Please enter your email to subscribe. By doing so, you are opting-in to receive news from Guidepost Solutions LLC.
“A Security Management Platform should make it easier for a security team to protect an organizations people and assets.”
Unfortunately, too many security groups struggle with their platform; often compensating perceived shortcomings with manual processes that are inefficient and error-prone. Whether scrubbing and re-formatting system reports or keeping track of loaner badges, many security teams are not leveraging the operational benefit their platforms can provide.
To get the most from a platforms toolkit, the system configuration must be designed, and that design starts with the operation the platform is supporting. A hands-on security technology professional should seek first to understand the mission and goals of the organization. This fundamental understanding, coupled with their knowledge of what the platform can and cannot support, enables the security professional to navigate myriad platform settings to identify and build a supportive and meaningful configuration.
Most individuals that setup a security management platform (which includes visitor management processing) do not consider the various ways all the checkboxes and options in the software setup actually affect the organization and how it operates. It takes a security consultant to recognize how these seemingly unimportant decisions affect the security team’s operational policy and also their potential exposure. Usually these systems are delivered by integrators who sold the software and either delivers them with all the default settings in place, or they focus on what the software CAN do, as opposed to what it SHOULD do to benefit the security team. A security consultant can help the customer step back and consider the strategic requirements of the team and how the seemingly unimportant system settings impact those requirements.
In a security operation, even simple administrative tasks either contribute to or detract from the mission of the organization. The security system platform settings need to match the security protocols your company is looking to achieve.
As an example, we will look at some of the questions that must be answered for processing visitors.
Data collected about our guests:
The data collection process:
The answers to these questions will either be supported or challenged by the details of a platform’s configuration. If the intention behind the process is not supported by the platform, eventually the process will lapse, and data integrity will decline. In this particular example, the data in question happens to be the organization’s official record of outside persons interacting with its people and assets.
An experienced security consulting firm will identify and help answer these questions across all functions of the security operation, and your organization’s priorities will be reflected in the details of your security-supporting technologies. The platform should support your team; not the other way around.