Sorry, but the version of Internet Explorer you are using is not supported. Please click here to upgrade your browser.
Tap to Call

Author: Joe Oliveri, Vice President, General Manager, Security, Johnson Controls’ Building Technologies & Solutions, North America
Published: Thu, Jan 4, 2018


2017 was a very eventful and an overall good year for the physical security market. New avenues of success for end users, integrators and manufacturers have reinforced the need for robust, integrated physical security technology. More specifically, the Internet of Things has enabled a wide array of devices and systems to be interconnected to create more comprehensive security solutions. This shift has verified the need for end users to invest in security programs that integrate multiple technologies, such as video surveillance and access control, for a multi-layered technology approach.

Looking ahead into 2018, integrated systems will continue to be implemented, helping to improve operations for end users. One key area where we expect these technologies will take flight this year is improved guest management systems. Upgrades to these offerings will help elevate security practices to a more efficient level in business offices, hospitals, schools and other facilities.

Visitors have always presented unknown challenges for security in facilities with a continuous flow of people. For example, today, large office buildings typically have a security checkpoint in the lobby with a visitor badge set up to gather guests’ information before allowing them entry. However, this out dated check-in system is not effective from a security standpoint. Not only does this system not allow enough time to collect the most useful information from the visitor, but the time security personnel spend gathering information would also be more efficiently spent monitoring the facility or tending to a potential threat. Additionally, once the check-in process is over, the only way security can truly monitor all of the visitor’s activity is by keeping a continuous eye on the video surveillance.

To help move away from this guest management inefficiency, next-generation technologies will enable a smarter check-in process. Rather than waiting to set up a visitor’s badge upon arrival, guests will be able to enter in their credentials and check-in at their leisure, prior to their visit. The profile they create is then connected to the cloud where the facility reviews their information and either approves or denies access. Using their registered cellphone as an access point and the information provided, the guest will then only have entry to areas within the building where they are doing business, helping to keep security measures in place. This process reduces downtime, granting security the ability to track visitors long after the checkpoint and ensures certain areas of the facility are restricted if needed.

As smarter, connected security solutions become available, the need for a single-source integrator will become increasingly more important. From complex planning and layout to installation and system integration, end users want a partner who can support all components of a security program and oversee end-to-end solutions. At Johnson Controls, we’re committed to providing solutions and strategies that help our customers run their businesses in the most effective and secure way as possible, and we look forward to implementing even more innovative solutions in 2018.

What other technologies do you think we will see become more efficient this year? Please share them with me in the comments.  


Leave a Reply

Your email address will not be published. Required fields are marked *

An error occurred processing the form. Please try again later.

Copyright © Tyco Integrated Security LLC ("Tyco") - All Rights Reserved. Legal Disclaimer - Some of the individuals posting to this site, including the moderators, work for Tyco. Opinions expressed here and in any corresponding comments are the personal opinions of the original authors, not of Tyco. The content is provided for informational purposes only and is not meant to be an endorsement or representation by Tyco or any other party. Use of this website and all contributions are subject to Tyco’s Social Media Engagement Terms of Use and Privacy Policy. This site is available to the public. No information you consider confidential should be posted to this site. By posting you agree to be solely responsible for the content of all information you contribute, link to, or otherwise upload to the Website and release Tyco from any liability related to your use of the Website. You also grant to Tyco a worldwide, perpetual, irrevocable, royalty-free and fully-paid, transferable (including rights to sublicense) right to exercise all copyright, publicity, and moral rights with respect to any original content you provide. The comments are moderated. Comments will appear as soon as they are approved by the moderator.

Close