SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Application of various contactless solutions to mitigate school safety incidents

Application of various contactless solutions to mitigate school safety incidents
Contact company
Contact Axis Communications
icon Add as a preferred source Download PDF version
Related Links
  • High-profile keynoters and new speakers included at ISC West 2019 conference
  • IFSEC International 2019: packed with technologies and opportunities to learn

When properly integrated with people and processes, technology can play a vital role in preventing, detecting, and mitigating school safety threats.

Bruce Canal, Segment Development Manager for Education at Axis, together with input from a panel of school safety experts, provides an updated view on relevant technology to secure any school environment – from K-12 to higher-learning campuses.

Our panel of experts includes Michele Gay, co-founder of Safe & Sound Schools, Paul Timm, an active member of the ASIS School Safety & Security Council, and Kevin Wren, former Director of Risk, Security, and Emergency Management at Rock Hill School District in the USA. Read more about Bruce and the panel at the end of the article.

Threat prevention

Schools worldwide are becoming more mindful of personal safety vulnerabilities and locking exterior doors to prevent an outside threat from entering their buildings. Unfortunately, this means that late-arriving students and visitors are also locked out.

Without the benefit of technology, a member of staff would be expected to physically open the door for all visitors - an impractical solution in a K-12 school and a near impossibility on college campuses where class schedules vary and visitor traffic is high. Alternatively, leaving main entrance doors unlocked for convenience creates obvious safety vulnerability.

There are different solutions for preventing an outside threat from entering a school, one being using automatic locks on doors.

Contactless control solution

In contrast, an automatic access control solution limits building access only to those authorised to be in the building at any particular time. Although not a widely used technology in K-12 school environments, a growing number of college campuses are adopting this technology to improve campus safety.

Automatic access control also alerts if a door remains propped open and provides an audit trail of all access attempts – both approved and failed. This is valuable insight that school administrators can use to e.g. optimize HVAC systems, improve campus facility planning, and follow up on access request irregularities. 

Remote entry

And for efficient visitor screening, a video intercom such as the network door station, combines automatic remote entry, two-way audio, and high-resolution video, giving school staff the ability to visualize and communicate with the individual(s) requesting entry, to better assess a potential threat.

It’s a technology that’s effective and affordable for schools of all types – from the smallest K-12 schools to student housing facilities on the largest university campuses.

Threat detection and verification

To qualify a threat from a human perspective is subjective

Should a threat enter a school building, there is an inevitable period of time that passes before it is detected and identified. Qualifying a threat from a human perspective is very subjective and it requires time for our senses to process the information in our environment.

It’s human nature to be curious, and we are tempted to see for ourselves if we hear glass breaking, a loud explosion, or raised voices – an obvious personal safety risk if it puts people in harm’s way.

On the other hand, technology has no subjective criteria. A sound detection analytic immediately sends an alert and triggers connected automated systems when it detects pre-configured acoustical patterns. In a high-risk security event, this can save lives and valuable response time. 

False alarms 

But what about an abundance of nuisance false alarms that such a system could generate? The commotion from students between classes, the slamming of dorm room doors or lockers, the person shouting down the hall to get his friend’s attention… Relying solely on this type of technology to directly alert law enforcement, campus police, and first responders is probably not a good idea.

A better strategy might be to use this technology to first alert school administrators or safety officers to a possible threat. They, in turn, can then safely verify or dismiss the threat using high-resolution video surveillance technology and make a more qualified determination as to what further action is required. 

Emergency messaging

Once the determination is made that danger is imminent, it is important to notify law enforcement and communicate the threat school or campus-wide. Traditional emergency phone calls are time-consuming. Shouting has a limited range. Both responses can focus unwanted attention on the person sounding the alarm.

To ensure that the message reaches everyone – both inside and outside the school building – an announcement over the school’s PA system is the best alternative.

Mobile communication

Using an Axis public address solution, it’s possible to also access the system remotely from a mobile device – a distinct advantage if the front office has been compromised. In addition, to live messaging, the system can also deliver pre-recorded messages to communicate complete threat protocols and instructions in a calm and pragmatic way.

To communicate a threat, using a public-address solution has many advantages, such as from a mobile device

In terms of communicating campus-wide and beyond to the outside world, a duress alarm (or an “Amok” alarm) instantly, and covertly, sends an emergency signal to first responders and law enforcement, alerting them to a possible active assailant threat in progress.

Using connected technology, these systems may have additional automated integration with electronic signage or strobe lighting at the school, as well as parent and mass notification systems to warn people away from the danger zone.

Locking down

Schools worldwide are increasingly “locking down” in response to active assailant threats. But it’s a relatively recent phenomenon, and schools continually strive to improve safety protocols and equipment. Realistically, it is not possible to lock down all areas of your school or campus.

Open spaces like parking lots, playgrounds, athletic fields, cafeterias, and libraries are particularly challenging. But theoretically, all closed school environments with a door that locks can prevent a serious threat from entering that space.  The biggest challenge to this system, however, is that many schools are still using traditional locks and keys. Before examining the possible benefits of technology, let’s evaluate the typical lock and key scenario during an active threat.

Absence of proper mechanisms

There is currently no global standardisation for doors and locking mechanisms, and the variation between countries is significant. For example, classroom doors in the US are one-step egress and open out, whereas, in Europe, doors are 2-step egress and open in.

Also, in the US, door locks are often on the outside of the door and require a key. While it’s possible to set the door in permanent locking mode from the outside, it’s disruptive when teachers are forced to interrupt a lecture to open the door for a late-arriving student. Therefore, it is common practice to leave doors unlocked for convenience.

In addition, teachers are expected to wear their classroom door keys on their person - another example of where theory and reality are disconnected. It’s a system with some obvious safety vulnerabilities and protocol gaps.  And what happens when there is a substitute teacher or guest lecturer? Do they have a key? Are they trained on protocols?

Network-based access control

In the context of a real emergency lockdown using traditional lock and key, teachers must first find their classroom door key. They must then step out into the hallway – potentially in the direct path of an active assailant. They must insert the key into the lock while scared and likely shaky, lock the door, and remove the key, all before stepping back into the relative safety of the classroom and closing the door.

Network-based access control eliminates both unnecessary delays as well as personal safety risks

Network-based access control on interior doors addresses many of these challenges as classroom doors can be centrally closed and locked at the push of a button. Automating this process eliminates both unnecessary delays as well as personal safety risks associated with lock and key technology.

The solution also remains fire code compliant, provided that the doors can still be manually opened from inside the classroom. In terms of system cost, a network-based access control system is quite economical when compared to the expense of re-keying doors whenever a key is lost or a member of staff leaves. 

Ensuring the best outcome

These are just a few ways that technology can improve school safety when integrated with people and processes.  But if people are to trust technology, then product security and reliability are paramount. That’s why Axis is meticulous about product quality and offers solutions with three layers of cyber protection.

More importantly, they work with a global network of safety and security professionals who can help schools create safer learning environments by assessing safety vulnerabilities, developing emergency plans, designing security systems, and training students and staff. Independent experts who can help find the right technology for specific needs.

Expert panelists

The panel of school safety experts are as follows:

  • Michele Gay, the co-founder of Safe & Sound Schools, is all too familiar with how school safety vulnerabilities can be exploited, having lost her daughter Josephine in the tragic mass shooting at Sandy Hook Elementary School in December 2012. Subsequently, Michelle has become a passionate advocate for school safety, speaking frequently with law enforcement, educators, parents, and communities.
  • Paul Timm, a board-certified Physical Security Professional (PSP), is an active member of the ASIS School Safety & Security Council and author of the book “School Security: How to Build and Strengthen a School Safety Program”. He is also certified in Vulnerability Assessment Methodology and has helped numerous schools with safety planning and crisis assistance support.
  • Kevin Wren, former Director of Risk, Security, and Emergency Management at Rock Hill School District, has a long history in law enforcement and school security.  Named by Campus Safety Magazine as K-12 Director of the Year in 2016, Kevin uses technology to improve school safety and extend the effectiveness of a lean security team.
  • Bruce A. Canal, Segment Development Manager, Education brings over 20 years of education-related security experience to the Axis organization. A former director of physical security for Orange County Public Schools (OCPS) in Orlando, FL, Bruce is a Certified Protection Professional and an active member of various school safety and law enforcement associations.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Electronic security systems
  • Library security systems
  • Campus security systems
  • Application security
  • Physical security
  • Industrial security
  • Commercial security
  • Private sector security
  • Public sector security
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Security tagging
  • Security cameras
  • Covert cameras
  • Security camera systems
  • Security monitoring system
  • Security access systems
  • Voice recognition systems
  • School security
  • Institute security
  • Public security
  • Industrial security systems
  • Network cameras
  • IP security solutions
  • Covert Surveillance
  • Cyber security
  • Corporate Security
  • Fingerprint Locks
  • Data Security
  • Network Video Recorders
  • Warning Devices
  • Cloud security
  • Video surveillance
  • Touchless Security
  • Related links
  • Axis Communications CCTV software
  • Axis Communications Access control software
  • Axis Communications IP cameras
  • Axis Communications IP Dome cameras
  • Related categories
  • CCTV cameras
  • CCTV software
  • Access control software
  • IP cameras
  • IP Dome cameras
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Government & Public Services
About this page

"Technology to mitigate school safety incidents" is one of 9201 in-depth security application and installation case studies featured in this section. Visit regularly for the latest updates on use cases, installations and deployments of security products from Axis.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec