Fill in the form below and we will contact you shortly to organised your personalised demonstration of the Noggin platform.
An integrated resilience workspace that seamlessly integrates 10 core solutions into one, easy-to-use software platform.
The world's leading integrated resilience workspace for risk and business continuity management, operational resilience, incident & crisis management, and security & safety operations.
Explore Noggin's integrated resilience software, purpose-built for any industry.
Security Management Software
Updated July 05, 2023
At the beginning of the decade, a glut of physical security management technologies flooded the market, purporting to reorient the industry away from its traditional command and control focus. While some of those solutions did, in fact, yield tangible benefits, the consensus today is that protective security technologies have a long way to go to ensure maximal security, in a timely manner, for people and physical assets. In particular, overwhelmingly hardware-intensive physical security management equipment still dominates the field. And those tools have largely proven unable to keep up with the physical security threat as it’s evolved.
Indeed, the physical security threat has never been more mobile. Why? Because the workforce has never been more mobile and mobile-reliant: just witness the unprecedented number of mobile devices that IT organizations and other security officials must now secure against loss or thefti. Those devices don’t just count as physical assets, either; they also store important informational assets, including valuable intellectual property. That’s why it’s so concerning that organizations must manage so many devices without the right security tools. For reference, research reveals that 14 percent of IT officials manage 5,000 or more mobile devicesii.
When probed, security managers will acknowledge the enormous challenge they face, as their company’s security risk profile has only deteriorated in the age of mobile. For instance, a staggering 70 percent of corporate security, employee safety, physical plant security, IT security, and business continuity management leaders state that workplace risk is risingiii. Leaders also confess that their organizations are unprepared to deal with common security threats, especially workplace violence, environmental incidents, and active shooter incidents:
Those numbers are hardly surprising. People and their devices, as well as structures, buildings, sites, vehicles, and equipment are some of the easiest targets for malicious actors. What’s more, the physical security and facilities staff charged with protecting those assets often lack vital technical support.
How so? Adoption rates of mobile safety and security apps, in particular, remain strikingly low: just north of 40 percentv. Further, survey data shows a stark gap between what facilities management professionals want and their current information system practicesvi. Facilities managers prioritize finding, capturing, storing, and retrieving information, as well as providing collaborative information access to multiple parties. But they are largely stymied by manual processes and inadequate systems: only 40 percent of facilities management information is stored electronically. The majority continue to use spreadsheets, shared drives, even filing cabinets.
In consequence, facilities and security professionals don’t get access to the right information when they need it most. A paltry ten percent of facilities managers can locate information quickly; and more than half usually take over ten minutes to retrieve information.
Alarming, indeed. While smaller physical incidents, like mobile device theft and insider threats, might not register in the C-suite, security officials know all too well that those smaller-scale incidents point to profound stresses in the corporate security apparatusvii. The tools and practices that constitute that apparatus, precisely because not mobile optimized, are simply unable to deal with the physical security threat as it stands today.
Not just a problem for less mature physical security outfits, we’ve seen more advanced security operations organizations run up against the challenges of ensuring efficient, cost-effective protective security in the age of mobile, as well. Companies have gone the extra mile to build robust Security Operations Centers (SOCs) – facilities that house organized, highly-skilled security teams, equipped with sophisticated technology and well-honed processes – to improve their operational security
posture via centralized platforms for detecting and reacting to security incidentsviii.
The benefit of consolidating security expertise and reporting into one centralized location, which an SOC encourages, is pretty clear. SOCs receive physical security data from the field to furnish a real-time picture of security threats and vulnerabilities. This centralizing approach cuts down on some of the security siloing characteristic of security incident management in large enterprises. Instead, we see SOCs delivering gains in visibility and increases in security incident situational awareness. Also, when it comes to physical security incidents, SOCs help communicate to and interface with other parties in the business who need to be on high alert if a breach does occur, e.g. Legal and PR.
But SOCs aren’t without their own challenges. Adoption rates remain low, around 48 percentix, because of the start-up costs involved; and those expenditures go on top of the usually high cost of outfitting field operatives with expensive hardware. Plus, SOCs aren’t just born mobile ready. Teams must make a proactive investment in a security solution with the pop-up mobile capabilities they need to respond to all security threats quickly and stand up operations easily. What will it take? Read our checklist to find out.
Finally, company assets, be they human, physical, and cyber-physical, still remain incredibly vulnerable to a wide array of high-impact, physical security threats, mobile risks which ripen into security incidents that staggering levels of material damage. For instance, employee theft alone costs U.S. businesses $50 billion annuallyxii.
And while smaller physical security incidents (think mobile device theft) might not concern senior leaders, those incidents indicate that existing security tools, systems, and practices are insufficient to deal with mobile security threats. What’s needed, instead: mobile protective security software, managed in a unified incident and risk management platform that gives teams all the information and tools they need to scale up quickly and effectively manage all security incidents, threats, and operations.
i.
ii. David Gilbert, Insights by Samsung: Corporate Security Is More Important Than Ever for Enterprises. Available at https://insights.samsung.com/2016/10/11/corporate-security-is-more-important-than-ever-for-enterprises/.
iii. Rave Mobile Safety: Trends in Corporate Security: Survey of Corporate Security Managers Conducted in 2017. Available at https://www.ravemobilesafety.com/hubfs/downloads/Trends_in_Corporate_Security.pdf.
iv. Ibid
v. Ibid.
vi. Carl Terrantroy, Oracle: How to Solve Your Top Five Facilities Management Challenges. Available at https://blogs.oracle.com/construction-engineering/facilities-management-challenges-solutions.
vii. Diane Ritchey, Security Magazine: Insider Threat: Why Physical Security Still Reigns. Available at https://www.securitymagazine.com/articles/88959-insider-threat-why-physical-security-still-reigns.
viii. Renaud Bidou: Security Operation Center Concepts & Implementation. Available at https://pdfs.semanticscholar.org/1ffa/f58ab9379b1d3ef11d18091fc08df777481b.pdf
ix. EY: Cybersecurity regained: preparing to face cyber attacks: 20th Global Information Security Survey 2017-18. Available at https://www.ey.com/Publication/vwLUAssets/GISS_report_2017/%24FILE/REPORT%20-%20EY%20GISS%20Survey%202017-18.pdf.
x. Steve Hunt, CSO: Physical security information management [PSIM]: The basics. Available at https://www.csoonline.com/article/2126002/physicalsecurity-information-management--psim---the-basics.html.
xi. Marko Cabric: Corporate Security Management: Challenges, Risks, and Strategies. Available at https://books.google.com/ books?id=xUGnBQAAQBAJ&printsec=frontcover&source=gbs_ViewAPI#v=onepage&q&f=false.
xii. Elaine Pofeldt, CNBC: This crime in the workplace is costing US businesses $50 billion a year. Available at https://www.cnbc.com/2017/09/12/workplace-crime-costs-us-businesses-50-billion-a-year.html.