Skip to main content

COVID-19 Coronavirus: Better Prepared Today for Future Pandemics with Intelligent Risk Scoring

By Blog

Being a human is risky.

We risk our lives every day. And COVID-19 just made everything a little bit riskier. In the future – scratch that – today, we can start to do more with data to actually see these risks with our eyes. Now we can measure and compare it so we don’t overreact, and adjust operations accordingly if we need to prevent any risk from escalating.

Every individual, community and organization has a unique situation. But it is critical that we discuss how each of us can already better prepare for, if not help prevent, the next critical emergency such as a pandemic.

Over the past few socially-distanced weeks, our team thought of a few hypothetical factors for the world to consider as we move from reaction and containment, to prevention. What if our security technologies could report and adjust physical access to a building based on various risk conditions? A few examples include:

  • Number of symptoms experienced per employee
  • Percentage of local infection rate
  • Employees of vulnerable ages
  • Employees with pre-existing conditions
  • Any local employees, visitors, or contractors with reported symptoms
  • If shared, a workspace with any confirmed case

Through various applications and integrations, any or all of these conditions can begin to adjust how your facility grants access and how your security department operates. The following matrix looks at an infectious disease outbreak as an example, but this intelligence and scoring can be automated and applied to virtually any type of risk:

                                                       Infectious Disease Risk Scoring Matrix

coronavirus infectious disease risk_scoring table

It may be a little late for these early stages of COVID-19, but as we battle this as a society, let’s prepare. Let’s take note of what is working – but more importantly, what is not. Let’s ask if our current policies are sufficient for these new challenges. Then ask, “Can my current physical access control system protect against these modern threats?” And finally, “Is it dynamic, empowering me to readily enact these proactive policies?”

This time we are reacting. But next time – next flu season, next Corona, next, next, next whatever – we can make sure we have a plan and the advanced physical security technologies in place to enforce them before infectious disease risks get out of hand. Static access systems in a dynamic threat environment are no longer sufficient. Now is the time to take proactive steps to intelligently manage physical access control permissions, and to minimize damages to the enterprise and our valuable resources.

Helping Hospitals Effectively and Proactively Manage Infectious Diseases With the Right Tools

By Blog

In a matter of several weeks, the coronavirus has hit the world by storm as an exponentially contagious outbreak – officially deemed by the WHO (World Health Organization) to be a pandemic. Some countries outside of China have been struck by the virus in especially greater numbers than others. Italy, South Korea, and Iran are just a few – with cases in the United States rapidly increasing by the day.

An outbreak forcing reevaluation of containment procedures

This pandemic is forcing facilities like hospitals and other critical infrastructures to reevaluate current emergency response and quarantine procedures. Every hospital has certain protocol in place for infectious disease and quarantine management. For example, doctors and nurses are trained to preemptively learn how to identify symptoms of various contagious diseases before they strike the community. Many hospitals also pass out memos alerting workers of new information and updates on specific illnesses to be aware of while working. Regular meetings are often held to discuss current issues and ensure everyone is on the same page with updates on disease information.

But how are hospitals alerting staff of newly discovered infected patients? While every hospital follows different protocol,  the process is generally a cumbersome manual process of reporting patients for quarantine. Nurses check the reports, then proceed to move the infected person into an isolation room via less traffic-heavy routes, minimizing further exposure to the disease.

Making the case for more innovative and effective practices

With an overly manual process in a bustling environment, one can only imagine how difficult it can be to enforce security policy through a sea of contagion and chaos.  And, it’s hard to image how hectic hospitals get when every update is crucial and urgent to the health and safety of not just the patients, but also the employees.

What if there was a solution that would make this process more seamless, organized, and automated? Imagine if a nurse could simply press a button that automated lockdown within certain areas of the hospital when a contagiously infected patient is discovered. This would keep the contagion from spreading to others while allowing the clinician to seamlessly transfer the patient to a contained space or isolation room. And, what if that button were pressed within the hospital’s mobile app, alerting other employees to the infection in real-time and further preventing any virus transfers. Ideally, this solution would allow for a historical record of infectious patient cases for the hospital to easily refer to when needed – including when patients were marked as infected, and in what particular areas of the facility.

ReconaSense’s risk-adaptive access control system is unique in its ability to provide capabilities such as these. It offers countless other use cases where permissions can be changed dynamically and automatically, based on a myriad of predetermined concerning circumstances. During a global crisis like the Coronavirus pandemic where patient and employee health and safety alike are at risk (roughly 4% of cases have occurred in healthcare workers), clinician access to the right tools to contain and prevent disease spread quickly and efficiently is paramount. This is not only necessary for present patient care, but also a preventative and proactive measure for the future.


Preventing an Active Shooter Situation: When Seconds Matter Most

By Blog

Preventing an Active Shooter Situation: When Seconds Matter Most

Active shooter situations have covered the news headlines one too many times as of late. We hear about these tragic incidents occurring in all sorts of public areas – from campuses, to office buildings, to concert venues. These events happen suddenly and without warning – often with fatal results. However, it’s difficult to prevent something from happening that you can’t see coming in the first place. And by “see”, I mean being privy to a potential risk before it turns into anything more.

And when seconds matter most, it’s crucial that the right security protocol be put into place to support and not replace the human in charge, ensuring not a single detail is missed to prevent a future incident. Unfortunately, 60% of security incidents actually end before first responders arrive. While they act as fast as possible to rush over to the scene, it takes first responders 4-8 minutes to arrive to an active shooter situation. And, when it comes to tragic incidents like these that happen in a whirlwind, a lot can happen in a matter of minutes, if not seconds.

A Virginia Beach Mass Shooting That Shouldn’t Have Been

Let’s take a look at some unfortunate but recent events, where a proactive and risk-adaptive physical access control system (PACS) could have helped prevent a tragedy.

According to the Chicago Tribune, when police responded to a deadly mass shooting at a Virginia Beach municipal building in June, they were initially blocked from confronting the gunman at a crucial moment. How did this happen?  They hadn’t been provided with the key cards that would grant them access permissions to the second floor doors enclosing the gunman.

Stopping a Tragedy in Its Tracks

An adaptive physical access control system would know to selectively permit access only to first responders during a crisis providing actionable security alerts in real time, and isolating the gunman by locking them in – limiting further infliction of harm. As for reaching innocent bystanders, first responders would receive access to evacuate them as quickly as possible.

Furthermore, a security officer who spotted a risk via an adaptive PACS like ReconAccess could implement a lockdown procedure for the entire facility with the tap of the wrist via an intuitive mobile app, adjusting permissions to any door and taking effect in real-time. These proactive and risk-adaptive access control system features would allow for first responder mobility, real-time updates on-the-go, and effectively improve life safety outcomes in similar critical situations.

When it comes to protecting innocent lives, door access control should be a preventative obstacle against the perpetrator – not the first responder.





Merging Cybersecurity and Physical Security: ASIS International Survey Findings

By Blog

With the rise of more sophisticated networks and devices accompanying the digital age, cybersecurity’s impact on the physical security industry has become an increasing hot topic as we enter 2020. More large-scale and highly integrated technologies come coupled with increasingly blended threats (also known as “multi-vector threats”) that expose security vulnerabilities within these sophisticated networks and devices.

ASIS International has recently released findings from its survey entitled “The State of Security Convergence” conducted with 1,000 professionals spanning across senior roles in physical security, cybersecurity, disaster management, business continuity, and similar fields. Participants answered from across the United States, Europe, and India, discussing the convergence of 3 areas:

  1. Physical Security
  2. Cybersecurity
  3. Business Continuity Management (BCM)

First off, what exactly does the word “convergence” entail in the security space?

ASIS survey participants define it as: “..getting security/risk management functions to work together seamlessly, closing the gaps and vulnerabilities that exist in the space between functions”.

Findings show that despite hype around the trend of physical security and cybersecurity convergence, only 24% of respondents have actually converged the two functions. However, when including business continuity, 52% have converged two or three of the functions.

Of course, with differing business needs come different ways of organizing security and BCM functions for every enterprise. However, results show that even with multiple models, so long as complete convergence exists among them they can effectively prevent threats coming from all angles – particularly when in a common operating picture.

The report also points out how successful security operations notably align physical security, cybersecurity, and BCM around a single security strategy. Underlying the focused strategy, a strong security leader, open communication and a healthy line of shared information are vital.

In terms of convergence of all 3 areas, for companies that have converged 2 of the 3 areas, 47% have integrated BCM with either their cyber or physical security functions, but only 24% of participants have merged all 3 areas.

All in all, while the topic of cybersecurity and physical security functions remains a hot trend into 2020, enterprises still have progress to make on taking preventative measures to merge the two functions so that more transparency exists across the organization with less security vulnerabilities when faced with a risk.

Organizations can seamlessly converge cybersecurity and physical security with a true unification platform for diverse security data like ReconaSense. By normalizing this disparate data into a common language, enterprises can begin to discover vulnerabilities and inefficiencies that – prior to convergence – were hiding in between the data silos.

The full ASIS Executive Summary of the study “The State of Security Convergence” is available for free on their website. The full report is complimentary for ASIS members and available to purchase for non-members.

How to Reduce Risk and Enhance Life Safety with Next-Generation Physical Access Control

By Blog

The Current Security Risk Landscape

Security professionals know that there are more threats today than ever, and they’re increasingly difficult to manage with existing resources. The ever-evolving risk landscape is also growing in complexity, with threats approaching from multiple angles in multivector attacks – and some threats even coming from inside the organization. 

Security professionals need an ally to do more heavy lifting to support physical security efforts. Thankfully, a new generation of physical access control is stepping up to fill this role by providing integrated, proactive, and risk-adaptive access control that takes a modern approach to all these modern risks.    

Unlike legacy physical access control systems (PACS) that are static and role-based – unable to dynamically change permissions with shifts in the environment – next-generation PACS can actively reduce risk and enhance life safety. Let’s look at a physical security case study to understand how a next-generation solution can help save lives (and prevent a public relations fiasco). 

Case in Point: A Preventable Incident in Birmingham, Alabama

Earlier this year, a chemical spill occurred at the Birmingham Water Works treatment plant, sending over 50 employees and contractors to the hospital. It turns out there were several points of failure where next-generation access control could have intervened to mediate the situation. 

The company reported that the spill happened when sodium hypochlorite was accidentally mixed with ferric sulfate, causing chlorine gas to be released at the plant. A proactive, risk-adaptive PACS would have detected sodium hypochlorite in the area and automatically locked down access to personnel carrying other chemicals that would react with the chemical, creating toxic exposure. This is point of failure one. 

The second point of failure occurred after the chemicals were mixed and chlorine gas spilled into the affected area. In this case, up to 50 people were exposed to the toxic gas! A next-generation PACS would have detected the spill, alerted security operators, and automatically locked down the area to non-essential personnel. This would have limited access only to those with HAZMAT certification and first responders. These measures would have protected the dozens of lives that came into contact with the harmful chemical, and potentially spared Birmingham Water Works the embarrassment and expense associated with medical treatment, legal fees, public communications, and reputation damage control.

Next-generation access control goes beyond the doors to recognize risks early, mitigate threats before they become incidents, and enhance life safety.

To review other risk scenarios and see how legacy PACS compare to the next-generation PACS response to threats in our free eBook, visit 


physical security access control door

The Top 6 Reasons It’s Time to Consider Next-Generation Access Control

By Blog

For many, physical access control systems (PACS) are a box to be checked. While organizations must have a system in place, PACS are rarely on the top of the wishlist. This unfortunately means that funding for physical security projects is marked low priority, leaving these departments understaffed, under-budgeted, and overwhelmed – and this can lead to tragic consequences. Only when a security incident takes place does physical security get a much-needed injection of funding and attention.

There’s a new leader of the PACS
It’s time to rethink access control. This single system can be a key contributor to the overall security of any organization, enhancing life safety, supporting cyber security, and protecting the business’s bottom line. Advances in technology like artificial intelligence, neural networks, and IoT connectivity have helped create the next generation of physical access control, enabling these systems to provide outsized value to organizations – value that legacy access control systems simply cannot match.

The top 6 reasons you should be considering a next-generation PACS
Let’s explore the top six reasons next-generation access control solutions are a critical investment for any organization seeking to modernize their physical security system, build a “smart” facility, or align physical and cyber security. We’ll also briefly look at how a legacy PACS stacks up against these capabilities.

1) Next-gen PACS are integrated
While legacy systems require security professionals to painstakingly review data across multiple disparate inputs, next-generation access control is fully integrated to enhance efficiency and ease of analysis. This means that all inputs are unified into one common language and view, allowing operators to see a comprehensive picture of factors affecting physical security. A single dashboard displays information and alerts for entry control, video, weather, GPS, social media, HR data, building automation, IoT sensors, and more. Finally, a chance to see it all in one place and how each input relates to another.

2) Next-gen PACS are proactive
Legacy PACS can only alert you after a security incident has already occurred. A next-generation system can alert you to potential threats before they become incidents, helping you proactively manage risks and avoid steep costs associated with security breaches. Additionally, a next-generation solution doesn’t require human intervention – it supports you by automatically responding to threats.

3) Next-gen PACS are risk-adaptive
Legacy systems are static and role-based. In this binary system, personnel either do or don’t have permission for entry at any time, under any circumstance. On the other hand, next-generation systems automatically adjust permissions based on changes in roles, user attributes, behavioral trends, and environmental changes. For example, if a gas leak happens in a building sector, the system can dynamically limit access to emergency personnel only, keeping non-critical staff away from harm.

4) Next-gen PACS are intelligent
Legacy systems come as they are – there’s no improvement over time. But next-generation systems use neural networks to learn from data and improve security over time. As the system learns what’s normal and abnormal, it can better support your security protocols and act proactively on your behalf to provide early threat alerts and automatically respond to risks.

5) Next-gen PACS are actionable
Legacy systems leave it up to you when it comes to handling security incidents, but next-generation PACS can provide actionable recommendations for managing security incidents – which may feel like a life-saver in a moment of panic, if not actually helping you to save lives.

6) Next-gen PACS are customizable
Legacy PACS are easiest to use right “out of the box.” Customizations that shape the system to fit your specific needs can be technically difficult to achieve and prohibitively expensive. With a next-generation PACS, programming custom risk-profiles and policies is easy enough for security operators to accomplish by themselves.

Far from flashy new features, these benefits make meaningful enhancements to life safety and streamline your physical security practice, allowing security personnel to focus on other activities of high strategic value.

This infographic summarizes the top six reasons it’s time to consider next-generation access control. Use this as a reminder of the importance of upgrading your PACS from a legacy system and share with stakeholders within your business to make the case for investing in next-generation access control.

To learn more about the need for modern access control, visit or reach out to us directly to request a demo. 

physical security risk dial

From Reactive to Proactive: 2019 State of Physical Security Industry

By Blog

The physical security industry is entering a revolutionary phase that will drive practitioners to rethink what’s possible, redefine goals, and subscribe to new paths toward success.

According to D6 Research, through years of focused improvements, InfoSec has raised visibility and support for security internally by demonstrating measurable risk reduction, business impact, and return on value (ROV).

As a result, they’ve changed the conversations and expectations of their management. Meanwhile, physical security has operated as a silo. While this has traditionally afforded them more autonomy, increasingly it’s becoming a liability. Physical security has failed to overcome perceptions of being a cost center, making it difficult to secure funding and gain executive support for modernization projects.

Join ReconaSense for this eye-opening webinar with Terry Gold, Principal Analyst of D6 Research, as he reveals key findings from the Annual Physical Security Industry Assessment Report. Gold will discuss organizational pressures, limitations of mainstream approaches, and recommendations on how to get ahead of what’s to come.

Attendees will learn:

  • How to achieve and demonstrate a security program’s value
  • How to more effectively measure and validate key contributions
  • Move from a forensic view of security to a proactive and predictive model
  • How ReconaSense is enabling companies to evolve their physical security to a more modern, risk-adaptive infrastructure

About Our Presenters:

Terry Gold is the principal analyst at D6 Research, a vendor neutral analyst firm specializing in the intersection of cyber and physical security, where he drives the research pipeline and methodology.

Clayton Brown is Co-Founder & VP at ReconaSense, helping the next-generation of security practitioners solve issues surrounding data interoperability, access control and AI.


Terry Gold
Principle Analyst, D6 Research

Clayton Brown
Executive Vice President, ReconaSense


Role of AI & Physical Security for Critical Infrastructure

By Blog

Security is undergoing a digital transformation with increasing adoption of intelligent access control, video surveillance and analytics as well as IoT devices and sensors – generating more data than ever before.

For critical infrastructure, harnessing the influx of data properly with AI and a risk-based approach, the data can be leveraged to improve life safety, minimize risk and speed response times in emergency situations.

This webinar is for anyone who is charged with protecting cities, nuclear facilities, airports, hospitals, or any other critical infrastructures.

Join us for this webinar to learn how AI can help you:

  • Gain a unified view of risks across multiple systems, assets and geographically-dispersed infrastructures
  • Improve life safety with smarter access control
  • Get ahead of catastrophic events with proactive security
  • Improve compliance and enforce proper security policies


Clayton Brown
Executive Vice President, ReconaSense

Achieving Proactive Security with Risk-Adaptive Access Control

By Blog

Today’s enterprise faces increasingly sophisticated threats, from both inside and outside the organization. Done properly, physical access control systems (PACS) securely enable the flow of people, business and productivity – while keeping risks at bay and improving life safety. Unfortunately, legacy access control systems cannot keep up with the pace of the digital transformation.

To be effective, modern access control must be integrated, proactive, and dynamic. Whether you’re securing the doors across a single facility or hundreds of access points in a complex new facility, now is the time to modernize your access control strategy with a risk-adaptive approach.

View our on-demand webinar with our very own Executive Vice President, Clayton Brown, to learn how to:

  • Minimize threat impact with risk scoring and security intelligence
  • Detect abnormal access control system activity
  • Adjust access permissions in real time as situations evolve
  • Improve life safety and meet access control compliance requirements
  • Effectively integrate PACS with the rest of your security infrastructure


John C

Clayton Brown
Executive Vice President, ReconaSense

Reconasense. Making Security Intelligent.

Contact us now for a comprehensive demo and see first-hand how we can help make your security smarter and your world safer.

Request a Demo