com


911inform

Benefits First Responders During Critical Events911

911inform is a notification and emergency management service that provides police dispatch, first responders and key building personnel with bi-directional communication and controls to manage a crisis situation. The app can be implemented across a range of industries, including hotels, malls, schools, hospitals, municipalities and large public spaces. The solution leverages location technology from mobile devices to designate a pre-configured area, or geofence, to alert predefined parties with incident intelligence in the event of an emergency. First responders do not have to download new applications or software on their devices; they can open a one-time access link to launch the event interface. End users can customize and determine how to share data with public safety answering points (PSAPs), private security and/or relevant facilities personnel. Image courtesy of 911inform

Find out more at www.911inform.com


KEYWORDS: emergency response healthcare safety mobile security risk management video surveillance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Product Spotlight on Mobile Security Solutions

    Product spotlight on mobile security solutions

    See More
  • Mass Notification and Emergency Communications products

    Mass notification and emergency communications: Security technology spotlight

    See More
  • SEC0221-ProdSpot-Feat-slide1_900px

    Innovative security solutions on the market

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!