Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Education: K-12Education:University

Seek to Develop an ‘Empowering Partnership’

By Lance Holloway
April 1, 2011
Welcome inbody

Over the past decade, I have had the opportunity to lead Stanley Convergent Security Solutions’ Software Solutions Group (SSG); a team of Microsoft, Oracle, Cisco and security product certified professional support engineers with an amazing level of expertise in security system design, installation and support. Out of the many integrated security system customers that we provided service to, perhaps none were as dynamic in continual event management and cutting-edge system linking as our higher education security partners.

With colleges and universities ranging in size from a few hundred to tens of thousands of students, faculty and contractors, it is immediately evident that one product does not fit all.  Some schools have campuses in multiple cities, states or countries, while other schools operate in a single community. Additionally, some institutions of higher learning have a unified vision for streamlining school systems and processes while others wrestle with internal customer challenges and fiefdoms.  All of them, however, have the trust of their student and faculty population in their hands and that makes security a paramount endeavor.

Looking back over the past decade, a few best practices come to mind that would fall under advisement to any higher education champion looking to better their respective school’s security preparedness and efficiency.

When it comes to technology, there is a difference between bleeding edge and cutting edge.  There is also a difference between a sales representative demonstrating a single device out of a briefcase and an integrator that can introduce you to a satisfied customer utilizing the proposed technology and application. When evaluating a truly new technology or application, do not hesitate to limit implementation to a few rooms or areas on your campus to test the product to your satisfaction. Many manufacturers and integrators are perfectly willing to put a test unit in place on your campus to improve the application. Early technology adopters should have the infrastructure, resources and flexibility to implement and adjust new technology as needed without having a negative impact on school operations.

Do not forget that technological capability is not equal or constant. What one integrator can deliver from experience and expertise cannot be achieved by every other integrator. What may have been “no” last year because of unproven technology will be “yes” in the coming months after proven stable application. Do not hesitate to ask what technology can do for your campus. In fact, don’t hesitate to involve your IT group early in your security discussions. Automated data sharing has been available in IT realms for many years and yet it remains a fringe capability to most integrators. The right system and integrator combination can put a smile on the faces of both IT and operations departments.

It pays to develop a partnership with your security provider. Many universities benefit greatly from having the security integrator provide a full-time, embedded technician or project manager who acts as a liaison to the benefit of all parties. Higher education safety and security is a noble calling. Both the integrator and school are working together in an empowering partnership to ensure the safety of the campus population and bolster the standing of our proud institutions.

KEYWORDS: security education security integrator security system integration

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Lance Holloway is director of Technology Strategy at Stanley Convergent Security Solutions Inc., Naperville, Ill. He has the responsibility of establishing the strategic path and program implementation of Stanley CSS services and solutions technology, and leads the efforts and implementation of Stanley CSS’s eManagement tools. Holloway is certified in numerous technical applications including Microsoft MCTS, Oracle OCP, PL/SQL and certified in systems’ operations including Lenel, Loronix, Hirsch and Video Surveillance.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Developing an In-Depth Understanding of the Business - Security Magazine

    How to Develop an In-Depth Understanding of the Business

    See More
  • cyber security training program

    How to develop an engaging cybersecurity awareness program

    See More
  • UK, EU Seek to Strengthen Cyber Defenses

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing