Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceFire & Life SafetyPhysical Security

The balancing act of campus perimeter security

Keeping higher education environments open and secure is a balancing act that requires security leaders to regularly evaluate risk and the organization’s goals.

By Adam Stone
SEC0921-Perimeter-Feat-slide1_900px.jpg

FatCamera / E+ via Getty Images

September 10, 2021

In July, a gunman drove onto the golf course at Pinetree Country Club in Kennesaw, Ga. and killed a professional golfer and two other men. An emergency message immediately put students at nearby Kennesaw State University on alert.

There was no immediate threat to the campus, and students were soon allowed to resume normal activities. But the incident is illustrative. Most campus environments are not walled fortresses, and the question that security leaders often grapple with is what happens when the greater community environment affects the campus environment?

This puts campus security professionals in an especially complicated position. Many campuses seek to foster a sense of openness on the one hand while still finding, defending and managing the perimeter. This task has become all the more complicated as many campus environments and universities shut down or have dealt with changing environments and changing access amid COVID-19.

“Universities want to be seen engaging with the wider community. They want to be open and welcoming and accessible. That sometimes conflicts with university security departments, where we’re looking to keep our community safe from some unwanted individuals,” says Oliver Curran, Vice Chairman of the Association of University Chief Security Officers.

“We may prefer to have more restricted access — keeping the bad people out — but the university security department is there to support its institution. If the institution wants to be open and wants people to come in, then really it comes down to the security department to change our approach,” he says.

First Line of Defense

So, how can campus security leaders strike that delicate balance of open but secure? When it comes to perimeter security, appearances matter.

“Whether your campus has a fence or not, there should be clear indicators of the campus boundary,” says Landon Jones, former Security Director for William Jewell College in Kansas City and now a security consultant.

“This can be achieved with landscaping, curb markings and signage. This reinforces ‘territoriality,’ which is a core tenant of Crime Prevention Through Environmental Design. It can serve as a physiological barrier and make patrolling and enforcing rules easier for security staff,” Jones says.

Patrols, in turn, form the next line of visual defense. Uniformed guards who make the rounds can be a significant deterrent. “You don’t want to be the low-hanging fruit in the eyes of a criminal. If they see active patrols, they may choose to go elsewhere,” Jones says.

But visual markers may be largely symbolic, and college security professionals say they must take further steps to safeguard higher education perimeters.

A Cooperative Effort

For an example of some of the complexities facing campus security, we can look at the University of Illinois in Urbana-Champaign, where there’s no physical demarcation between campus and community. With city and campus virtually indistinguishable, campus security collaborates with local law enforcement to define and defend the perimeter.

“If you look at our campus community, and then you say, ‘What part of campus does U of I control?’ we have an outline of what we patrol on campus, which was created in an agreement with the cities of Champaign and Urbana,” says Barbara Robbins, Assistant Chief, University of Illinois Police Department.

“For example, we have one street called Green Street that goes down the middle of our campus. The stoplights in the street belong to the City of Champaign, but they permitted us to put cameras on every stoplight on the street within our campus district,” she says. “We spent probably $300,000 in the last two years, putting cameras on all of the stoplights on Green Street, which is our main hub. Campus-wide, we’re up to about 2,000 cameras.”

When an incident occurs at this (largely invisible) demarcation line, those cameras help security and law enforcement partners ensure that the trouble doesn’t impact students.

“Suppose we get a call at one of the bars on Green Street. When the officers respond, we have people here who can move the cameras to face whatever is happening. They are watching it real-time as the officers are out, and it’s all being recorded: Our cameras will zoom in to get license plates and people’s faces,” Robbins says.

Joe Monroe, Chief of Police at University of Kentucky. Image courtesy of Monroe
Landon Jones, security consultant and former Security Director for William Jewell College in Kansas City. Image courtesy of Jones
Scott Lynch, Director of Security at Full Sail University. Image courtesy of Lynch
Oliver Curran, Vice Chairman of the Association of University Chief Security Officers. Image courtesy of Curran
Barbara Robbins, Assistant Chief, University of Illinois Police Department. Image courtesy of Robbins

Layering the Perimeter

At the University of Kentucky, an open campus in the middle of downtown Lexington, Chief Joe Monroe takes a layered approach to perimeter security.

“We are right in the middle of downtown Lexington, so there’s really no defined boundary between the campus and the city. There’s no main gate, and there’s no rock wall or fence or anything like that,” he says.

The dilemma he faces isn’t unique to Lexington. “Any time you’re dealing with a large university or college, especially if they are state or federally funded, that is supposed to be an open environment with open access,” he says. “You have to find that happy balance between security, on the one hand, and allowing that open campus.”

To strike that balance, Monroe has implemented a range of perimeter defense technologies.

“We have these phone towers, the pedestals painted blue, and each pedestal has a camera that gives us 360-degree coverage,” he says. “It has a warning speaker built into the top of it. And then it has the digital phone so that somebody in need of assistance can push the button to get help.”

Some 3,000 cameras support that first layer of defense, according to Monroe. The next layer is enforced by internal controls at the University of Kentucky, such as access control mechanisms to protect specific buildings.

“The access control piece gives us the ability to lock down our buildings, with people using digital ID cards to get in after working hours. Our buildings are open during normal working hours, and then after 5 p.m., they automatically will lock, and then you have to use your card to get in,” he says. “That also supports our response in the event of an emergency. We’re able to hit a couple of buttons in our operations center and completely lock down all these access control points.”

The layers of security technology go even deeper into the building themselves, with cameras and further access control defending common areas, offices and hallways, Monroe adds. Altogether, this layered approach helps to keep bad actors at bay.

“The most recent example was in March of this year, when we received a call from a neighboring police agency that there may be an individual who was considered dangerous, coming to our campus,” Monroe says. “We located him using our video surveillance cameras, and we were able to track him and apprehend him very quickly, without incident.”

Force Multiplier

While security technology can help protect campus perimeters, there’s also a necessary human element. At Full Sail University, Director of Security Scott Lynch looks to students and faculty as his eyes and ears.

The school’s 200-acre campus in Winter Park, Fla. has many high-value spaces, including soundstages and more than 100 production studios. Lynch seeks to maintain an open feel while still enforcing a high level of vigilance.

“We push the philosophy of, ‘If you see something, say something,’” he says. “We tell the students, this is your campus, this is the cool stuff that you’re going to get to train with for the next couple of years. We have 25 people in security. But with staff and students, we have 7,500 security ambassadors. We’re not going to ask you to tackle people, but if you see something, give us a call.”

The 2016 mass shooting at the nearby Pulse nightclub in Florida brought that strategy to the forefront, says Lynch.

“I had six months on the job when Pulse happened, right down the street. That rattled everybody's cage,” he says. “I had already been teaching ‘run, hide, fight’ active shooter response training. Now the president of the school came to me and asked me to train the entire campus. I became an instructor overnight.”

That high level of community awareness succeeds in making campus a place where, despite the feeling of openness, criminals are reluctant to conduct their affairs.

Before Lynch started pushing ‘see something, say something,’ students occasionally were being robbed of their expensive school-issued laptops while on campus. Police recently heard from a local criminal that this is no longer in favor. “They interviewed him, and the guy says: ‘Yeah, you go on that campus, it's like everybody thinks they’re a security guard,’” Lynch says.

Personnel Management

While all these combined strategies can help secure the perimeter, experts say, campus security professionals also need to focus on personnel to ensure they can support the sometimes-conflicting goals of openness and security.

“We bring it up when we are interviewing new hires for our police department,” Robbins says. “You need to understand that we do have campus property, but it bleeds over into the cities.”

Monroe talks about the need for a different kind of mindset among security personnel. “We train all of our employees with one mission in mind: Customer service. Everybody coming to our campus should be treated as a customer,” he says. “In that context, security is about treating people with respect and dignity.”

Building that mindset among employees, particularly those tasked with safety and security, is key to meeting the perimeter security challenge.

“It starts with that initial security officer induction: Do you understand why we are here? Do you understand the importance of what you’re doing? We ask that in all of our assessments to an officer,” Curran says. “We talk about our departmental objectives, what it means to have that safe and secure working environment for staff and students, and how do they see their role as helping provide that.”

In the end, when security leaders can understand the need to balance openness and defense — and reinforce that within the greater security program — perimeter security becomes a much more manageable task.

Response duties at the perimeter are shared by campus security and local police, whose efforts often complement one another. “It’s not unusual for our campus to see Champaign police, University of Illinois police, Urbana police and state police at a call on our campus. We all work together,” she says.

KEYWORDS: campus security law enforcement perimeter security public safety security cameras student safety and security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Adam Stone is a contributing writer for Security magazine. He has covered IT issues in the public and private sectors for more than 20 years. In addition to following security trends, he writes on military technology, education-tech, government IT and diverse others issues.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • campus

    Striking the balance: How visible should campus security be?

    See More
  • building perimeter

    Securing the perimeter in manufacturing and distribution

    See More
  • SEC0321-Perimeter-Feat-slide1_900px

    Securing the perimeter

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!