Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementAccess ManagementPhysical Security

5 Minutes With

The future of security and access control for office spaces

By Jordyn Alger, Managing Editor
SEC_Web_5Minutes-Campagnola-0824_1170x658.jpg

Image courtesy of Campagnola 

August 19, 2024

Effective physical security is essential to any brick-and-mortar establishment, but it is even more crucial in the commercial real estate industry. Securing a workplace involves more than simply monitoring the entryway to the building — so how can security leaders ensure they are being proactive about defending their offices? 

Here, we talk with Security talks with Andrew Campagnola about emerging threats in office building security and how security leaders can address these concerns. 

Security magazine: Tell us about your title and background.

I am Vice President of Strategic Initiatives at VTS, the commercial real estate industry’s leading technology platform. Throughout my career, I have worked in many sectors of the industry, from integration to engineering, sales, business development and beyond. Prior to VTS, I held roles at leading access control and security companies including Chamberlain Group, Johnson Controls and LenelS2, which allowed me to gain experience in effectively guiding organizations to navigate the rapidly evolving landscape of security technology. In my current role, I leverage my background in physical security and business development to help ensure that VTS’ property technology (PropTech) solutions are designed with cutting-edge access control use cases that creates seamless and secure office experiences for VTS’ customers.

Security magazine: What are some emerging threats in office building security, and what proactive measures can be taken to mitigate risks?

There are many threats to workplace security today, including acts of violence or aggression, natural disasters, cyberattacks and so on. However, when listening to feedback from both leaders of commercial real estate companies and their tenants, it became clear that their priority is ensuring that employees are not only physically safe in an office building, but more so feel as though they are coming to a safe environment. Creating a feeling of safety and security throughout a facility is just as important as implementing security itself.

Part of the answer here includes ensuring security not only within individual office buildings but also in the transitional spaces between them, such as parking garages or common areas such as lounges, conference rooms or kitchens. Organizations can do this effectively by integrating various systems like access control, Physical Identity and Access Management (PIAM) solutions, and tenant management software. Tightly coupled solutions create a true ‘street-to-suite’ experience that allows employees to move seamlessly between different areas of the office complex while maintaining a consistent level of security. This approach not only enhances physical safety but also contributes to a sense of well-being and confidence among employees when navigating spaces throughout their office building. 

Security magazine: How can access control systems play a role in modern security strategies for today’s office buildings?

Think of access control as the foundational element that enables various other security strategies to work more effectively. Not only do they simply control access, but they simultaneously provide valuable data related to occupancy and the building itself — including access frequency and more. From there, these insights can be used to inform decisions on investing in additional security measures, such as increased lighting in parking lots at night or deploying extra security personnel during peak times, as well as identifying and securing areas of vulnerability.

Furthermore, the integration of mobile access reduces reliance on traditional access methods like keycards, which are susceptible to being lost, stolen or copied. While mobile access has been around for about 10 years, we as an industry are finally starting to see mainstream adoption because large consumer companies are starting to take notice of its benefits. By tying an individual’s identity directly to their mobile device, access control systems enhance security while also streamlining the authentication process for users.

Security magazine: Are there compliance considerations and industry standards for access control technologies that security leaders should be aware of?

The first thing that comes to mind is the use of biometrics in access control. When using biometrics, deploying organizations need to be aware of things like bias, training models, etc. However, it’s important to note that the landscape of standards in the security industry is still evolving. While there are no universally recognized standards, there are certain industry best practices and guidelines that companies may adhere to.

When it comes to standards, some large companies have proprietary technologies that have achieved widespread adoption, acting as a de facto standard within the industry. While this ultimately hampers system compatibility, the good news is there are software solutions available that sit on top of multiple access systems to enable interoperability. This offers a temporary workaround that not only enhances the end user experience but provides a viable solution until an industry-wide standard emerges.

Security magazine: What are the best practices for implementing access control technology?

Start by considering the long-term implications of the system or solution you are selecting. With hundreds of available systems and technologies, it’s tempting to opt for a niche solution to solve an immediate operational problem. However, this approach can potentially lock you into a technology that is difficult to update or integrate with other systems in the future. Evaluate systems based on factors such as data ownership, licensing terms and hardware compatibility to ensure your system isn’t just built for the ‘right now’ but for the future. If you’re not sure where to start, either partner with a technology leader who provides consultative services or consult with a subject matter expert who will provide unbiased guidance.

While there are a handful of companies and organizations working to create standards initiatives, there is no clear winner yet. For this reason, it is important to stay up to date with such initiatives and each manufacturers’ preferred format. By aligning your access control implementation with emerging standards and best practices, you can ensure greater interoperability, flexibility and scalability for your system over time. 

KEYWORDS: 5 minutes with Building security compliance office security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 Minutes Albertoli

    The importance of security for power utility substations

    See More
  • 5 Minutes with Tait

    The end of digital transformation, the rise of AI transformation

    See More
  • Remote worker

    Security complexities of the remote workforce

    See More

Events

View AllSubmit An Event
  • April 16, 2025

    Modernizing GSOC Operations: Ensuring Full Control and Complete Situational Awareness

    ON DEMAND: For many organizations, physical security management can be a daunting task. Threats are on the rise and risks are becoming increasingly diverse. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing