Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Real-time Security Personnel Monitoring and Management

October 2, 2009

GuardTrax’s new “GT2” enables security firms and corporate security managers to track, monitor and manage security personnel in real-time indoors and out. 

The GT2 Security Force Locator combines GPS and RFID functionality, enabling security personnel to scan specific interior and exterior checkpoint tags as well as facilitate real time location and position monitoring.  

“GT2 overcomes the existing limitations of guard tour wands predominantly used in the security industry that don’t provide real time tracking, reporting or management capabilities over the Internet,” explains Mike Petty, vice president of GuardTrax sales, a product of Intergis, LLC. GT2, with its robust and diverse capabilities gives security firms compelling cost and operational justifications to advance into real time monitoring of security personnel with GuardTrax.” 

“The new GuardTrax device will greatly enhance Metro Protective Agency’s ability to manage its security personnel, since administrators can monitor officers in real-time to identify and correct problems as they occur,” states Aaron Thieriault, operations manager. “It also enables us to reduce management and supervision costs, since fewer personnel are now required.”

CEO and President of Sun City Security Service, Inc., Dave Scepanski, concurs, adding that, “We have already benefitted from this state-of-the-art guard management solution and our clients will greatly benefit from its real-time RFID tracking capabilities.” According to Scepanski,” Prior to using GuardTrax, data from each guard’s tour wand was manually downloaded into the software program only after the shift was completed, and often times not until the next day.    Our guard tour wands frequently crashed and were unreliable since they depended on guards to correctly touch checkpoints to record information.”

Measuring approximately 2.5”x6”, GT2 is slightly larger than the average cell phone and fits comfortably in a horizontal belt holster. Its rugged design, water-resistant case and lithium-poly battery make it a highly functional and durable device, lasting up to 24 hours without re-charge. The durable, ergonomic GT2 provides a number of extremely valuable features enabling security personnel to carry a single device for guard tour and phone communication.

The GT2 has a panic button for instant distress calls and alert notifications to management. Also, security personnel can use GT2 to post activity status updates through a unique set of user input codes allowing supervisors and managers to monitor officer activity on the fly through their mobile phones.   This new generation GuardTrax device is equipped with a motion sensor that will report if the device has remained in a motionless state for a pre-determined time period. The supervisor is immediately alerted if the guard hasn’t moved and can make a phone call to the officer through the GT2.    Each GT2 can call four operation critical telephone numbers (e.g. police, fire, supervisor or client contact).

The new device also has a non-keyed incident alert called the “geo-fence violation.” If the device is taken in or out of a pre-defined area, it then sends a message to the GuardTrax server reporting that the device has entered or exited a defined area. All incidents and events reported through the GT2, after reaching the GuardTrax server can be relayed through SMS or emailed to any number of desired recipients. 

“Regardless of a guards’ location indoors or out, the GT2 provides the visibility you need to successfully manage your personnel and make informed decisions,” said Jeffrey Cohen, CEO of Intergis. “Sleeping guards, abandoned posts and unproductive shifts are effectively eliminated by using the GuardTrax Security Force Locator.”

Share This Story

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing