Existing Software versus the GuardChecker Service:
Unlike the others, GuardChecker makes it easy for any authorized user to modify setup criteria or review reports on any computer, anywhere, to improve security performance.
Almost all existing guard software provides only standard set of report that tells you every check the Guard made. What they don’t tell you is:
- What checks were not make
- How long were the intervals between checks? Were they too short to be believable or too long to be acceptable?
- When did the first check begin? When did the last one take place?
As a Security Manager, it is probably more important to know what did not happen, rather than the routine happenings. This knowledge helps to improve performance.
This type of reporting is commonly called “exception” reporting and GuardChecker’s flexible report writer makes it easy is for us to adapt an exception report that meets your performance needs. Of course, we do have all the collection information and we can also provide a complete report of all security activities if that is needed as well.
Guard hours? How long were they actually there? What was billed?
Normally security guards have prescribed arrival and departure times. By using the unique Guard identifier, e.g., iButton, and the sigh in/out protocol, GuardChecker can very easily tell you when the Guard (s), by name and date and time arrived and departed. Our adaptable report writer can also produce a report in the same format as the Security provider’s invoice to permit and easy comparison between on-site hours and billed hours.
Take full advantage of the human security guard!
A particularly powerful device that takes advantage of the flexible, human Security Guard is GuardChecker’s Message Pad (MP).

The Client selects those activities that important to their business. Email alerts can be sent to designated users for activities designated as critical, immediately after they are transferred to the data base.
During set up, GuardChecker permits each Client to identify those important events, sometimes critical events that they would like the guard to report on if encountered during their tour of duty. (Sometimes these important events get entered in the Log; sometimes they don’t. Sometimes those logs reach the right person in time to take necessary action; sometimes they do not.)
The Message Pad makes it easy to record the event with a precise date and time, and then associate it with both a location and the specific Guard making it. This permits your guard to create an Activity Log with the following characteristics:
- Dates and times are exact and actual
- Legible
- Doesn’t get lost in “in boxes”
- Always retrievable
There is no limit to the number of potential non-routine events a client may enter. They could range from reporting accidents and disturbances, spotting maintenance and safety issues (water leak, broken windows, etc.) to non routine actions (unexpectedly opening or closing a gate or door), to periodically counting and identifying out of compliance items such as fire extinguishers. The MP can also alert you to calls the Guard needed to make during his tour of duty. The MP also permits the guard to actually count or enter a specific number associated with the event. (Click here for more details on the Message pad.) (Go to the Tags menu item.)
Properly planned and used the Message Pad can be a useful, cost effective tool both for reporting and recording a Client’s important activities - essentially a web accessible activity log.
Monitor all the facilities where you have security guards!
Rather than being limited to a single facility at a single location (and sometimes a single computer) GuardChecker is specifically designed to have unlimited organizational scalability. It is easy to integrate multiple local organizations into a region then further integrate regions into a national security network. By being web based it is even possible to create a worldwide reporting operation. (Click here for an Overview.) (Go to the Overview menu item.)
Security Director’s Dream - This unlimited scalability combined with GuardChecker’s powerful report writer capability gives the Director the ability to review and analyze all his security entities on a consistent basis. It is possible to sort, compare, and analyze, based on any time frame or collected variable.
IT Support – Can’t live with it; can’t live without it!
Companies’ IT burdens, along with the associated expenses, continue to grow unabated. In addition to the absolute growth, there a continuing growth in the variety of IT needs. It is difficult for any company’s IT shop to adequately resource for all the demands.
Because GuardChecker is Software as a Service (SaaS) type of business, the IT burden is truly minimal. In reality, we serve as your IT department for anything associated with GuardChecker. If you have collection device issues; changing report needs; web connectivity issues; etc; we are there to quickly and cost effectively resolve them. You don’t have the frustration of trying to get changes approved, much less executed, by an overworked IT staff. Clearly we know the technology and we are focused on you. In this case we can truly do it faster, better, and less expensively than your guys.
Confirm these advantages by reviewing the major ASIS paper, Cloud Computing and Software as a Service (SaaS), published in February 2010. A copy is available on their web site.
Hardware – Not exclusive to any Media or Brand

Barcode Scanner replacing broken watchclock device

Pulsestar reading an iButton at an entrance

iBR reading a an iButton in a parking lot

Centor device demonstrating its ruggedness
Barcode Scanner replacing broken watchclock device Pulsestar reading an iButton at an entrance iBR reading a an iButton in a parking lot Centor device demonstrating its ruggedness
The photos show some of the hardware we have already adapted to the GuardChecker software. We will continue to add to this array based on market demands. Bottom line - We are not tied to any particular brand or media. We are committed to finding the most cost effective hardware for your unique situation. It may even mean mixing and matching and we can do that too.
By far, the most common media for security applications is iButton technology. Even then, there is a wide variety in price and reliability issues for iButton readers and downloaders. We continue to search the world for the most cost effective hardware solutions. While market hype is intense, we focus on life cycle costs associated with each client’s operating environment. We will offer recommendations, but the choice is yours.
Occasionally hardware will fail. Guards tend to be rough on the equipment. When that happens we have worked out arrangements with our recommended suppliers to rapidly get you a new item; quickly assess the reason for failure; and determine if a financial settlement is required. If you accept our recommended the hardware, those failures should be minimal.
Your history is secure, but readily available, anytime!
Periodically Security issues arise requiring a review of historical information, either by location, a guard, a particular date and time, etc. Commonly that means trying to pull out the old logs; trying to download and print all the single day reports; or just trying to remember what happened. All these are time consuming and generally miss the mark.
With GuardChecker all that information is readily available regardless of when or where the issue occurred. While you may need our help to quickly sort through your entire security data base, you can find an answer quickly and completely. It has date/time, location, the specific guard, and frequently many other pieces if the Message Pad was used.



