Asset Protection Technology

CCTV, access control, RFID and IR technologies all enhance the new picture of asset protection.


Either way, if the laptop is reported stolen from your workplace, you can conduct a quick search of your access control system to determine when it left the building and have a video recording of the person carrying it.

This asset protection covers the items being taken out of your facility. Remember, in the case of computers, technology is available to be loaded on each unit that will identify the location of a stolen computer if connected to the Internet. Remember to evaluate the systems available for this purpose. If the thief is not interested in the software on your computer but just the hardware, he or she might reformat the hard drive, erasing all software and possibly your Internet security tracking feature at the same time. Look for packages that would not be removed if the stolen hard drive were reformatted.

The technology for asset security has grown remarkably in the last 10 years. As Vikram Raghupathy of ILI Technology, LLC mentioned in a recent presentation, we always tell our clients not to jump on any new technology until they have determined how it will work with existing security systems and how it might be adapted for future needs. Look at the needs for the whole environment. Raghupathy told of visiting client sites where he had observed multiple RF and IR receivers in a single room tacking different assets or staff. This proliferation of systems results from different departments or entities within an organization each purchasing their own system to meet their particular needs. They thus end up with many types of systems serving numerous needs, each of which has to be administered separately. One well-thought-out system would have handled everyone's needs at a lower cost.

I also would recommend never being the guinea pig for new technology. Before you buy, make sure you have a consultant with experience with the system. If you like to handle projects in-house, at least ask the vendor to provide you the names and numbers of other clients who are using the technology in the same configuration. Take the time to check with those clients to make sure they are happy with the technology and to find out what rough roads they may have traveled to get the systems off the ground. These few phone calls may give you a higher comfort level when it comes time to sign on the doted line.

Richard D. (Rich) Maurer is an associate managing director of the Security Services Group of Kroll Inc., where he manages teams responsible for conducting risk and security assessments of facilities worldwide. He has more than 30 years of law enforcement and security management experience. Rich is the Chairman of the ASIS International Physical Security Council and gives workshops across the nation on the aspects of balanced physical security. Rich can be reached at 212-833-3239 or at rmaurer@krollworldwide.com .