<img alt="" src="https://secure.wine9bond.com/223206.png" style="display:none;">
Skip to content
Request a Demo Log In

2023 Market Report: Visitor & Emergency Management

by iLobby
February 22, 2023

Approaches to visitor and emergency management vary among businesses, as the level of security required can differ depending on the situation.

For instance, visiting the White House demands a much more comprehensive security program than going to a lawyer's office. Moreover, individual companies in the same industry have their own procedures and technologies for managing visitors and emergencies, and different facilities within a company may also have distinct procedures based on the site's sensitivity.

Recognizing this complex situation, iLobby collaborated with ASIS International to conduct a study that evaluates the prevailing practices in visitor and emergency management and their resultant effects.

What is the 2023 Market Report?

In a study of security professionals, iLobby uncovers which practices are most vital to ensuring security readiness, protection from threats and adequate emergency response.

The study begins by establishing a current baseline of security practices in visitor and security management, followed by an analysis of how differing approaches affect confidence and capabilities in important areas such as responding to threats, emergency preparedness, and enacting data security measures.



Short on Time?

Watch the 2023 Market Report Webinar for a highlight reel of the top findings from the comprehensive study, along with live analysis from a security specialist.

WebinarCTALPEsigB_ASISReport copyimg


Who was surveyed?

Over 200 security professionals participated in the study, representing over 20 industries including, but not limited to, manufacturing, oil & gas, government, healthcare, and hospitality. The professionals surveyed represent a wide array of organization sizes, ranging from small 20 person shops, up to 5000+ employee multinational enterprises.




Why Security Professionals Need to Read This Report

You can't rest your facility's safety and security on good faith and fortune. Staying on top of best practices is an important step in maintaining a resilient security program.

1. Strengthen Security Confidence

The tools and processes outlined in this report can greatly reduce the likelihood of a successful insider attack at your organization. Taking proactive measures such as maintaining a digital log of all visitors can help protect your facility and staff from potential harm.

Key Findings:

  1. Companies with remote visitor monitoring capability are more likely to be very confident in their security practices vs companies without remote monitoring capability (31% vs 23%).
  2. Companies that maintain a digital visitor log at all facilities are 2X more likely to feel very confident in their ability to respond to threats compared to those without access to a digital log of on-site personnel (50% vs 24%)
  3. Companies that can digitally communicate with all staff, visitors, and contractors across all facilities during an emergency are 4X more likely to feel very confident in their ability to respond to threats (41% vs 10%).




2. Take Control During Emergency Situations

The market report will show you what tools are helping organizations take control in high-pressure circumstances. Embrace the power of technology and be proactive in emergency preparedness with innovative tools like physical identity & access management, automated headcount, electronic communication, and secure remote access control.

Key Findings:

  1. Almost 50% of companies still manage emergency evacuation and mustering processes through a pen and paper, which likely explains why the vast majority (61%) of companies cannot monitor the live status of staff, visitors, and contractors during an evacuation.
  2. Companies that can view a real-time headcount of all staff, visitors, and contractors across all facilities during an emergency are significantly more likely to feel very confident in their emergency evacuation procedures vs companies with no real-time capabilities (44% vs 14%).
  3. Companies that can communicate directly with all staff, visitors, and contractors across all facilities during an emergency are significantly more likely to feel very confident in their emergency evacuation procedures vs companies with no communication capabilities (47% vs 10%).


Emergency communication challenges


3. Follow Industry Best Practices

In order to ensure the safety of your building and the individuals within it, it's critical to be proactive in implementing industry best practices for emergency and visitor management.

By taking proactive measures, you can be better prepared for any potential threats and have greater peace of mind in knowing that you have done everything possible to protect your building and its occupants.

Key Findings:

  1. The vast majority of companies (72%) are working on or planning projects to implement technology to improve on-site-security.
  2. There are a significant number of companies (48%) that do not have a system or policy to train visitors, contractors, or temp workers on evacuation procedures.
  3. The vast majority of companies (94%) consider employee convenience an important considerations when implementing new security technology or procedures. However, only 44% feel they strike the right balance and employee convenience and the safety and security of their facilities.



Download the Full Report

The 2023 Market Report pulls back the curtain on the state of visitor and emergency management in organizations today, and the key actions that determine success.

Download the report today to remain on the cutting edge of security technology and ensure your business follows industry best practices.



iLobby is the global leader in facility and visitor management for complex enterprises and regulated industries. Deployed across more than 6,000 sites worldwide, iLobby’s FacilityOS platform powers complex work environments by optimizing and automating key facility processes to achieve regulatory compliance, enforce safety protocols, and drive site security requirements.

Related Posts

View All Posts