Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalTechnologies & SolutionsSecurity ServicesSecurity Enterprise ServicesLogical SecurityAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityVideo Surveillance

Four Reasons Why Your Active Shooter Plan Should Include Security Entrances

By JC Powell
boonedam-entrance2

Photo courtesy of Boon Edam

February 11, 2020

The Mass Shooting Tracker is a crowd-sourced database of U.S. mass shootings, which are defined as a single outburst of violence in which more than three people are shot. Using this parameter, the Tracker reported that in 2019 there were 374 mass shootings in the United States – more than one for each day of the year.

Given this reality, it is essential to take all possible steps to protect your employees and visitors from harm. It is also important to consider the liability – both business and personal – that executive management may face should there be an incident on the premises. For this reason, it should be a core requirement of every organization’s security plan to give serious consideration to how they will thwart an active shooter.

Putting a security plan in place to guard against on-site violence begins at the perimeter, and security entrances are a strong first line of defense against the threat of an active shooter. Here are four reasons why your active shooter plan should include security entrances.

  1. They form a physical barrier that is a strong, visual deterrent to crime and violence.

Security entrances have one thing in common – they form a barrier or obstruction to free entry and are the largest visible sign that a physical security plan and policy exists at a facility. Compare the sight of a building with security turnstiles in the lobby and security revolving doors at the side entrances for employees, versus a building that does not have these entrances…what looks easier and more vulnerable?

Security entrances are a strong visual deterrent against casual attempts at crime or violence because the perpetrator will likely move on to another easier target. And, if this person is very determined to bypass security entrances they will have a lot more planning to do to attempt to enter undetected and cause harm, which brings us to the next point. 

  1. They guard against piggybacking and tailgating.

The key to preventing an active shooter is to prevent him or her from getting inside a facility to wreak havoc. With a swinging door, it is much easier for a shooter to get inside even if you use an access control system and credential readers at your doors. They can either follow an authorized user inside without their consent (tailgate) or coerce a user to bring them in (piggyback). Security entrances can make either scenario much more difficult to near impossible, especially when deployed in layers around a facility.

At outer layers, for example, a full height turnstile installed on a fence line rotates so that only one person can enter on a valid credential and then it locks again. Inside a lobby, optical turnstiles with swinging or sliding barriers and sensors inside their lanes can detect tailgating and alarm if it happens. These should be supervised at all times in case of an alarm and breach, but as stated earlier the active shooter must plan a great deal to get past them and gain access to more targets in a short amount of time before the police can arrive.   

Then what about piggybacking through coercion? There are security entrances that stop that with anti-piggybacking technology. This technology detects the presence of a second person within the entrance and rejects the entry for both, effectively making it impossible for an uncredentialed individual to enter. How does this work?

Usually the detection hardware is placed in the ceiling of a security revolving door or mantrap portal. Using a combination of an optical camera and active, near-infrared sensors, the advanced analytics technology can recognize shapes, sizes and volume in three dimensions. The system scans the compartment within the security entrance to identify a head and shoulders, along with a body shape and will reject any unusual shapes, requiring those within the compartment to exit back to the non-secure side of the door. Because this technology is so reliable, no manned supervision is needed at these entries. The active shooter is forced to find another entry as well. If they decide to try to shoot their way in, there’s something for that as well.

  1. They can protect the people inside the building from gunfire.

To further ensure that people within the facility are protected from weapons being discharged outside, security revolving doors and mantrap portals are available with bullet-resistant (BR) glass. This special glass is made from layers of a tough plastic called polycarbonate, sandwiched between sheets of toughened glass.

There are a number of different BR-rated protection levels; security revolving doors and mantrap portals can be outfitted in BR glass with protection Level 3, which is 1.04” thick, more than four times the thickness of standard security door glass. Level 3 BR glass is capable of stopping three .44 magnum bullets or a bullet that is twice as heavy and moves significantly faster than the bullet of a 9mm handgun. In the end, the shielding ability of BR glass may deter a shooter from spending time focused on shooting a door, or, it can buy enough time for someone inside the door to get inside to safety. 

  1. They can prevent a weapon-carrying individual from entering.

We’ve described earlier in this article how security entrances can deter, detect and prevent tailgating and piggybacking. You can enhance your security further by pairing this capability with an electromagnetic metal detector to ensure that no weapons can be brought into your facility by anyone. Metal detectors for pedestrians are often shaped like a doorway, and they can be placed in front of a security entrance to scan the user before they enter the entrance. If metal is detected, the security entrance will stay locked. This combination is very effective at stopping even an authorized user from bringing danger inside a building. 

The Best Preparations for the Worst-Case Scenario

Any active shooter preparedness needs to encompass a number of elements. Employees, students or other individuals who are in the facility on a daily basis should receive active shooter training in the form of drills conducted by a qualified provider. Interior spaces should be configured for readiness with the ability to lock down all doors instantly from a central location. Communications capabilities should be available within the facility to help contain the threat and protect people on site, and directly to first responders to help them know where to target their actions.

At the perimeter, active shooter preparedness should include the selection and installation of entry solutions that help protect the lives inside. Security entrances can fill that need in a variety of ways and should be a primary consideration for organizations today.

KEYWORDS: active shooter crime deterrent mass shootings Security entrances security plans

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jc powell

JC Powell started with Boon Edam in 2011 as a Territory Sales Manager for the Southwest Region and was promoted to National Sales Manager South and West in 2016. JC has a background in Construction and Security Sales spanning 14 years, previously working with Greystar as Superintendent and more recently with EJ Brooks as Regional Sales Manager. Today, JC coaches and mentors 11 Business Development Managers covering 30 states. He resides in Dallas with his wife and 4 children.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • entrance security

    7 ways to ensure proper security entrance selection

    See More
  • boon edam

    Touchless access control solutions look to alter the landscape of higher education

    See More
  • people standing

    Creating a layered, 3-level entrance strategy for critical infrastructure facilities

    See More

Related Products

See More Products
  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!