Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementIdentity Management

10 Essential Questions to Evaluate Visitor Management

By Mary Probst
visitor-enews
November 12, 2018

With millions of people going to work, attending concerts, and even students going back to school, a thought lingers in the back of their minds: Is the building, the venue, the school safe and secure?

It’s an unfortunate reality that there are no safe places anymore – not our schools, not our churches, not offices, not concert venues. Knowing who is on your property is imperative for better control over what occurs, and large gathering places – from hospitals to stadiums – are increasingly turning to technological tools to protect their campuses. Unfortunately, while these visitor management systems are more important than ever, they could remain flawed with holes that attackers can exploit.

A solid visitor management system ensures due diligence as it pertains to security of the premises and takes human error out of the equation. It begins at the front door but can continue throughout the building so that security teams understand who enters, can track their whereabouts and restrict access as needed.

At the basic level, a visitor management system might include a sign-in or registration process at the entry point. You might need to wear a temporary badge on the premises so people know you are supposed to be there while employees have more permanent access cards. In some buildings and schools, entrants must pass through metal detectors, and security officers monitor the space with surveillance cameras.

For more restricted facilities, a security officer might check your driver’s license and even scan the magnetic strip to ensure it’s valid. Some even go so far as to collect fingerprints and run background checks. Document readers are great for validating ID cards to prevent someone with a fake driver’s license from getting through, but they aren’t mandated. Frequently, it’s still just a case of a human security officer looking at the ID and waving the person past.

As more tragedies happen, demand for more sophisticated tools is also rising. Organizations are adding self-service kiosks that can authenticate ID cards and use facial recognition software to make sure the ID matches the person. Some are implementing technology that can scan for exposed weapons.

But despite advances in technology, there are still gaps when it comes to keeping buildings safe, not the least of which is awareness tools exist and how they can help. In schools, parents are demanding administrators take every action possible to prevent future shootings like the ones in Parkland, Florida, and Santa Fe, Texas. For school districts and government agencies, budget constraints often prohibit them from using the most effective tools, and it can be hard to decide between textbooks and security technology.

Meanwhile, even the best technology isn’t perfect. Weapons detection systems are limited to identifying certain shapes and could miss other weapons or explosives that the systems aren’t programmed to spot. And they are still being perfected to catch weapons hidden in bags or under clothing. Facial recognition technology, which is increasingly being used at airports and other high-traffic locations, has seen proven success. In August 2018, facial recognition technology caught a traveler going through customs at Washington Dulles International Airport with a fake French passport. However, some systems can’t immediately match faces to a watch list, so by the time a dangerous person is flagged, he might be out of the area.

That time lag is as big a reason for concern as anything. Whether a weapons scanner spots a gun, a driver’s license fails authentication, or facial recognition software notices a threatening person, it still takes time for intervention. Security personnel might only take a couple minutes to arrive at the scene, but that could be all the time needed for tragedy to strike.

It’s ultimately up to organizations to weigh benefits against costs and complexity of implementing a system that will vet visitors and keep students, workers and the general public as safe as possible. While the technology is still evolving and can’t stop every attack, visitor management systems are working toward doing just that by minimizing the impacts of having someone on the premises who shouldn’t be there or who is identified as a threat. Ideally every attack would be prevented ahead of time, but even identifying threats earlier and enabling police or security to intervene sooner can save lives. If there’s one thing that we’ve learned from all these terrible tragedies, it’s that every second matters.

Security managers need to evaluate their current visitor management systems, look for loopholes and close the gaps. Here are some key questions for security managers to ask themselves to determine how secure their facilities really are:

  • Do I check a driver’s license or valid ID when I have a visitor on the premises?
  • How do I know that the driver’s license is authentic and not fraudulent?
  • Do I have a method to authenticate that driver’s license?
  • Do I need to track the visitor as they move through the premises?
  • Do I need to limit where the visitor can/cannot go while on the premises?
  • Do I have a detailed report of the visitors if there is an incident?
  • What if I have a visitor that should not enter the premises? And how do I know that they shouldn’t be allowed entrance?
  • Do I have a process or operating procedure to follow if I need to refuse entry to an unauthorized visitor?
  • If I need the assistance of law enforcement, how are they notified?

We are all concerned about security these days, whether we are a visitor to a site or whether we are the company being visited. Having a robust, automated visitor management system – put away the pen and paper, folks – with security elements and reporting built in will help security managers mitigate risk as much as possible.

KEYWORDS: school safety security officer security technology visitor management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mary Probst is the commercial markets manager for document readers, biometrics and secure materials at Gemalto.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Neon light trails

    4 essential questions to ask about a prospective SIEM

    See More
  • speed lane

    You Deserve to be Delighted: 10 Essential Elements to Look for in a Security Entrance Manufacturer

    See More
  • drone-enews

    Quick Guide for Evaluating Drone Detection: Top 10 Questions to Ask

    See More

Related Products

See More Products
  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing