Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementIdentity Management

10 Essential Questions to Evaluate Visitor Management

By Mary Probst
visitor-enews
November 12, 2018

With millions of people going to work, attending concerts, and even students going back to school, a thought lingers in the back of their minds: Is the building, the venue, the school safe and secure?

It’s an unfortunate reality that there are no safe places anymore – not our schools, not our churches, not offices, not concert venues. Knowing who is on your property is imperative for better control over what occurs, and large gathering places – from hospitals to stadiums – are increasingly turning to technological tools to protect their campuses. Unfortunately, while these visitor management systems are more important than ever, they could remain flawed with holes that attackers can exploit.

A solid visitor management system ensures due diligence as it pertains to security of the premises and takes human error out of the equation. It begins at the front door but can continue throughout the building so that security teams understand who enters, can track their whereabouts and restrict access as needed.

At the basic level, a visitor management system might include a sign-in or registration process at the entry point. You might need to wear a temporary badge on the premises so people know you are supposed to be there while employees have more permanent access cards. In some buildings and schools, entrants must pass through metal detectors, and security officers monitor the space with surveillance cameras.

For more restricted facilities, a security officer might check your driver’s license and even scan the magnetic strip to ensure it’s valid. Some even go so far as to collect fingerprints and run background checks. Document readers are great for validating ID cards to prevent someone with a fake driver’s license from getting through, but they aren’t mandated. Frequently, it’s still just a case of a human security officer looking at the ID and waving the person past.

As more tragedies happen, demand for more sophisticated tools is also rising. Organizations are adding self-service kiosks that can authenticate ID cards and use facial recognition software to make sure the ID matches the person. Some are implementing technology that can scan for exposed weapons.

But despite advances in technology, there are still gaps when it comes to keeping buildings safe, not the least of which is awareness tools exist and how they can help. In schools, parents are demanding administrators take every action possible to prevent future shootings like the ones in Parkland, Florida, and Santa Fe, Texas. For school districts and government agencies, budget constraints often prohibit them from using the most effective tools, and it can be hard to decide between textbooks and security technology.

Meanwhile, even the best technology isn’t perfect. Weapons detection systems are limited to identifying certain shapes and could miss other weapons or explosives that the systems aren’t programmed to spot. And they are still being perfected to catch weapons hidden in bags or under clothing. Facial recognition technology, which is increasingly being used at airports and other high-traffic locations, has seen proven success. In August 2018, facial recognition technology caught a traveler going through customs at Washington Dulles International Airport with a fake French passport. However, some systems can’t immediately match faces to a watch list, so by the time a dangerous person is flagged, he might be out of the area.

That time lag is as big a reason for concern as anything. Whether a weapons scanner spots a gun, a driver’s license fails authentication, or facial recognition software notices a threatening person, it still takes time for intervention. Security personnel might only take a couple minutes to arrive at the scene, but that could be all the time needed for tragedy to strike.

It’s ultimately up to organizations to weigh benefits against costs and complexity of implementing a system that will vet visitors and keep students, workers and the general public as safe as possible. While the technology is still evolving and can’t stop every attack, visitor management systems are working toward doing just that by minimizing the impacts of having someone on the premises who shouldn’t be there or who is identified as a threat. Ideally every attack would be prevented ahead of time, but even identifying threats earlier and enabling police or security to intervene sooner can save lives. If there’s one thing that we’ve learned from all these terrible tragedies, it’s that every second matters.

Security managers need to evaluate their current visitor management systems, look for loopholes and close the gaps. Here are some key questions for security managers to ask themselves to determine how secure their facilities really are:

  • Do I check a driver’s license or valid ID when I have a visitor on the premises?
  • How do I know that the driver’s license is authentic and not fraudulent?
  • Do I have a method to authenticate that driver’s license?
  • Do I need to track the visitor as they move through the premises?
  • Do I need to limit where the visitor can/cannot go while on the premises?
  • Do I have a detailed report of the visitors if there is an incident?
  • What if I have a visitor that should not enter the premises? And how do I know that they shouldn’t be allowed entrance?
  • Do I have a process or operating procedure to follow if I need to refuse entry to an unauthorized visitor?
  • If I need the assistance of law enforcement, how are they notified?

We are all concerned about security these days, whether we are a visitor to a site or whether we are the company being visited. Having a robust, automated visitor management system – put away the pen and paper, folks – with security elements and reporting built in will help security managers mitigate risk as much as possible.

KEYWORDS: school safety security officer security technology visitor management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mary Probst is the commercial markets manager for document readers, biometrics and secure materials at Gemalto.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Neon light trails

    4 essential questions to ask about a prospective SIEM

    See More
  • speed lane

    You Deserve to be Delighted: 10 Essential Elements to Look for in a Security Entrance Manufacturer

    See More
  • drone-enews

    Quick Guide for Evaluating Drone Detection: Top 10 Questions to Ask

    See More

Related Products

See More Products
  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing