Classroom Locks Reviewed

Author: John Honovich, Published on Dec 18, 2012

Access control hardware cannot defeat a gunmen; but it can slow them down and buy precious minutes for responders to arrive. Locking classroom doors is one way to do this, but traditional hardware presents life safety issues. In the past decade, a newer style of lock - the 'Classroom/Intruder' Lock - has emerged as a key tool to slow down an attacker, yet stay code compliant. In this note, we examine this hardware and an example where it saved lives.

Traditional Locks

***** **** ********* ***** ** *** ** *** **** ** lock, **** ** ********* ************ ** *** *** ** *** day ** **** *** ********* ** *******. *** ******* ** room ******* ******* *** **** **** ******* *** ********* (** the ****) ****** *******. ** ** ********* *********, *** ******* needs ** ********** **** *** ********* ** ***** ** **** the **** - ******** *** ******* *** ******** ***** ** a *********** ****** *********.

******** ******** ***** *** *** **** ** ******* **** *************: because ** *** ********* ****** ** * *********, *** '***********' thumbturned ******** ******* ** *********** ***** ** *** ********* ** code. ** ** ********* ****** *********, *** ********* **** ** first **** ** ******* *** ******** ****** *** **** *** be ******, *********** **** *** '********* ******' ****** ***** **** require **** * ****** ****** ** **** * **** (**: turning * ***** ******).

******* ** *** *********** ** *********** ***** ** ** ********* situation, ***** **** ** ******** *** ********** ******** **** ******* - *** '********* ********' ****:

Classroom ****

********** ********** ** ** **** *** ** *** "*********" ******** locks, **** ************* **** ***** ***** ***** "********", "********* ********" ********, ** "********* *****" ************ ***** ***** *** ****** **** **** ****** ********* where ***** *** ***** **** **** *** ******** **** ******** classrooms.

**** **** ******** ********** ************ ** ********** *** **** ** be ****** **** *** ******. **** ** **** ** ****** key ********* ** **** ***** ****** *********** ***** **** **** have ** *** *******. ************, * ****** ******* ** ****, even **** ******, ****** ***** *** ***** ****** *** *** instantly ***** *** **** ** ******.

Operational ******

**** **** ********** ***** ******** *** "********/******" ********. *******, *** ******** ********** ** **** * "*********" ********************** * *** ** ** ******, ******** ** "********/****** *****" that *** ****** ** ****** **** *** ****** ** ******** a ****** ** ******* * ***** ****.

********* * *** ******* **** **** ********** ***** (*.*., ******** or ****** *****) *** **** *** ****. ** ******* ******* to *** ***** ***** ** ******-******* ********, ******** *** **** to *********** (** ************) **** ********** *** ******* ******* * knob ******. ****-**** ***** ** **** ****** *** ***********.

*********, *** **** ** **** ****** **** * ******* ******* a ******* - ********, *******, ***. **** *** ** * vulnerability, ***** *** ******* **** **** * *** *** ****** presence ** **** ** ****** *** ****. ****, *** ***** classroom ** ** ******** *** *** **** ****** **** ** lock *** ****. *************, **** *** **** *** **** ****** at *** ***** ****** *****. *******, **** ******* *********** ******** like ******* ****** ** *** *** ****, *** ********* **** the ********, ***. ** ****, **** ** ****** ** **** done.

**********

*********, *** ********** ********** ********** *** ***** ******* ******** ** the "*********" ******* ******* ** * **** ********** ** $** - $*** *** ****.

**** *** ******* ** *** **** ******* ** ****** ******** below:

  • *** **** ** ~$****** "********" ******** ****, *****
  • *** **** ** ~$****** "*********" ******* ** **** *******

*** **** ********/****** ******* *** ********* *** **** *********, *** the **** ******** *******, ******, *** ******** *** ********* *** either ****.

*** **** **** ******** ** **** ****** *** ******* **** existing ******* *****, ********* *** ****** ** ******* ********* ** working *****. ********, **-******* ***** ******* ***** ** ********* ** unlikely ** ******* *********** *****.

*******, ***** *** **** ** ************ ********** ****** ******* **** typically **** ******* ** $**** *** ****, ******** "*********" ******** hardware ** *** ** *** ***** ****** ***** ** ********** protecting ****** ***** ******* ********* *******.

Are **** *********?

**** ********* ******* ***** *** **** *********** ******* ****** *******, any ***** ********* ** ******** ************ **** ** ****** *** value.

** ****, *** *** ***** ****** ******** ***** ******* $***,*** ******** *** ********* ***** ** *** ******** **** *** **** F84 "********* ********" ****. *** **** ** *** ********, ***** involved *** *****, **** **** **** $*** *** ****, ********* installation ****.

** ****, * ****** ** **** **** ******** *** ***** measures ****** **** * ******* ********** ****-***** *** ***** **** knives ******* *** **** ****** **** *** ******* *** ** kill *** **** ** ******. ******* ******** ****** ***** ***** during **** *****, ********** *** ****** ****** **** ******** ********** and ********** ***** ***** ******** **** ******* ********. ****** ******* ********* *** *****:

"******* **** ******* *** ***** ***** **** ****** ******** ************** Scott ********'* ******** ** ******* ***** ** ********* ***** *** preventing [********] **** ******* ** *** ** *** ********.

