Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Sophisticated Security – Checkpoints and the Modern Event

By Andrew Goldsmith
April 10, 2012

 

enews_securityMajor sporting events, like the World Series or the Super Bowl, are no longer just athletic contests – they are the new “destination vacations” and, for global events like the Olympics or the World Cup, sources of national prestige and economic drivers. The weeks and months leading up to these spectacles are filled with mini-events, taking the fan experience to unprecedented levels. Attendees spend big money on food, merchandise and travel, making the treatment of fans the most important component to planning any major sporting contest.

An oft-overlooked event component from the attendee standpoint is the security checkpoint, and so it should be. The less attention paid by fans to the checkpoint typically means that it’s working, as attendees tend to only notice when something goes wrong, like overcrowding or another logistical failure. Such incidents tend to set the fan experience off on the wrong foot and can cast a bad light over a nation or region, so organizers should do everything possible to prevent a nightmarish security scenario.

But a security checkpoint is a fickle beast and must ebb and flow with attendee traffic and the events themselves, not to mention emerging threats on the global stage. For organizers, there are several keys to keep in mind when developing and running security checkpoints, ensuring that attendees remain safe without damaging the all-important fan experience.

Technology: The New AND The Old

The technology used by major sporting events clearly mirrors another industry where the “fan” experience is tantamount: aviation. More and more airport checkpoint technology is making its way into the event world – and that’s a good thing. Just like events, airports are concerned with the guest’s experience, striving to improve throughput without endangering passengers.

To do this, airports are pushing the technology envelope, with new solutions like full-body scanning, high-throughput baggage screening and other innovations. These systems allow swift movement through checkpoints while using automated threat detection software to quickly pinpoint potential dangers, improving security while also reducing the onus on operator training. These solutions are not limited to the aviation world, something that event organizers should pay close attention to when it comes to enhancing their own security operations.

But the advancements in new screening technology don’t make what’s tried-and-true outdated. Metal detectors should remain en vogue with event security checkpoints, especially the new breed of detection solutions, which help operators pin-point “areas of interest” on an attendee’s person for quicker searches. Newer models also cut through electromagnetic interference, a common problem due to the proliferation of mobile devices, ensuring better detection and reducing malfunctions.

Security Providers: More than Hardware

In the past, event organizers looked to security vendors for hardware only, but while these same vendors still sell security technology, the truth is that they now bring much more to events than just metal detectors and bag screeners. Most of these vendors now strive to function as “security providers,” offering software systems that allow for the centralized management of all aspects of event security, from staffing to throughput. This helps operators and managers quickly move resources based on fluctuating incidents, like an overcrowded checkpoint, to keep security lines moving smoothly.

Beyond software, some security providers have also begun offering turnkey checkpoints. From operator hiring and training to the technology, maintenance and logistics, the vendor, rather than the organizer, oversees the minutia of the checkpoint, freeing up managers to focus on the overall fan experience. While not a fit for some events, this is a trend for event organizers to keep in mind, especially if security is not their forte.

Scan It All

Finally, event organizers must recognize that the attendee checkpoint only scratches the surface of event security. Modern threats have no boundaries and can appear everywhere, from purses to pallets – every avenue of threat dissemination must be addressed, from venue set-up (and even construction) to delivery vehicles. The threat of radioactive dangers like dirty bombs and even weapons of mass destruction are also very real, so it may be necessary to consider radiation/nuclear screening for major events like the FIFA World Cup or the Olympics.

High-profile sporting events are more than just contests — they’ve become an experience for everyone from rabid fans to extended families. As more and more money is spent on these new “destinations,” event organizers must respond to ensure attendee safety. As events continue to evolve in terms of the fan experience, security needs to be more than just a magnet and a mean-looking guard – it needs sophistication.

KEYWORDS: checkpoints screening Stadium Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 3 Key Factors for Effective Event Security Checkpoints

    See More
  • Three Lessons to Learn from Aviation Checkpoints

    See More
  • Colorful text on black screen

    The modern security operations center: Shaping the future of SOCs

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing