Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Using Automation for Improved Lockdown Abilities

By Claire Meyer
School shooting security
February 1, 2015

Of the hundreds of school shootings that have taken place in the last 50 years, only a few have involved the attacker having to physically break into the building, either through a window or – as in the case of the Sandy Hook Elementary School shooting – through a glass door. While there is technology available to mitigate that risk even further (including several brands of bullet- and impact-resistant glass), Advanced Data Risk Management LLC President and school security consultant Dan O’Neill says that perimeter security should only be one factor in eliminating easy targets for active shooters.

“Especially in a K-12 environment, an active shooter incident is not likely to occur, but the consequences are potentially higher than anything else they face,” says O’Neill. “Schools should take a hard look at prevention as well as response – identifying potential threats early, providing or arranging for counseling, and actively encouraging the community to come forward with problems.”

He adds: “Classroom doors are robust by design. Add a robust lock, and the typical school shooter’s weapons are not ideal for opening doors. Having a good lock and good lockdown procedures can buy you time. If a door takes too long for the gunner to open, he’s likely to go and look for an easier target.”

Roll-down gates and doors that lock off large sections of a school building also help to isolate the shooter and protect larger groups of students during an incident, O’Neill says.

To Jim Cody, Technology Coordinator at North Bend Central School District, protecting the school is also protecting a community gathering place. As a graduate of the Dodge Country, Nebraska, K-12 district himself, he understood how much access to the school and its resources means to the community, while also comprehending the risk a completely open campus could pose to staff and the district’s 560 students.

Four years ago, the district made the decision to install electronic card access controls to the majority of exterior doors in the school buildings, as well as upgrading wiring and adding more infrastructure for surveillance cameras, and integrating the system together through Genetec’s Security Center solution.

“Years ago, we just left the doors open,” says Cody. “Janitorial staff would open the doors in the morning, lock them once classes had started, and repeat in the afternoon. But they might get called away or miss a door, and it was difficult to rely solely on them for our access control.

“We also had lots of keys floating around the community. The schools’ set of physical locks hadn’t been changed since the early 1970s,” he adds. “We had to trust community event organizers to lock up when they left after a meeting.”

It was a clear move, he says, to switch to an electronic system that can be programmed for reliable access management. Every Monday, school staff meet to review that week’s schedule of extracurricular events and plan the access schedule accordingly. The system checks for updates every few minutes to relay any changes in permissions or lockdown protocols to the doors in the event of an emergency.

“This capability helps us to get ahead of any potential problems, instead of chasing behind with a ring of keys,” Cody says. A principal in each of the district’s buildings can reissue and deactivate cards, so it’s not necessary to call a specialist for missing credentials. This helps to ensure participation and quick resolution of any potential vulnerabilities, he adds.

At Brigham Young University, a need to update access control infrastructure also led to improvements in lockdown capabilities, although it took time to coordinate a new solution. Working with ASSA ABLOY and Software House to find a common system that could gel ASSA ABLOY’s Persona wireless locks with the university’s existing network, eventually the university gained an upgraded 1,000-lock system across the campus that could be installed in-house in less than 30 minutes per lock.

“We have 320 buildings on campus, and all major buildings have electronic access control,” says Steve Goodman, Police Technology and Communications Center Manager for Brigham Young University, based in Provo, Utah. “We were giving options to departments in those buildings to add more locks to their offices, but we were running out of ports on panels, and costs per department were running up after adding in a new $7,000 panel to the estimate. The new system has a much lower up-front cost, as it runs on our network, not relying on nearby panels.”

The construction of 16 new student housing buildings on campus also led to Power over Ethernet (PoE) locks on dorm room doors. “We were already running Ethernet to all of the rooms, and it’s easy to add an extra port per room for access control. It’s an incremental cost – just the cost for the locks, not for a panel.” The Persona locks are also a modular solution, so Goodman and his team can upgrade hardware to accept, for example, near-field communication (NFC) access just by swapping the interface.

“We installed the PoE and hardwired locks in areas that could need lockdown capabilities, like perimeters and housing interiors, and it’s nice to have that ability,” Goodman says. “However, we have a lot of debates and tabletop exercises on when to activate a lockdown or a lockout. If it’s an outdoor shooter and you don’t know where he is or where he’s headed, you want people to be able to get inside to shelter. We want to know where the shooter is first, then we can either lock down one building at a time or do a full-campus, one-button-push lockdown.”

Goodman also relies on the campus’s mass notification system, which is integrated to the police dispatch system for easier deployment of texts, calls, emails, social media announcements, and messages on voice over IP telephones, websites, digital signs and the PA system. The system is tested three times per day, and there are canned messages ready to deploy at a moment’s notice. Overall, 21,000 of the campus’s 32,000 students and 5,000 employees have opted in to text notifications.

“For lockdowns, we turn to the police watch commander on duty. For mass notifications, it’s up to the dispatcher. We trust our people to make the best decision in the situation, and if it saves someone’s life – that’s all we can ask for.”

Trusting first responders to make the right call also hinges on getting them the best information, says O’Neill. “One of the most neglected aspects of preparing for active shooter incidents is getting police involved and very familiar with the school layout and plans. I recommend giving police or dispatchers access to maps, schedules and even surveillance feeds, so if there is an incident, they can track the shooter at the police station and feed responders accurate information.”

For lockdown drills, however, O’Neill says that teachers and administrators should run through actual scenarios much more frequently than students: “Think of it as airline passengers and flight attendants. The attendant, or teacher, will tell the passengers, or students, what to do in the event of a crash, but the attendants and pilots are the ones who actually train for it.”

“Overall,” he says, “I want to see a focus on prevention, something better than just response.” 

KEYWORDS: active shooter electronic access control lockdown school access control

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Claire Meyer is a former Managing Editor for Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • security robot

    Tunisia Using Unmanned Robots to Enforce Lockdown during Coronavirus

    See More
  • Lawrenceburg, Indiana School - Lockdown Procedure - Security Magazine

    Nailing Down the Right Lockdown Procedure for School Security

    See More
  • data center-enews

    MS-ISAC, DNG-ISAC sign MOU for improved cybersecurity

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!