"** ***** ** ****** ****** *** **** ** **** **** tough ********* *** ** **** **** ** *** ****** *********," Gilbert *****. "******** *** **** *** ***** *** ****** **** the ******. ****'* ********* ** ***** **. **** * *** to *** ******* *********, ****** ****, *** *** *** ***** in *** ******* **** *** **********, * *** *** ******** reach ***, ***** *** **** **** *** ******* *** **** it **** *** ****** **. ** *** ***** ******. *** teachers ****** *** ********** ****** ***."

** **** *********, *** ********** ** ******** (*** ******** ********** accordingly) *** ******** ******** ** ********** * *******.

**********

*** ********* **** ** *** ** *** ***** ********* *** simplest ************ ******* *** ****. ****** ******** ******** ** ********* for *** **** ****** ** ***** *******, ********* ***** *** a *** ***** **** *** **** ****** ***** ** ***** and ****** ***** ********* *******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Axis 2N Intercom Tested on Nov 08, 2018
Axis expanded its video intercom business buying Czech-based 2N in 2016. Despite competing against owner Axis' intercoms, 2N recently registered as...
Haven Targets School Security with Lockdown Lineup on Nov 08, 2018
Haven, a US startup founded in 2014 as a residential-focused company, has now raised funding and is offering a lineup of commercial grade locks for...
Directory Of Video Doorbells on Nov 06, 2018
Video doorbells are one of the fastest growing categories in video surveillance, especially among residences. The optimal placement of these...
HID: Stop Selling Cracked 125 kHz Credentials on Nov 05, 2018
HID should stop selling cracked 125 kHz access control credentials, that have been long cracked and can easily be copied by cheap cloners sold on...
Worst Products on Nov 03, 2018
Security integrators periodically report on their favorite and worst products to IPVM. These are known integrators who IPVM pays to answer surveys....
Solar-Powered, Smart-Phone-Based Access Kit (VIZPin) Examined on Nov 02, 2018
Cloud-based access control company VIZPin is releasing a solar-powered and smart phone based access control system for gates and other remote...
Building Occupancy Codes and Access Control Tutorial on Nov 01, 2018
A building or room's classification can greatly impact which building codes must be followed. In terms of access control, these 'occupancy codes'...
Resideo IPOs, Then Plunges on Oct 31, 2018
ADI and Honeywell Homes management have been touting their spinout and IPO for months, including appearing on Wall Street as they widely shared on...
Directory of Access Control and Intrusion Startups on Oct 30, 2018
This directory catalogs access control and intrusion detection startups IPVM has found noteworthy. The directory is provided for your review to...
Contactless Access Credentials Guide on Oct 29, 2018
Contactless credentials are the most common component used in an access control system and while many look alike externally, important differences...

Most Recent Industry Reports

Magos Radar Company Profile on Nov 12, 2018
Magos America General Manager Yaron Zussman admits when he first came across Magos, he asked himself: "What's innovative about radar?" Be that as...
Genetec Privacy Protector Tested on Nov 12, 2018
Genetec has built Kiwi Security's Privacy Protector into Security Center, an analytic which anonymizes individuals in cameras' fields of view...
Chinese Government Increases Hikvision Ownership on Nov 12, 2018
The Chinese government - Hikvision's controlling shareholder - is increasing its ownership of the video surveillance giant amid sharp stock price...
Axis: "No One Wants To Buy A Camera" on Nov 09, 2018
Axis has, in its own description, made a bold declaration: The industry is changing so rapidly that the following statement might seem bold but...
Video Surveillance Hard Drive Size Statistics 2018 on Nov 08, 2018
What is the most common hard drive size for video surveillance? 150+ integrators answered: What size hard drive do you most commonly use? What...
Axis 2N Intercom Tested on Nov 08, 2018
Axis expanded its video intercom business buying Czech-based 2N in 2016. Despite competing against owner Axis' intercoms, 2N recently registered as...
Haven Targets School Security with Lockdown Lineup on Nov 08, 2018
Haven, a US startup founded in 2014 as a residential-focused company, has now raised funding and is offering a lineup of commercial grade locks for...
Ubiquiti Protect Video Surveillance Profile on Nov 07, 2018
Ubiquiti has now been in the video surveillance market for 7 years (see our first coverage back in 2011). In that time, the company's revenue has...
Kogniz Silicon Valley AI Startup Profile on Nov 07, 2018
Kogniz is a Silicon Valley company that aims to bring AI analytics to security and surveillance, centering on their own smart cameras: We spoke...
Dahua Dual Imager Dome Camera Tested (HDBW4231FN-E2-M) on Nov 07, 2018
Dahua has introduced a dual-imager dome model, the HDBW4231FN-E2-M, with two independently positionable sensors including integrated IR, not found...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact