Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Identity Management

One Door at a Time

By Bill Zalud
sec1210featureonedoor
November 29, 2010

Whether it’s a church door, an entrance into a high-tech Internet company or admission to a local police station, enterprise security leaders often view the application of access control technology one door at a time. Each has its purposes, authorized people who use it and changing needs based on location and time, for example.

Any opening in a building represents both a security concern and an opportunity. Initially, you to think about how to hang (hinges), secure (locks) and control (doorsec1210door2 closer) every door. The opportunity is that we can use today’s very powerful security technology to control, monitor and report on who can go where and when in a facility or across an enterprise, advises Scott Higinbotham of Stanley Security Solutions.

He advises that the choice of door hardware is just as an important consideration as choosing the door composition and type.

Door hinges – often forgotten – come in various grades and functions. Usually installed in sets of three, door hinges provide all of the strength available to secure one side of the door. Moreover, a door hinge offers a very practical, secure, and aesthetically-pleasing power transfer device for an electro-mechanical cylindrical, mortise, or exit locking system.

Diverse Elements of Door Controls

Locking hardware provides the strength on the strike side of the door, and its quality should be matched to the material composition and safety/fire requirements for the door. Nearly every mechanical locking solution has an electrified version. Electrified cylindrical, mortise and exit devices are good choices where matching the look of existing non-electrified hardware is important. Also, many manufacturers of these devices provide integrated options that include lock control, door position, request-to-exit, latch monitor and card reader all contained in one aesthetically-pleasing unit.  Having all of this functionality in the lock can reduce installation time while reducing the tamper risk for any of the monitoring components, says Higinbotham.

Electrified strikes and magnetic locks are other options to consider. These hardware types do not require a power or signal transfer device, however monitoring component integration is usually limited to door position and latch monitor. Also, the installation of these devices is an add-on to the look of a door and can affect the aesthetics of the opening.

Speaking of location, Indianapolis-based Heartland Church “is at a major intersection of Interstate 69,” explains Pastor Darryn Scheske. “The intersection has the second highest traffic count in the state so security was a key concern.” The church needed to secure the auditorium during the week to protect its substantial investment in musical equipment and other technology. The solution from Schlage lets users access, monitor and manage their system from any computer running a standard Web browser. The system’s plug-and-play design makes configuration easy and the embedded application eliminates the need for special software or a dedicated PC.

Easy But Secure Door Entry

Eight doors throughout the church property now use the access control solution. Authorized users enter via proximity cards that they place in front of proximity card readers.

“We can have as many proximity cards as we need to be used by staff and volunteers,” says Scheske. “They’re so easy to use to gain entry. All our people need to do is to hold their wallets or purses up to the reader.” The exterior door to the church auditorium and daycare center was hardwired to the access controller because this door would get the highest use. Plus, this door also needed to have an exit device and handicap accessibility.

For the other seven interior doors, wireless access control is the best solution. To ensure all the doors were controlled and latched properly, each access controlled opening was fitted with door closers.

Ease of use is another aspect of technology at the door.

Scheske concurs. “We had already figured how to use the system without training.  It is very intuitive. We already have orders in for additional doors in both the church and the daycare center. Our lobby is quite large and we didn’t want to take the chance that the wrong person could sneak past our receptionist. That’s why, seven years ago, we installed biometric hand readers next to the double glass door entrance. Teachers, church staff and parents all use them.”

KEYWORDS: secure security technology solution

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • ccure_case

    Building a Better Hospital Security System, One Phase at a Time

    See More
  • healthcare-screen

    Protecting patients and securing medical innovation, one device at a time

    See More
  • An Irish pharmaceutical company sees the need to protect its assets at its distribution center. Photo courtesy of Uniphar

    Securing Supply Chains One Link at a Time

    See More

Related Products

See More Products
  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

  • security book.jpg

    Security Investigations: A Professional’s Guide

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing