Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Identity Management

One Door at a Time

By Bill Zalud
November 29, 2010

Whether it’s a church door, an entrance into a high-tech Internet company or admission to a local police station, enterprise security leaders often view the application of access control technology one door at a time. Each has its purposes, authorized people who use it and changing needs based on location and time, for example.

Any opening in a building represents both a security concern and an opportunity. Initially, you to think about how to hang (hinges), secure (locks) and control (doorsec1210door2 closer) every door. The opportunity is that we can use today’s very powerful security technology to control, monitor and report on who can go where and when in a facility or across an enterprise, advises Scott Higinbotham of Stanley Security Solutions.

He advises that the choice of door hardware is just as an important consideration as choosing the door composition and type.

Door hinges – often forgotten – come in various grades and functions. Usually installed in sets of three, door hinges provide all of the strength available to secure one side of the door. Moreover, a door hinge offers a very practical, secure, and aesthetically-pleasing power transfer device for an electro-mechanical cylindrical, mortise, or exit locking system.

Diverse Elements of Door Controls

Locking hardware provides the strength on the strike side of the door, and its quality should be matched to the material composition and safety/fire requirements for the door. Nearly every mechanical locking solution has an electrified version. Electrified cylindrical, mortise and exit devices are good choices where matching the look of existing non-electrified hardware is important. Also, many manufacturers of these devices provide integrated options that include lock control, door position, request-to-exit, latch monitor and card reader all contained in one aesthetically-pleasing unit.  Having all of this functionality in the lock can reduce installation time while reducing the tamper risk for any of the monitoring components, says Higinbotham.

Electrified strikes and magnetic locks are other options to consider. These hardware types do not require a power or signal transfer device, however monitoring component integration is usually limited to door position and latch monitor. Also, the installation of these devices is an add-on to the look of a door and can affect the aesthetics of the opening.

Speaking of location, Indianapolis-based Heartland Church “is at a major intersection of Interstate 69,” explains Pastor Darryn Scheske. “The intersection has the second highest traffic count in the state so security was a key concern.” The church needed to secure the auditorium during the week to protect its substantial investment in musical equipment and other technology. The solution from Schlage lets users access, monitor and manage their system from any computer running a standard Web browser. The system’s plug-and-play design makes configuration easy and the embedded application eliminates the need for special software or a dedicated PC.

Easy But Secure Door Entry

Eight doors throughout the church property now use the access control solution. Authorized users enter via proximity cards that they place in front of proximity card readers.

“We can have as many proximity cards as we need to be used by staff and volunteers,” says Scheske. “They’re so easy to use to gain entry. All our people need to do is to hold their wallets or purses up to the reader.” The exterior door to the church auditorium and daycare center was hardwired to the access controller because this door would get the highest use. Plus, this door also needed to have an exit device and handicap accessibility.

For the other seven interior doors, wireless access control is the best solution. To ensure all the doors were controlled and latched properly, each access controlled opening was fitted with door closers.

Ease of use is another aspect of technology at the door.

Scheske concurs. “We had already figured how to use the system without training.  It is very intuitive. We already have orders in for additional doors in both the church and the daycare center. Our lobby is quite large and we didn’t want to take the chance that the wrong person could sneak past our receptionist. That’s why, seven years ago, we installed biometric hand readers next to the double glass door entrance. Teachers, church staff and parents all use them.”

KEYWORDS: secure security technology solution

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Building a Better Hospital Security System, One Phase at a Time

    See More
  • healthcare-screen

    Protecting patients and securing medical innovation, one device at a time

    See More
  • Securing Supply Chains One Link at a Time

    See More

Related Products

See More Products
  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

  • security book.jpg

    Security Investigations: A Professional’s Guide

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing