Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementSecurity Education & Training

Education & Training

Maximizing security in repurposed spaces

By Ken Poole
SEC0221-Edu-Feat-slide1_900px

via Getty Images

SEC0221-Edu-slide2_900px

Ken Poole is a Senior Director at Johnson Controls. He has over 20 years of experience in the security industry leading teams that deliver secure, resilient, and data-powered building environments every day.

Photo courtesy of Poole

SEC0221-Edu-Feat-slide1_900px
SEC0221-Edu-slide2_900px
February 12, 2021

From hospitals converting storage areas into patient rooms to office buildings reconfiguring cubicles to promote social distancing, it is clear that as our needs and challenges change, so must our building environments. One of the biggest facility management takeaways from the COVID-19 pandemic has been the need for flexibility within building infrastructures. Businesses and organizations around the country and across industries have had to reassess how they are using their spaces in order to maximize efficiency and safety.

From a security standpoint, effectively and quickly converting a building space is no easy task. Chief security officers (CSOs) and other security leaders must thoughtfully implement solutions and strategies that will not only safeguard buildings from traditional intruder threats, but also promote a healthy environment for employees and occupants. The COVID-19 pandemic has sparked a unique convergence of security and health, and it’s up to CSOs to keep up and even drive that transformation for their organizations.

 

Frictionless Access Control for Seamless Space Conversion

When converting spaces to meet an enterprise’s changing needs, it’s critical to get new security systems up and running as quickly as possible to avoid disrupting day-to-day operations. These security systems not only allow businesses to start using the space per its new function, but also ensure ongoing maintenance and monitoring of its health and security state.

One of the most important solutions that we’ve seen transform a space is access controls. As the purpose of a room or even an entire building floor changes, so must its access authorization requirements, making a space’s operability entirely dependent on its security installations. By installing digital access controls, security teams can quickly adjust who is permitted to enter an area of the building as necessary, ensuring no intruders are able to slip through the cracks during times of transition.

The healthcare industry has especially benefited from these implementations, allowing hospitals to quickly minimize access to floors hosting COVID-19 patients to select staff members. When working with a hospital in the early days of the pandemic, one of our teams was able to implement a new security system within six days, allowing the new intensive care unit (ICU) to accept patients within 10 days. This swift turnaround and enhanced security meant the hospital was ready to handle the influx of caseloads and provide exemplary patient care.

To balance security with the growing need for sterile best practices, enterprises can implement frictionless access control capabilities, such as AI-powered facial recognition. Authorized personnel can enter converted spaces hands-free, without risking contamination by touching keypads or badges. As a result, enterprises can confidently make space utilization changes knowing the health and security of their occupants won’t be compromised.

 

AI-Powered Virtual Security Operation Centers

With many businesses striving for minimal building occupation to maintain social distancing, CSOs are challenged to monitor these spaces with far less staff actually onsite. To fully optimize their space utilization strategies, security leaders can invest in virtual security operation centers (SOCs) that can be remotely operated and monitored by a third-party provider. These centers integrate previously disparate systems onto a single network, automating every data touchpoint to streamline operations and maximize security. As a result, buildings are smarter, safer and able to keep up with rapid changes.

For instance, food processing plants have struggled to continue safe operations during the pandemic while keeping facilities minimally occupied. Remote virtual security operation centers allow them to monitor safety and quality processes without having to be onsite, allowing production to continue undisrupted.

With virtual monitoring, spaces can easily be added onto a network for maximum security as they are repurposed, allowing businesses to adjust their buildings’ space utilization as needed without compromising security. Some of those pieces that make up a comprehensive strategy that leverages advanced monitoring solutions, include:

  • Video surveillance: With building spaces being used for new purposes and accessed by different personnel, having the ability to visually monitor ongoing operations is critical, especially when the space is utilized for sensitive healthcare purposes. Video surveillance allows remote security teams to monitor buildings for potential intruders and provides CSOs with the insights needed to ensure a space is being safely maintained even when the building is minimally occupied.
  • Smart elevated skin temperature scanning: Manually screening employees for elevated temperatures can create traffic bottlenecks, potentially reducing social distancing and exacerbating the risk of exposure. By integrating thermal imaging cameras, large groups of individuals can be screened for elevated temperatures without disrupting the flow of traffic, minimizing the risk of accidental infection. For optimal accuracy, it’s critical to ensure that whichever thermal camera is implemented meets or exceeds the standards set by the International Electrotechnical Commission (IEC).
  • Social-distance monitoring and contact tracing: Many businesses’ reopening plans are dependent on strict social-distancing compliance, which can be difficult to monitor while keeping buildings minimally occupied. Leveraging Bluetooth technology, artificial intelligence (AI) systems can analyze employees’ locations within a building to recognize when they have interacted within six feet of each other for an extended period of time and can even send reminders to mobile devices to socially distance. Should an employee exhibit COVID-19 symptoms, this same technology can be used to identify which individuals have been in close contact with them and should therefore quarantine or take other precautionary measures.
  • Mask detection: Properly enforcing mask best practices is crucial to maintaining overall building health and to providing occupants with peace of mind. By combining video surveillance with AI capabilities, individuals lacking proper mask protection can be instantly flagged to security for swift follow-up.


Maintaining Infrastructure Flexibility for Seamless Operations

As we learn more about the COVID-19 virus, and as the pandemic continues to evolve in its scope and impact, businesses across all industries need to remain agile in their health and security strategies. By empowering CSOs with the tools they need to rapidly repurpose building spaces while maintaining the health and security of their facility environments, organizations can continue to operate safely and efficiently.

We don’t know what the future will bring, but through strategic space repurposing and technology adoption, we can lay the foundation for a flexible infrastructure to tackle a myriad of challenges head on without compromising security.

KEYWORDS: access control business continuity COVID-19 Global Security Operations Center (GSOC) risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ken Poole is a Senior Director at Johnson Controls. He has over 20 years of experience in the security industry leading teams that deliver secure, resilient, and data-powered building environments every day.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • smart access control system

    How enterprise security leaders can benefit from access control in coworking spaces

    See More
  • cctv-geefac66e5_1920.jpg

    Why AI CCTV is the future of security and surveillance in public spaces

    See More
  • Fingerprint access control

    How access control is fueling change in our physical spaces

    See More
×
via Getty Images
Ken Poole is a Senior Director at Johnson Controls. He has over 20 years of experience in the security industry leading teams that deliver secure, resilient, and data-powered building environments every day. Photo courtesy of Poole

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!