At the beginning of the decade, a glut of physical security management technologies flooded the market, purporting to reorient the industry away from its traditional command and control focus. While some of those solutions did, in fact, yield tangible benefits, the consensus today is that protective security technologies have a long way to go to ensure maximal security, in a timely manner, for people and physical assets. In particular, overwhelmingly hardware-intensive physical security management equipment still dominates the field. And those tools have largely proven unable to keep up with the physical security threat as it’s evolved.
Indeed, the physical security threat has never been more mobile. Why? Because the workforce has never been more mobile and mobile-reliant: just witness the unprecedented number of mobile devices that IT organizations and other security officials must now secure against loss or theft.i Those devices don’t just count as physical assets, either; they also store important informational assets, including valuable intellectual property. That’s why it’s so concerning that organizations must manage so many devices without the right security tools. For reference, research reveals that 14 percent of IT officials manage 5,000 or more mobile devices.