PHYSICAL SECURITY SOLUTIONS

CAMPUS GUIDE

MAKING OUR SCHOOLS SAFER

USING THIS APPLICATION GUIDE AND
THE SECURITY VULNERABILITY ASSESSMENT

Since 2013, there have been more than 300 school shootings in America—an average of one per week. These and other violent incidents on K-12 campuses have caused schools and their surrounding communities to examine the various tools available to improve safety and security.

Measures to improve safety can be complex, and include a combination of new policies and procedures, regular training and coordination with first responders. An essential element in a comprehensive approach to security is the use of advanced technology solutions, which can help prevent potential incidents, as well as mitigate the impact of unfortunate events.

Government organizations and advocacy groups around the country have worked to establish guidelines and recommendations to improve school safety. All of them communicate the importance of physical security technology. In addition to the U.S. Department of Homeland Security and boards of education at the state level, influential organizations include:

  • PASS (Partner Alliance for Safer Schools)—passk12.org
  • Secure Schools Alliance—secureschoolsalliance.org
  • Safe and Sound Schools—safeandsoundschools.org

This application guide explores key considerations and best practices for K-12 security, including the development of a layered security approach and a security technology checklist. It will ultimately help you align priorities and next steps to better protect the students and staff at your school.

ACT NOW and determine where your vulnerabilities lie by requesting a FREE physical security vulnerability assessment for your school.

ADOPTING A DEFENSE IN
DEPTH APPROACH FOR K-12E

Defense in Depth is a strategic approach utilized in a number of mission-critical environments, including data centers, hospitals and hardened facilities. Understanding and employing this approach in an education environment allows you to respond to each stage of a threat and mitigate serious harm. It is important to:

Deter: To prevent an event from occurring

Detect: To quickly identify a threat

Deny: To refuse access for unauthorized personnel

Delay: To slow, contain and isolate the threat

Defend: To allow for an active response

Defense in Depth (5 Ds) Key Considerations Technology Examples
Deter
  • School marshals and resource officers
  • Crime Prevention Through Environmental Design (CPTED)
  • A Fencing and locked gates
  • Vestibules/security entrances
  • IP video intercoms, audible deterrent alert
  • Exit-only doors with alarms
  • Integrated access control with video surveillance
Detect
  • Positively identify all visitors with expiring badges
  • Badging for students and faculty
  • Visitor management systems
  • Indoor/outdoor alert systems
  • Alarmed exits with remote monitoring
  • Networked video surveillance
  • Metal detectors
Deny
  • Consolidate all entryways through the main entrance/li>
  • Define security policies and predator database
  • Integrated access control with video surveillance
  • Facial recognition and object detection software
  • Vestibules/security entrances
  • Restricted key systems
Delay
  • Contain and isolate the intruder
  • A person is shot every 15 seconds once a shooting starts
  • – Every second an intruder is delayed could save a life
  • Networked and mechanical security locks
  • Panic buttons and paging
  • Restricted key systems
  • Smoke cannons and reinforced glass
Defend
  • Direct connections to authorities
  • Clear emergency procedures
  • Two-way communication with classrooms
  • Mass and emergency notification
  • Panic buttons and paging
  • Network door locking and safe rooms
  • Drone surveillance and response

K-12 SECURITY TECHNOLOGY CHECKLIST

SCHOOL PERIMETER
GENERAL

  • Directional signage
  • Lighting
  • Landscaping (CPTED)
  • Emergency call boxes
  • Fencing/gating
VIDEO SURVEILLANCE

  • Multi-sensor cameras
  • Hi-res cameras
  • Thermal cameras
    •  
    •  
ACCESS CONTROL

  • Parking gates
  • Video intercoms
    •  
    •  
VMS AND ANALYTICS

  • License plate recognition
  • Object detection
INTRUSION DETECTION

  • Panic buttons
    •  
BUILDING ENTRANCES
GENERAL

  • Security vestibules
  • Lighting
  • Landscaping (CPTED)
  • Emergency call
  • Glass protection film
VIDEO SURVEILLANCE

  • Multi-sensor cameras
  • Video intercoms
  • High-res cameras
    •  
    •  
ACCESS CONTROL

  • Exit-only doors and alarms
  • Delayed egress
  • Restricted key systems
  • Video intercoms
VMS AND ANALYTICS

  • Facial recognition app
  • Remote video access
INTRUSION DETECTION

  • Door contacts
  • Glass breaks
RECEPTION REGISTRATION
GENERAL

  • Security vestibules
  • Guard stations
  • Glass protection film
  • Public address
  • Mass notification system
VIDEO SURVEILLANCE

  • Hi-res cameras
  • Video-optimized storage
  • Video-optimized server
  • Video-optimized workstation
  • Video intercoms
ACCESS CONTROL

  • Metal detectors
  • Visitor management
  • Predator database
  • Restricted key systems
VMS AND ANALYTICS

  • Live, search, recorded and exported video content
INTRUSION DETECTION

  • Panic buttons
    •  

Are you equipped with the right technology to protect your students?

HALLWAYS CORRIDORS
GENERAL

  • Emergency lighting
  • Corridor segregation doors
  • First responder DAS
  • Gunshot detection system
  • Glass protection film
VIDEO SURVEILLANCE

  • Multi-sensor cameras
  • Corridor format cameras
  • Video-optimized storage
  • Video-optimized server
  • Video-optimized workstation
ACCESS CONTROL

  • Magnetic door hold opens
  • Restricted key systems
  • Mechanical door locks
  • Electronic door locks
VMS AND ANALYTICS

  • Live, search, recorded and exported video content
INTRUSION DETECTION

  • Panic buttons
ACADEMIC AREAS
GENERAL

  • First responder DAS
  • Wi-Fi connectivity
  • Glass protection film
    •  
    •  
VIDEO SURVEILLANCE

  • Privacy considerations
  • Video-optimized storage
  • Video-optimized server
  • Video-optimized workstation
    •  
ACCESS CONTROL

  • Mechanical door locks
  • Electronic door locks
  • Networked door locks
  • Video intercoms
VMS AND ANALYTICS

  • Live, search, recorded and exported video content
INTRUSION DETECTION

  • Panic buttons
COMMON SPACES
GENERAL

  • First responder DAS
  • Wi-Fi connectivity
  • Glass protection film
  • Public address
  • Communication equipment room
VIDEO SURVEILLANCE

  • Low-light cameras
  • Video-optimized storage
  • Video-optimized server
  • Video-optimized workstation
  • Hi-res cameras
ACCESS CONTROL

  • Mechanical door locks
  • Electronic door locks
  • Networked door locks
  • Video intercoms
VMS AND ANALYTICS

  • Live, search, recorded and exported video content
INTRUSION DETECTION

  • Panic buttons

SECURE EACH LAYER OF YOUR CAMPUS

AVAILABLE TECHNOLOGIES

1 Directional signage
2 Lighting
3 Landscaping (CPTED)
4 Emergency call boxes
5 Fencing/gating
6 Multi-sensor cameras
7 Hi-res cameras
8 Thermal cameras
9 Parking gates
10 Video intercoms
11 License plate recognition software
12 Object detection software
13 Panic buttons
14 Security vestibules
15 Glass protection film
16 Video-optimized storage
17 Video-optimized server
18 Video-optimized workstation
19 Exit-only doors and alarms
20 Delayed egress

21 Restricted key systems
22 Facial recognition software
23 Door contacts
24 Glass breaks
25 Public address
26 Mass notification system
27 Metal detectors
28 Visitor management
29 Predator database
30 Live search, recorded and exported video content
31 First responder distributed antenna system (DAS)
32 Wi-Fi connectivity
33 Corridor format cameras
34 Magnetic door hold opens
35 Mechanical door locks
36 Networked door locks
37 Electronic door locks
38 Low-light cameras
39 Gunshot detection system
40 Communication equipment room

SECURE EACH LAYER OF YOUR CAMPUS

AVAILABLE TECHNOLOGIES

1 Directional signage
2 Lighting
3 Landscaping (CPTED)
4 Emergency call boxes
5 Fencing/gating
6 Multi-sensor cameras
7 Hi-res cameras
8 Thermal cameras
9 Parking gates
10 Video intercoms
11 License plate recognition software
12 Object detection software
13 Panic buttons
14 Security vestibules
15 Glass protection film
16 Video-optimized storage
17 Video-optimized server
18 Video-optimized workstation
19 Exit-only doors and alarms
20 Delayed egress

21 Restricted key systems
22 Facial recognition software
23 Door contacts
24 Glass breaks
25 Public address
26 Mass notification system
27 Metal detectors
28 Visitor management
29 Predator database
30 Live search, recorded and exported video content
31 First responder distributed antenna system (DAS)
32 Wi-Fi connectivity
33 Corridor format cameras
34 Magnetic door hold opens
35 Mechanical door locks
36 Networked door locks
37 Electronic door locks
38 Low-light cameras
39 Gunshot detection system
40 Communication equipment room

ADOPTING VIDEO SURVEILLANCE SOLUTIONS

With the need to provide actionable data and live remote video in critical learning and meeting spaces, networked video surveillance
is a necessary technology on every school campus. Advancements in camera technology, improved processing power and increasing deployment of networked-based systems give administrators and first responders accurate information to effectively act in an emergency situation

COMPONENTS OF YOUR COMPLETE VIDEO SURVEILLANCE SYSTEM

Cameras

Provides information for investigating and responding to incidents as well as preventative measures, with increasingly sophisticated functionality due to greater processing power, improved image quality and onboard storage and analytics.

Infrastructure

Cable and electronics that provide network connectivity and power to increasingly sophisticated devices with greater Power over Ethernet (PoE) requirements.

Storage

Appliances, servers and cloud solutions that support growing capacity needs and accommodate the complexity of how video data is archived, retrieved and managed.

Video Management Software

The software interface that allows users to view, manage and retrieve live and recorded video; licenses should be maintained regularly for optimal performance and cyber protection

Analytics

Provides intelligence for proactive and predictive security as well as functionality, such as people counting and operational monitoring, moving system costs to an operational expense that provides ongoing return on investment (ROI).

WE ADD VALUE BY ENABLING:
Technology Selection Systems Interoperability Project Deployment

EMPLOYING ACCESS CONTROL SOLUTIONS

Access control is a fundamental part of the overall security platform in a K-12 environment. It encompasses both mechanical and electronic locking systems to provide a safe and secure learning environment for students and faculty. Access control is an integrated security system that extends beyond the school perimeter. It secures every door on campus including building entrances, offices, hallways, classrooms and common spaces.

COMPONENTS OF YOUR COMPLETE ACCESS CONTROL SYSTEM

System Software and Panels

Intelligence that controls who, when and where someone has access, as well as who can initiate a school lockout or lockdown.

Credentials and Readers

Identifies the person accessing the door and can provide positive authentication.

Electronic Door Locking Hardware

Interfaces with the access control system to secure academic and common spaces.

Free Egress Controls

Allows people to safely exit from any door and automates openings for the mobility impaired.

Infrastructure and Power

Provides connectivity of all components and reliable power for continuous operation of the access control system, including uninterrupted power supply (UPS) backup and surge protection of critical security systems.

Restricted and High-Security Key Systems

A foundational component of the system that secures both mechanically and electronically controlled doors throughout the campus.

WE ADD VALUE BY ENABLING:
Technology Selection Systems Interoperability Project Deployment