Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Sponsored By
AMAROK
Physical Security
300px amarok logo
AMAROK
AMAROK provides full-perimeter security solutions, including electric fencing, to stop crime before it happens. Our turnkey systems deter theft with physical, shock, and alarm layers - backed by expert service and support.

        

Integrating Technology and Physical Security to Advance Duty of Care

By Mark Landry, Contributing Writer
Duty of Care

Nattawit Khomsanit | Shutterstock.com

December 23, 2024

In an era where workplace environments are constantly evolving, organizations face a profound responsibility to uphold their duty of care—ensuring the safety and well-being of their employees wherever they may be. This duty goes beyond providing a secure office space; it demands a comprehensive approach that integrates physical security measures with advanced technology to address risks in both digital and real-world settings.  

By embracing innovative tools and strategies, businesses can foster a culture of protection, adaptability, and trust that supports their employees in on-site, remote, and travel scenarios alike. 


Enhance Access Control Systems

Modern access control solutions, such as biometric scanners, smart ID cards, and mobile app-based systems, bolster physical security by restricting unauthorized access to sensitive areas. These tools also provide real-time monitoring of who is entering and leaving a facility, enhancing accountability and situational awareness. They also allow for management across multiple sites – ideal for larger enterprises where user permissions may vary, and reports need to be seamless. Finally, in the case of employee termination, credentials can be updated immediately.  Be keenly aware that older access control credentials/badges can be easily be cloned and hacked with off-the-shelf hardware.  If your credentials aren’t properly encrypted, you may have gaping vulnerabilities to your access control plan. 


Surveillance and Monitoring Technologies

Advanced surveillance systems equipped with edge analytics offer more than just video recording. Features such as motion detection, facial recognition, characteristic labeling and behavior analysis can identify potential threats in near real time, enabling organizations to respond swiftly and proactively to mitigate risks before they become a danger. 


Employee Safety Apps

A number of businesses are implementing mobile safety applications to provide employees with direct access to emergency assistance, panic buttons, or location tracking when traveling or working in high-risk areas. These apps often integrate with central security teams, ensuring immediate responses to incidents when necessary. 


Emergency Response Systems

We have come a long way from simple fire alarm systems that have been commercially pervasive for years.  Now, businesses have access to advanced alarm and response systems that integrated mass communication tools, mobile phone integration, networked office phone integrations and more.  These solutions ensure employees receive timely and clear instructions during various modern crises. Whether it’s an evacuation due to severe weather alert, workplace violence incidents, or serious lock-down incidents, these systems are crucial for minimizing harm and confusion. 


Workplace Design for Safety

Organizations can incorporate principles of Crime Prevention Through Environmental Design (CPTED) to create safer physical environments. This involves strategic use of lighting, natural surveillance, and secure facility layouts that deter potential threats and provide employees with a sense of safety and security. 


Proactive Risk Assessments with Technology

Technology-driven risk assessment tools allow organizations to conduct regular and detailed evaluations of physical vulnerabilities. By using AI and machine learning to analyze historical data and identify trends, businesses can prioritize improvements, such as installing additional security cameras or reinforcing perimeters, to address emerging threats.  The risk assessments shouldn’t solely focus on your on-prem risks.  It is a business’ duty of care to understand the risk around them as well.  Other risks to consider, business density in the area, real and perceived criminal activity in the area, proximity to local law enforcement resources, proximity to local highways and interstates as well as vagrant and homelessness within close proximity.  Also, evaluate “hidden risks” that linger that aren’t always obvious, but contribute to social instability.  Things like poverty levels, unemployment levels, abandoned or unoccupied businesses within proximity. 


Training on Physical Security Awareness

Comprehensive training programs that include physical security awareness can empower employees to recognize and report potential threats. Teaching employees how to identify and report suspicious behavior, respond to alarms, and safely evacuate a facility during emergencies ensures they are active participants in their own safety. 

By integrating advanced physical security measures with broader duty of care initiatives, organizations demonstrate a comprehensive approach to protecting their employees. This not only helps mitigate risks but also builds trust, loyalty, and confidence within the workforce—key components of a thriving and resilient organization. 


Conclusion

By integrating advanced physical security measures with broader duty of care initiatives, organizations demonstrate a commitment to their employees’ safety that extends far beyond the workplace. This holistic approach not only mitigates risks but fosters trust, loyalty, and confidence—key components of a resilient workforce and a thriving organization. In today’s interconnected world, combining technology with physical security isn’t just about protection; it’s about empowering businesses to adapt, innovate, and lead with care.

KEYWORDS: duty of care integrated security solutions

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Landry headshot background

Mark Landry has spent 25 years in the security industry. He spent 20 years at FedEx in the investigations organization, with his last 7 years at the Corporate Strategic Security Organization. Under his leadership, he developed enterprise-level solutions to evaluate, develop and test new security technologies to mitigate constricting manpower resources. This organization was paramount in bringing security analytics, robotics and automation to protect the people, assets and brand of FedEx. Mark received the prestigious FedEx Five Star award during his tenure and achieved Expert level for Quality Driven Management. He also served as the Senior Director of Global Security Transformation at CEVA Logistics. He was responsible for all strategic security initiatives, including developing standards, evolving enterprise risk metrics, retrofitting existing and developing new technology. He is currently a National Accounts Director at AMAROK.  In this role, he specializes in perimeter security initiatives across the transportation sector.  He is also leading AMAROK’s efforts to leverage diverse variables to better visualize risk for AMAROK customers. Bio image courtesy of Landry 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service


Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Perimeter security

    Why Property Security is the New Competitive Advantage

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing