Logo for: Threshold Visitor Management Systems

About this blog

We write articles mainly about visitor management, which helps you to know who is (or has been) in your facility. It is just part of an organization’s physical security processes that protect people and property within and around a building or campus.



Meet the bloggers

Paul Kazlauskas About me › My posts ›

Andrew Jones About me › My posts ›


How can I customize my visitor pass design?

Tuesday, November 18, 2014 by Paul Kazlauskas

PlaceholderCustomizing visitor passes adds value to any facility's visitor management security. Deter forgery and promote your facility name with our custom-printed solutions.  Design your own badges - we make it easy! Add your logoAdd your facility name and/or logo to any custom-printed badge. Most badge styles allow for both a name imprint and a logo/mascot. We can imprint any image in black or color (additional charge applies for color imprint). Change the titleChange VISITOR pass to ...

Read more 

"He had no visitor's badge"

Wednesday, April 23, 2014 by Andrew Jones

Placeholder"A Campus Response to Crisis," an article by Gregory Richter in the April 2014 issue of Security Management magazine, explains how a campus response team helps implement a university's violence prevention plan. "One typical sunny afternoon in south Florida in 2013," Mr. Richter's story begins, "a man entered the administration building of a private university. The man walked straight by the receptionist, announcing the name of the university employee he came to see, and emphatically stating ...

Read more 

10 Steps to Creating A Campus Security Master Plan

Friday, February 14, 2014 by Paul Kazlauskas

PlaceholderStep 1: Assemble Your Committee It is important to obtain support from those who will benefit and/or be affected by the introduction of new processes or change to existing procedures. Step 2: Determine What Must be Protected Committee members must classify what is critical to the operation of the campus. Step 3: Think About Your Long-term Needs The security master plan’s development should also include long-term system compatibility, communication infrastructure, product obsolescence ...

Read more 

«  previous  |  27 28 29 30 31 32 33 34 35 36  |  next  »Displaying posts 176 – 178 of 178