Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

4 ways to assess which enterprise IoT safety platforms make sense

Enterprises are facing a host of security risks, from active shooter and lone wolf attacks that threaten innocent employees to natural disasters that decimate buildings and supply chains. Expanding into new markets can also be a risky proposition, especially in areas where political and social upheavals are happening. Fortunately, in spite of all the hazards, IoT technology is emerging as a powerful way to mitigate risk and protect personnel.

Remember the key fobs of days gone by that were designed to limit access to buildings and required a constantly changing code? Today, smart cameras can recognize people who are authorized to enter a building and keep out those who aren’t. Security cameras that run 24/7 can also automatically flag suspicious activity, meaning a security guard no longer has to constantly monitor multiple video streams in hopes of catching a culprit. Guarding against outside threats is only the beginning, though.

Inside your building, IoT smoke and carbon monoxide detectors can send notifications to personnel in the building in addition to conventional alarms. That way, they know where the threat is occurring and can avoid it on the way out.

IoT devices are revolutionizing safety. But before you rush out and buy an armful of them, follow these steps to get the most value for your money and ensure your people are as protected as possible from the threats that matter most:

1. Complete a threat assessment

Even the biggest enterprises lack unlimited budgets. To make the most of every dollar, start by preparing for the events that are most likely to occur on your campus. Use these assessments periodically, but be sure to comply with regulations locally and in your industry. Then, prioritize the threats that would have the biggest impact. For example, if you’re located on or near an active fault line, an earthquake might be one of your most pressing concerns. Start here, and then prepare for other less immediate threats as the resources become available to you.

2. Map threats to potential solutions

Prioritize systems by ranking their value. First, determine how effectively each one solves the problem at hand. Then, look at the time and money required to implement them. Start with the platform that provides the most value in the least amount of time because it will let you minimize exposure while you pursue other more time-consuming risk mitigation strategies.

3. Look for platforms that are tailored to the enterprise environment

Just because IoT devices and apps offer peace of mind for certain places and circumstances, it doesn’t mean they’re legitimate for an enterprise. For instance, devices in a home might not necessarily operate smoothly or effectively for a campus. Notifying lots of employees in a large building takes enterprise-grade devices, so think about and research which platforms are best for your needs.

4. Ensure IoT systems meld with your existing security

Implementing IoT platforms can be complicated, so plan ahead to find a system that’s compatible with the security measures you already rely on. Great IoT products that you can’t integrate with other security features aren’t useful in the long run, so limit your search to products offering a high degree of interoperability.

IoT devices have come a long way, and they’re bringing extra layers of safety and security to enterprise campuses around the world. Legacy systems can’t compete with the constant connectivity offered by IoT, which can revolutionize areas like access control or perimeter surveillance. For almost any threat, rely on IoT to create a safer and more secure workplace for you and your employees.

All IoT Agenda network contributors are responsible for the content and accuracy of their posts. Opinions are of the writers and do not necessarily convey the thoughts of IoT Agenda.

CIO
Security
Networking
Data Center
Data Management
Close