sepetember 2025
// Trends & Industry Issues
Active Shooter Solutions — Planning for the Unknown
The security integrator’s role in helping customers plan for the unthinkable requires specialized knowledge of both solutions and best practices.
by Karyn Hodgson, SDM Editor


Mike Harrison of WDS says his company has seen a sharp increase in demand for proactive, layered technologies to active shooter threats. Image courtesy of iS3 Tech Services. Background image / Bulat Silvia / iStock / Getty Images Plus / via Getty Images.
SHARE
Columbine. Sandy Hook. Uvalde. Pulse Nightclub. Virginia Tech. A Fourth of July parade in Illinois. A movie theater in Colorado. A church in Detroit. A concert venue in Las Vegas. The list of tragedies could fill an article on their own.
Sadly, active shooter situations have become an every-town problem — and a nearly every-week problem. So much so, Scott Keplinger, CEO, IntelliSee, a Coralville, Iowa-based manufacturer of an Al-powered risk mitigation platform, notes that, “Shootings happen all the time now, so fewer make national news unless they’re the worst-case scenario.”
But, faced with a tragic event that can happen literally anywhere, those who are tasked with recommending, designing, installing, and maintaining security systems need to prepare customers for it to potentially happen everywhere.
Justin Kelley, vice president of global operations for the enhanced protection services division, Allied Universal, Irvine, Calif., acknowledges that a lot of customer interest in these types of solutions is still event-driven. “They see something that has occurred and was the same demographic they live in and think maybe they should be concerned,” he explains. “It is not just big cities. It can be very rural, and they think, ‘If it could happen there, it can happen to us.’ … Everyone talks about Columbine. It wasn’t the first, but it was the most severe and an eye-opening experience.”
More than 25 years after Columbine happened in 1999, schools are still a primary client base, Kelley says. Subsequent school shootings — no state has escaped this epidemic — have created a host of unwilling experts who speak from experience, as well as a number of other informed resources designed to help, such as the Partnership Alliance for Safer Schools, or PASS, formed in 2014 by the Security Industry Association (SIA) and National Systems Contractors Association (NSCA). PASS provides safety and security guidelines, checklists, and other resources to schools, which can be adapted for other verticals.
While many of the most high-profile and tragic incidents in the past occurred at schools, the technologies and strategies developed to help prevent and mitigate incidents in those settings can today be considered best practices in a wide variety of scenarios. It is imperative for security integrators to get familiar with these assets, if they haven’t already.
“There was definitely a rise in active shooter events in 2024, and the occurrences were moving from isolated markets (i.e. schools) to other venues,” says Scott Lord, solutions consultant, ECC, a Lincoln, Neb.-based integrator. Lord also serves on the PASS Advisory Council and is the PASS Technical Committee co-chair. “This has caused more end users to reach out for active shooter solutions. In addition, many end users already have the basic technological components of security — access control, video surveillance, and emergency alerting — and are looking for the next technology to further enhance their security.”
Kirk Evans, director of sales performance, Security 101, West Palm Beach, Fla., says most of his company’s projects today touch on active shooter solutions in some way. “Whenever you are looking for a comprehensive security posture of your campus, I think it has something to do with either pre-screening, proactive alerting, and/or AI and analytics that can help with an active shooter solution. It has absolutely increased maybe 1,000 percent. Everyone’s security plan today has something to do with it due to the nature of our business.”
Mike Harrison, chief visionary officer, WDS, powered by iS3 Tech Services, Atlanta (featured on this month’s cover), agrees, noting that, “Schools are the folks that need it the most.” However, he says other verticals are not far behind, with hospitals, large corporations, and data centers recently showing more interest in securing their facilities from a weapons threat.
“This has become a significant part of our work over the past few years,” Harrison says. “We’ve seen a sharp increase in demand — not only for gunshot detection but also for proactive technologies like visual weapons detection, intelligent camera analytics, and weapons screening systems. What started as a reactive conversation is now becoming a strategic conversation around layered, proactive defense.”
The Layered Security Approach
Those most versed in active shooter solutions — both integrators and solutions providers — universally say the same thing when it comes to these types of tragedies: there is no one policy, technology, or product that will work on its own. It takes a layered approach. What does that look like, typically?
“Every venue poses a different challenge,” Kelley says. “The bottom line is the venue wants to push out that threat. They don’t want it on their doorstep. If they can push that by using different technologies or even divert the threat entirely, that is what we look at. … Not every technology will fit, so you need a layered approach. You can’t have just one single go-to solution.”
Timothy English, managing director, Acoem, Grants Pass, Ore., explains the typical layers of an active shooter solution, of which gunshot detection products like Acoem's are just one part of a whole ecosystem: “The first element is the prevention piece, limiting access to the facility and controlling the traffic flow,” he says. “From an integrator’s perspective, that is access control or barricades, locks, and other hardening devices. Then you have detection like cameras and license plate reader systems and solutions like gunshot detection systems. Finally, you move to response, where, if you do see a threat, you have systems that can lock doors automatically, notify police, and execute the emergency procedures you have created for this scenario.”
Acoem’s gunshot detection technology is a reactive technology, English explains. “If a gunshot occurs, you need as much information as you can get. Our system detects a gunshot from a single location and instantly redirects a PTZ camera to home in, get associated video, a map, and audio alert,” he says.
Shot detection systems like these from Shooter Detection Systems, an Alarm.com company, are another type of sensor that could be added to any environment where other types of sensors — such as fire and intrusion — are used. Image courtesy of Alarm.com

Acoem’s gunshot detection system is designed to operate outdoors using as few as one sensor, integrated or tied into a PTZ video camera, which will home in on the direction of the sound within seconds. Image courtesy of Acoem

“Not every technology will fit, so you need a layered approach. You can’t have just one single go-to solution.”
— Justin Kelley, Allied Universal
Technology Matters
When it comes to active shooter solutions, the technology options are wide-ranging, but mostly familiar for security integrators. But there are differences in how to approach, sell, and service these solutions.
For example, Timothy English says Acoem’s solution can be offered as a service. “It is an opportunity for integrators. If they are already doing a monitoring service for video or other alerts, they can also monitor gunshot detection as a service.”
This is also true for Shooter Detection Systems, after it was acquired by Alarm.com, according to James Reno. “We bought the solution for our own building before we acquired the company,” he says. “One of the things our CEO and executive team recognized was that this is something everyone should be able to have. We reduced the cost of the sensor by about 70 percent and moved it to an RMR model, so there is a lower CapEx and it is more OpEx friendly. We have both an on-premise and cloud version, so if the integrator would like, they can sell it as a service.”
But recurring revenue models can come with challenges for some integrators, says ECC’s Scott Lord. “A lot of the solutions are cloud or recuring revenue service, which is a model that, while integrators are getting better at, is not the traditional model of integration sales. Many of the weapons detection manufacturers have their own marketing arm, and integrators are more of a VAR for [these systems]. … This integrator is still working on how to show value from the integrator perspective.”
It’s also very important to vet new technologies and choose carefully, particularly when it comes to artificial intelligence.
“AI is coming fast and changing quickly,” says Dean Drako of Eagle Eye Networks. “The key is to deploy an open platform that gives you flexibility … because two years from now, a customer will want to change it.” Eagle Eye is both cloud-based and open, allowing for this type of flexibility, he adds.
“A lot of new technology comes along very quickly with AI platforms, facial recognition and weapons detection,” English says. “Carefully evaluate claims providers are making to make sure it is the right and viable solution for the customer. Make sure you are partnering with strong technologies and AI platforms that are founded on very good data.”
This is advice Mike Harrison of WDS says his company takes to heart. “There certainly have been a lot of advancements in AI, and we are personally excited about that because it is only getting better and better every day. There will continue to be more breakthroughs and evolution in weapons detection by coupling it with other AI models that can help predict. But any time we decide to bring on a new product, we first thoroughly vet it in-house. It is a representation of us, and we want to make sure that what the manufacturer says it can do, it can actually do. We are constantly testing new features that come out. Some are good. Some are not.
“Integrators and end users should proceed with caution and do their own research,” Harrison continues. “Always ask not only for demonstrations but live demo setups at their facilities before they make a decision.”
Despite the challenges, the vetting process is worth the rewards, says Alex Puorro, vice president – IP Endpoint Technology, AtlasIED, Phoenix. “An integrator might be tempted to stick with what they are used to, even though it is antiquated technology. Getting out of their comfort zone to try a forward-looking technology can be tough, but I’ve found that creating a robust lab for testing can help alleviate some of those concerns. Getting trained on the newer technology solutions can also greatly help an integrator quickly understand how powerful a technology-focused solution can be for their end users.”
Solutions like those from Acoem, designed for outdoor use, and Shooter Detection Systems, which are primarily used inside (although they do have a recent outdoor offering) are newer additions to the mix. James Reno, vice president of North America commercial sales, Shooter Detection, an Alarm.com company, Tysons, Va., says security integrators should treat them in a similar manner to any other alarm. “I think if we could get integrators to think of shot technology as more of a sensor in the ecosystem and not a whole system, it would help with risk assessments. I think every lobby in America could easily have one of these.”
The video surveillance component is a more familiar part of the layered approach for security integrators. But thanks to AI, that has become a more complex piece of the puzzle, says Dean Drako, CEO, Eagle Eye Networks, Austin, Texas. These systems are now commonly used to provide “brandished weapons” detection, spotting weapons using trained AI algorithms.
“The dealer or integrator has to be very involved in camera placement,” Drako explains. “You can’t necessarily use existing cameras to do this type of detection, so you want to make sure you get the appropriate views and angles to achieve accurate detection.”
Then there is the issue of what to do with the alert once it is received. Any alert needs to reviewed, either by AI or a human. If done by the AI engine, there are potential false alarm issues, Drako advises. “You have to think, are you willing to tolerate a false alarm now and again or not?” Then there is the question of who gets the alarm, and how? All of these are things the integrator needs to assess and discuss with the customer.
In the hierarchy of layers, AI brandished weapons detection would come before shot detection, Drako adds. “What we are focused on in the AI world is detecting you have a problem earlier so you can implement a lockdown. Defense comes in layers. … Brandished weapons detection is just another layer that fits into that toolbox for the reseller or customer to use in crafting their solution.”
Eagle Eye also is also involved in the communications layer after a gun is detected or discharged, Drako says. “Eagle Eye 911 camera sharing will immediately share relevant cameras with 911 call centers so they can see who has the guns, what kind of guns, and where they are going. So, when first responders arrive, they know exactly what they are walking into.”
From perimeter fencing to lockdown solutions and emergency communications, all of these elements are important to consider when speaking with a customer, Evans says. “To be clear, there are very specific products that can help more than others with an active shooter, but it depends on what your goal is. If everyone had an unlimited budget, they would all have gun detection and AI shot detection.” Evans says his company has even used AI and video analytics to create “virtual fencing” to make an electronic fence line.
“If there is going to be that incident, it is better to be outside than inside,” he says. “We want to identify and act upon an incident as it begins, not after it has already happened. Access control and video and gun detection or shot detection are all used in those situations.”
But don’t discount the technology the customer may already have in place, either, Evans says. While newer technology is great to have, not everyone can afford it or implement it everywhere necessary all at once. “Quite frankly, I don’t believe 75 percent of campuses are using the majority of these systems,” Evans says. “The best first step would be to put the easier-to-implement solutions in right away and worry about the AI in the future. … There are so many significant parts and pieces to a security plan, it will never be 100 percent. We [first] use the existing technology they have and try to bolster it.”
Harrison has had similar experiences with customers. “We typically work from the perimeter in, and that starts with a visual or brandished weapons detection solution. In most cases, we can use existing cameras for that if they are a new enough model and high quality. There is a certain threshold we don’t want to go under, but, a lot of times, existing cameras work pretty well.
“Then we might integrate access control into that solution so that if a gun is detected in the parking lot, they can implement a lockdown,” Harrison says. “The third layer could be concealed weapons detection, similar to a metal detector, but only looking for firearms. Layer four would be the gunshot detection. Hopefully, we stopped it at the perimeter, but, if not, this information would go to law enforcement with map sharing and live video feeds to provide intelligent, actionable information, such as what they look like. For us, that is the ultimate goal in what we do: Either prevent the incident from happening, or, if it does happen, drastically reduce the response time and save lives.”
It boils down to the idea that no one product or solution is the panacea, Keplinger says, noting that it is important to have a multi-layered strategy that includes both “old school” and “emerging” solutions. “No organization can update their infrastructure to the latest and greatest all at once, so it is important for new technologies to work with and enhance existing infrastructure, people, and processes. For example, most schools now have security cameras, video management systems, access control, public address, and so on. Some emerging technologies are enhancing those versus replacing or competing with them.”
A Critical Consulting Role
While most security projects these days involve a consultatory approach, active shooter solutions require even more specialized knowledge — or at least the ability to bring in the right types of experts to bolster an integrator’s in-house expertise. This goes beyond just a technology review, Harrison says.
“Throughout our history, iS3 has always tried to uncover their specific needs,” Harrison says. “All differ in terms of where they are in their journey. They might have legacy systems or nothing at all. … Our job is to poke and prod and do deep site evaluations and assessments, talking to all the folks involved in the success of their environment.
“As weapons detection systems started to emerge in the marketplace, the few companies promoting them were manufacturers, and sometimes they were selling direct,” Harrison continues. “When your only solution is a hammer, every problem is a nail. There was little effort to uncover what the real issue was. … Even from the integrator to end user side, it was all about products and what these systems can do. There weren’t any conversations about, ‘What then? You detect a gun, but what happens next?’ It left the end user with a question mark and not much advice from either the integrator or manufacturer side to help them craft that response.”
Harrison's company saw a need in the marketplace and decided to create a new division dedicated to weapons response called Weapons Detection Systems, or WDS. But, starting out, Harrison recognized they needed help.
“As integrators, that wasn’t really a place of comfort for us because we weren’t the subject matter experts,” says Harrison. He sought guidance from outside organizations, including retired CIA and FBI personnel with expertise in active shooter scenarios. Eventually, he decided to bring them in as full partners and create WDS as an in-house division, with the goal of it becoming an independent entity that could be offered as a service to other integrators.
“A lot of what we do is education and informing customers of certain risks and how to mitigate them,” Harrison says. “We found this separates us from our competition and others who aren’t talking about that.”
Specialized knowledge is key for Allied Universal as well, Kelley says. “We definitely have experts in-house and use them very often. The first step is to start with the assessment of the place, whether it is a school, company, or campus. It starts with sitting down across a table and discussing what they think they might need. Next is that risk assessment, whether on the cyber or physical side, or both. We feel a well-run, coordinated risk assessment will tell us what we need to know. … Ask the client where they think their vulnerabilities are, and through that risk assessment, you will either prove or disprove that.”

Mike Harrison shows some of the technology available from the company’s new Weapons Detection Systems division, designed to be an all-inclusive solution for both end users and other integrators. Image courtesy of iS3 Tech Services
“For us, that is the ultimate goal in what we do: Either prevent the incident from happening, or, if it does happen, drastically reduce the response time and save lives.”
— Mike Harrison, WDS
The Human Element
The best technology in the world can’t overcome the most critical aspect of active shooter deterrence and detection: the human factor.
Part of Allied Universal’s approach involves the human intelligence side of security, Justin Kelley says. “There is no such thing as ‘bad intelligence,’” he explains. “What are people saying on social media about your school? Your staff? Historically, in an active shooter situation, there is often some inkling beforehand, and all that information is available to us. … If we don’t gather the right information into your security plan, you can only plan for so many ‘what ifs.”
The human element is a critical component of the success of any active shooter solution, Kelley says. “Here is great example: I spoke about a month ago with a school in Pennsylvania that had had an incident. A student, who was expelled the previous year, expressed online that he thought the expulsion was unjust, and he was planning to go back. Through a friend’s dad, he bought weapons and brought them to school. He was seen on a video screen by a parent who knew he wasn’t supposed to be there and said something to the administrators. That stopped what could have been a horrible situation. … It shows you are never going to get rid of the human element. It is not a matter of just technology. AI is here and only going to get better, but it still becomes a matter of what you do about it. How do you cull that person out of the crowd, deny them access, and get to them quickly?”
Another aspect of the human element involves active shooter drills — an increasingly common thing in schools these days.
But there is a caveat to drills like this: often, active shooters are students or employees who have had the same training as those who are trying to escape or hide. “We learned from Newtown; that was someone who knew the nuances of what those drills trained people to do,” Kelley says. “You can do a great job of education, but, sometimes, the bad people are also trained in the process.”
Alarm.com’s James Reno adds, “It’s hard to plan against someone who already knows your response plan.”
Mike Harrison of WDS says there is a growing awareness that technology alone isn’t enough. “The most effective deployments are backed by strong internal policies, trained personnel, and a clear chain of response. We work closely with our clients to help ensure their systems are not only deployed properly, but [are] fully understood and supported by the right people.”
Scott Lord of ECC agrees, “The technology is only as good as the process and people, and there is a misconception that it is ‘easy’ to implement the technology — and from the install standpoint, it is easy. However, the entire process, from people moving through the system to what happens on an alert and after an alert from the systems, is what determines whether the technology does what the customer expects.”
While the human element may not have traditionally been part of the integrator’s role, when it comes to active shooter solutions, it should be, says 911inform’s Shannon Torres, a retired police chief.
“Don’t just give clients, who are real people pulled in 100 different directions, a ‘by-the-book’ answer — work with them on real-world applications,” Torres says. “The best solutions are user-friendly, flexible, and actionable. Keep communication open, and emphasize the importance of training, drills, and tabletop exercises. It’s not just about having the right tools — it’s about developing muscle memory and having practical resources, utilizing technology to enhance operations, so people know exactly what to do when seconds matter.”
Security 101’s Evans agrees: “One of the things we coach internally is whenever one of my staff shows up and a customer says, ‘I want cameras,’ we need to have a conversation and ask, ‘What are you trying to do with those cameras?’ We have to evolve as integrators and become subject matter experts and solution providers. Sometimes, our customers ask for one thing when they might really need something else.”
Another element to the consulting side — particularly for school clients — is the budgetary aspect, Kelley adds. “Some schools struggle with funding, and that is always first and foremost,” he says. “I have worked with school districts that have had active shooter incidents and even those have had a tough time getting budgets passed for security.”
Some integrators get involved in helping schools find grants and other resources to help pay for security solutions. “At our company, we have a third-party grant writing team that works with customers that ask for that help,” Evans says.
“Every facility is different, with different levels of what they are capable of doing and how to fund it,” English says. “Some rely on their security partners for the whole thing, from designing to installing and integrating, through to maintenance and support. … Many integrators are prepared to help along the whole process.”
While having that depth of knowledge involvement might seem daunting for those not as well-versed in it, IntelliSee’s Keplinger advises taking a closer look at the in-house skillsets they have already developed. “Security integrators and dealers should and can play a very important role in helping with this critical issue,” he says. “As experts, they should proactively share their expertise and recommendations with their current and prospective customers. Many integrators and dealers undervalue the amount of experience and expertise they’ve gained. They lose sight that the organizations they’re serving don’t and won’t have that knowledge base. These organizations also want and are seeking guidance.”
Key Advice for Integrators
While security integrators shouldn’t count out their expertise, they should also be realistic and know when to ask for help, Harrison advises. It shouldn’t be just an add-on product or service without also adding the expertise to go with it.
“Our advice? Think twice before jumping into this space without full commitment,” he says. “Active shooter solutions are not just another product line — they involve tremendous liability, require deep expertise, and come with risks many integrators underestimate. Everything from insurance costs to messaging risk from sales teams to improper integration or response protocols can create real-world consequences. This isn’t an area where you can afford to ‘learn as you go.’ It has taken us years of focused effort to build the right processes, partnerships, and specialized knowledge to do this work properly — and we still approach every project with humility and discipline.”
That is one reason why Harrison’s company created a separate WDS division, he says. “We’re happy to collaborate with other integrators who want to offer these solutions responsibly. We often work alongside integrators as their weapons detection and active threat response partner — helping them deliver value to their clients without taking on the burden of building this capability from scratch.”
Shannon Torres, retired chief of police and customer success manager at 911inform, Wall Township, N.J., agrees. “When it comes to practical application and real-world deployment, it’s critical to rely on seasoned professionals — those with both field experience and technical knowledge. It’s not just about selling a system; it’s about making sure it’s deployed effectively and serves its intended purpose.”
These professionals could be an expert consultant, partner integrator, manufacturer partner, or a combination of sources, Kelley says. “I would want to affiliate myself with other integrators, or a company that just does this type of security and has subject matter expertise in a variety of settings.”
When it comes to the technology part of the equation, English cautions against just sticking with what you know and not looking for other partnerships. “They need to be that trusted consultant and not just a reseller of whoever they happen to have the best deal with. They need to be well-versed on what is the state-of-the-art.”
Kelley advises, however, not to go too bleeding edge too quickly. “Get your basic blocking and tackling down, then look to the add-ons. Integrators wouldn’t be doing their job if they weren’t looking at technology enhancements, but be willing to say to the customer, ‘You are fine with what you have’ and work 18 months down the road. If it isn’t broken, don’t fix it.”
Active shooter solutions can be complicated to deploy, Drako says, so it is critical to manage customer expectations. “First off, you need to articulate to the customer that it is a new technology, and it is not perfect,” he says. “The key thing is not to oversell it. Sell it as a layer you want to have, but just one layer in a defense system. It is never going to be perfect. … This is the danger of people thinking it will solve all their problems.”
Embracing these emerging technologies and solutions does take commitment, Keplinger says, from truly understanding the solutions to committing the resources for sales, training, and marketing. “Because these technologies aren’t yet commoditized, dealers and integrators can do well with them; but the downside is, it’s a much more involved, consultative sales process versus responding to an RFP.”
One thing is certain, however. Active shooter solutions are something customers are increasingly looking for and something integrators should be prepared to talk about, Keplinger adds. “It’s a tough topic to discuss, but I highly recommend proactively bringing it up at every organization. It’s too important a topic, and the trends are too alarming to ignore.”
15 Questions to Ask in a Risk Assessment

Image Courtesy of Allied Universal
Allied Universal’s Justin Kelley suggests starting an active shooter risk assessment by asking your customer a version of the following 15 questions:
- What type of business or facility do you operate, and how many locations?
This sets context for risk profile and operational complexity. - How many employees, visitors, or customers are typically on-site at any given time?
This helps gauge potential impact and response requirements. - Do you have a dedicated chief security officer, security director, or manager solely responsible for workplace security?
This identifies accountability and leadership for security. - Have you ever experienced, or have credible concerns about, workplace violence or active shooter threats?
This reveals risk history and current level of concern. - When was the last time a risk and vulnerability assessment was conducted on the property?
This shows when threats were last evaluated formally. - What security measures are currently in place to prevent, detect, or respond to active shooter incidents?
This establishes the baseline posture. - How is access to the facility gained by employees (i.e., key cards, biometrics, traditional keys)?
This identifies physical access controls. - Are mail, deliveries, and packages screened? Are they delivered directly to the facility or handled off-site?
This highlights a commonly overlooked threat factor. - Do you have a documented active assailant or workplace violence response plan?
This confirms planning and readiness. - How often do you review, test, or update emergency response plans and procedures?
This helps ensure plans are current and actionable. - Do employees receive any training or participate in drills for active assailant scenarios?
This evaluates employee preparedness and awareness. - How would you communicate with staff, visitors, or customers during an active assailant situation?
This identifies strengths or gaps in mass notification. - Do you have established relationships and coordination with local law enforcement or first responders?
This confirms whether or not they have external partnerships in place. - Are there known areas of concern, i.e., unsecured entries, blind spots, or lack of safe rooms?
This pinpoints vulnerabilities to address. - What level of investment, urgency, and decision-making process is in place to improve security measures?
This clarifies budget, timeline, and next steps.
SHARE