This week our company president and founder, Cole Smith, traveled to Chicago to attend the Global Security Exchange (GSX) 2019 Conference. It combined aspects of a trade show and educational opportunities from professionals who came from all around the nation.
It is also a mecca for networking opportunities. Almost everyone in attendance has dedicated a large portion of their lives to the security of their fellow human beings, in one way or another. This kind of atmosphere provides people and companies like us to brainstorm and connect with other top industry players. This helps everyone involved to learn from each other and to come up with innovative ways to adapt their business to better meet the situations it is faced with.
While this conference had a large mix of classes and product sales, according to event organizers, this event was slightly more product focused.
Both at this conference and at the active shooter training seminar that we all went to several weeks ago at the Utah State Capitol, a lot of focus was drawn toward examining some of the strengths and weaknesses of access control systems.
While being able to instantly lock or unlock your doors at the push of a button can be a fantastic thing, it is not without its faults. When developing security protocols, it is vital to look ahead to the positive and negative possible outcomes resulting from different investments you might be looking at. The risk/reward in any kind of security investment must be taken into consideration. Access control can be a fantastic system, but like anything else, it can not be the only thing you do to secure your facility.
If you google the definition of the word, “system,” it says, “A set of things working together as a part of a mechanism or an interconnecting network.”
This is exactly what your security system needs to be. It needs to be a series of measures taken that are all able to integrate and work together to bring the best results. As the definition says, your security needs to be “A set of things working together as a part of a mechanism or an interconnecting network.” They all need to be connected and they need to work well together.
It is in this area that we devote a lot of time in our development or DIR-S.
Often, when you are trying to incorporate a new security measure to your existing system, it is common to run into difficulties in their integration. This can be a large block in getting the best systems integrated with each other, and we go to great lengths to ensure that DIR-S is able to integrate seamlessly with whatever programs and protocols our clients might have.
Events like this seminar that went on this week in Chicago are so beneficial for so many reasons. We are grateful for those who organized the event, for those who presented their products and services, and for those who taught classes.