Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesPhysical SecurityEducation: K-12

How to Leverage Technology to Enhance Detection and Response Capabilities in Schools

By Laurie Lindow, Jack Gibbons, Bill Edwards
school_enews
August 28, 2018

The single most important thought when securing our schools is maintaining an open, supportive environment that is conducive to learning. School security directors all too often worry that their campuses will become “prisons” if a well-thought-out design or renovation does not take into account the purpose of the facility. As security professionals, this is our primary concern and at the forefront of any security solution we would recommend. Securing educational facilities continues to be a challenge as communities, school districts, law enforcement, and security professionals struggle to preserve our nation’s educational model. The balance between an engaging learning environment and a secured learning environment continues to be sought, though as we see more improvement and innovation in security technologies, this balance is becoming more easily achieved. Facial recognition, gunshot detection, and automated response technologies are several security technologies that can improve a school’s ability to detect and respond to violent acts while remaining in the background, nearly unnoticeable by students and faculty.  

Crime prevention through environmental design (CPTED) is not new to our society, but innovating its concepts is surely a task for today’s security professional. When applying CPTED principles to a school setting, a security professional should take the following into consideration:

 

  • Using landscaping as a tool to designate school boundaries; restricting unwanted access while remaining aesthetically attractive.
  • Observation/Viewpoints: School administration offices should have a clear view of areas of play, gathering and parking; utilizing surveillance cameras with video analytics can provide preventative protection without the constant need for active monitoring. Alerts can be sent directly to the administrator via smartphone or computer.
  • Walls, windows and corridors: the overuse of partitions and corridors create blind spots. Walls and windows should be designed to eliminate hiding places for potential perpetrators. Installing clerestory windows – a section of windows above eye level that eliminates unwanted entry – provides natural light and ventilation which is conducive to a healthy classroom and overall learning experience.

 

As with any new problem, it is important to go back to basics and formulate a security plan which incorporates new technologies and techniques that will help support our public spaces. With today’s technology, it’s no surprise that risk mitigation options harness new technology designed to create a safer and more secure environment while balancing the educational facility’s functionality. The function and level of security of each educational facility are dependent on the institution’s student body, faculty and staff, physical characteristics and layout, the location of the community, and the resources available. All of these factors play a critical role in determining what customized technological security solutions can be implemented.

Leveraging technology through the guidance of a security expert can bolster detection and response capabilities without losing the aesthetics and function of the facility. Technology – such as advanced mass notification, social media scrapping, smart cameras or access control associated with facial recognition – allows the facility to leverage its security system to identify and alert the presence of a known, potentially dangerous individual prior to entrance on campus. By utilizing technology to detect, proactively predict and respond to an incident, threat information could potentially be passed simultaneously between faculty, students and local first responders. For example, advanced analytics and trained operational center personnel create an environment where predictive measures and sound reporting mechanisms give students, parents and faculty early warning or time to evade an incident that may be taking place on school grounds. Other technologies, such as automated lockdown mechanisms, can be integrated into the overall system to provide an even higher-level security plan that incorporates a comprehensive, layered and integrated approach.

Additionally, gunshot detection technology can be implemented, providing security personnel with real-time alerts that engage cameras to focus on the area or point of origin, which, in turn is tied to the operations center and first responder notification protocols. Combined with a comprehensive security plan, technology will enable future designers to incorporate readily available sensors, protective campus furniture and line of sight considerations to better build our schools to a higher level of security while maintaining the educational environment we demand in our society.

The complex physical and operational characteristics of educational facilities can create several challenges for faculty, staff, students and emergency response personnel in their efforts to provide a safe and secure learning environment. With the help of technology, a comprehensive security plan, and design focused on mitigating vulnerabilities and risk, educational facilities can continue to develop security strategies that are designed to not only deter acts of violence but detect and respond to a variety of violent acts in a predictive versus reactive manner. For this unique sector, the priority is to encourage guidance, information for, and direction of appropriate protective measures, which compliment a positive learning environment and support risk mitigation efforts, as appropriate for the school setting.

 

KEYWORDS: CPTED emergency response gunshot detection mass notification school security school shootings

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Laurie Lindow is an Operational Security Specialist at Thornton Tomasetti. Based in its Denver, Colorado office, she supports the Operations Directorate by conducting threat, vulnerability, and risk assessments for clients around the world.

Jack Gibbons is a summer intern on the Operations and Technical Security Services team at Thornton Tomasetti. Gibbons is a student at Tulane University and a Midshipman in the university’s Naval ROTC program.

Bill edwards calibre bio

Bill Edwards is President of Federal and Public Safety at Building Intelligence, Inc. Edwards retired from the military in 2017 and led Thornton Tomasetti’s security consulting group as a Principal from 2017 – 2021 and Calibre Engineering from 2021 – 2022. 

He offers over 34 years of expertise in operational/technical security, counterterrorism, counter-intelligence, surveillance and counter-surveillance. He served as the Director of Intelligence for Theater Special Operations Command-North, a position that required extensive collaboration and partnering across the U.S. whole of government security enterprise. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Unlock the future of cybersecurity news with Security.
As a leader in enterprise security, we have you covered with the information to keep you ahead of the curve.

JOIN TODAY

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • people working together in glass office

    Implementing technology to improve security and safety

    See More
  • security-management-fp1170x658v468.jpg

    5 pillars to planning & implementing security technology

    See More
  • school-safety-freepik1170x658v6.jpg

    11 steps to build the foundation of a school security and safety program

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!