Access Control: In With The New

June 1, 2012
Trans

It’s old, it’s outdated, it’s archaic – call it what you will. When the moment arrives when your card reader refuses to let you, your staff, or someone else who is authorized into your organization, it’s time for a change. How that change is done and how much it will cost is the hard part. But there’s good news: a switch might be on a smaller scale, like the Falls Church City Public School System in Virginia.

When the district switched from an individual client-based to a Web-based system, the school’s IT department was thrilled, says Seve Padilla, director of facility and security services for Falls Church City Public Schools. District administrators, on the other hand, did not relish the prospect of having to relinquish their computers to be added onto the system, which is what would have happened if Padilla and the IT department had decided to just buy the update for their existing system. Luckily for them, they didn’t.

“Our servers were aging, and we would have had to replace everything anyway,” says Padilla. “The Web-based system was considerably cheaper, with no additional hardware or replacements on the front end. We didn’t have to take our system down.

“We ran both systems, old and new, simultaneously for two or three weeks until I was sure that all the kinks were worked out. It was a gap-free transition period.”

But what about on a much larger scale, one where a two-week full-facility switch isn’t feasible? For example, Cuyahoga Community College (or Tri-C) has four campuses spread out across the Cleveland area, not to mention a variety of other facilities scattered in between.

“This has been a multiple-year shift,” says Richard Frank, director of fire prevention and security systems at Tri-C. “Everything we built or renovated over the past two or three years has the new systems, and we’re about halfway through replacing our current systems.

“We follow behind to check that everything is as seamless as possible. The same credentials that work today will work tomorrow, without users even knowing that there was a switch.

“Our goal is outstanding customer service,” adds Frank, whose previous experience includes a long stint in retail security. “If most people don’t notice the change, we did our job” — students are safer, and they don’t even know it.

“During operating hours, most buildings are open at the street level to everybody, but that doesn’t mean that there are no areas in that building with access control,” Frank says. “We have specific standards to judge how much security is required in, say, a computer lab or classroom, governing if we have to put access control on a room or group of rooms.”

Tri-C’s new system from AMAG and Karpinski Engineering Consultants integrates alarm and video with its access control capabilities to reduce false alarms and specifically tailor an area’s access control with its requirements. Frank had to adjust the system’s goals for each individual site, as the Tri-C campuses have some rather diverse sites, from hospitality management’s industrial kitchen-classrooms to the expensive equipment in the health technology careers department.

“We were very focused on each area when we integrated new access control,” Frank says. “We met with the leadership of that given operation so we can understand their hours, operations, equipment, etc., so we don’t create a roadblock to their future operations. This keeps people from trying to bypass our security measures.

“If we align ourselves with the operation, we get a much better response than if we were running a security dictatorship,” he says. “We just want to make security that fits so they can continue teaching. Other than our security staff, the end users have to know very little about it to keep doing what they normally do.”

Padilla, too, realizes that keeping new access control as simple as possible is the key to acceptance.

“Our last system was definitely designed for a military- or government-grade employee,” he says. “You had to know exactly what you were doing to get anything done. And with principals and staff moving between buildings and switching computers, it was incredibly complicated.

“Now it’s just an IP address and your credentials. Once you’re on the secure network, you log into the website and click on what you want, even from a smartphone,” Padilla says. “Everything that we had in our existing system, we didn’t have to rebuild. Even the wording’s the same, but the new icons are very intuitive. So there were no lags, no losses of information, and very little training needed. I can walk people through what they need over the phone, even.”

But why would you switch an entire organization over to a new system when certain parts of the old program still work? A unified, forward-looking system installed throughout an organization’s facilities helps to ensure ongoing security efficiency. Staff and students who move from building to building don’t have to deal with multiple access control systems, and credentials don’t have to be translated between facilities.

One set of credentials can get a qualified staff member into his or her authorized areas in a uniform, reliable manner, reducing the temptation to prop open doors, tailgate into restricted areas and ignore protocols (practically inviting risk over for dinner). If your organization decides to add a facility, the same card can apply there too. In an ever-evolving landscape, it pays to have a system that can grow, shrink or adapt to changes in a facility’s size or use.

The cost of changing the Falls Church City Public Schools to their new system from RedCloud, which brought with it multiple improvements and room for growth with fewer servers to maintain, was actually lower than the cost of upgrading their existing system. The changes to Tri-C integrated multiple aspects of the security system to maximize the number of unique uses for the program, including alarm video verification, people tracking and analytics, and multi-function access cards.

“Our older system had fallen behind the times, so we either had to update or find a new solution for our future operations,” Frank explains. “A new system is a better fit for construction and renovation, and it will stay current a lot longer. All in all, it gives us better bang for our buck.”

Both Padilla and Frank are able to access their systems from home to assist on-site staff, and Frank can even pull up video surveillance of what the dispatchers are looking at to help guide them through the proper actions.

“It’s a lot easier to discuss what they’re seeing when I can see it too, rather than them describing it to me,” Frank says. “So we can react faster and have fewer false alarms to keep from disrupting students and staff.”

 

Karen Keating

5 Steps for Converting Older Systems into Open Access Control Solutions

 

By Karen Keating, Ingersoll Rand Security Technologies,

Product Marketing Manager, Electronics

 

Converting to a more open system can be a daunting task, especially when budgetary restraints are pressing down on you. You may ask yourself, “How can I take advantage of new technologies using my current proprietary, legacy access control system?”

If your present system uses a Wiegand interface, it may not be difficult. With Wiegand, adding additional open system solutions such as smart cards, video and alarms interface systems, card system expansion to elevators, gates and remote doors, biometrics on high-security doors, and many more solutions are available to you.

Here are five steps to bring your proprietary system into today’s open world:

Step 1 – Verify software and panel boards. To optimize feature sets and cost-effectiveness, determine if your software and panel boards are up-to-date with the latest software and firmware. If not, consult your panel provider for information on upgrades and costs.

Step 2 – Meet with your integrator. Provide the information from Step 1 to your integrator. With this knowledge, your integrator can determine the limits of your present system. They will need to know

  • What software version do you have?
  • What version of your controller board(s) are you using?
  • What credentials are being used?
  • What other types of peripherals, such as electronic locks, are in the system?

Step 3 – Share your vision. Discuss with your integrator what you want to accomplish. Don’t worry about products to add yet.  Just concentrate on your security needs.

  • What are you trying to protect?
  • What are your immediate needs?
  • How might you improve your system beyond those needs?

Step 4 – Ask your integrator to get creative. How far can you expand your system without replacing present equipment? What’s the cost of expansion versus an entirely new system? Will this expansion stand the test of time?

Step 5 – Emphasize future proofing. To avoid revisiting this situation in the near future, ensure any new solutions are flexible enough to change with upcoming security trends such as these:

  • Smart cards will be the credential of choice in the near future. If you presently use proximity cards, make sure new readers are multi-technology, able to read both proximity and smart cards. Once the switchover begins, you won’t need to replace them along with your present legacy readers.
  • It’s going to be a hybrid credential world. Although smart cards may be the credential of choice, multiple types of credentials, such as key systems, PINs, various types of cards, and biometrics, will still be necessary for certain operations. You want one system to manage all of them.
  • Be ready for new technologies such as NFC. With NFC-enabled smart phones, users employ their own smart phones as an access credential, just like a smart card. Are the readers you will be using NFC ready?

Following these five simple steps, you’ll be surprised to see how easily you can convert from your current access control system to a cutting-edge open systems security solution.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Claire Meyer

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

September 2014

2014 September

In the September issue of Security Magazine, find out who this year's most influential people are in the security industry are. Also, take a peek at the technology products that ASIS 2014 will be showcasing at the upcoming event. Read about the lessons learned from security at the World Cup, find out why tactical medical training is a must for your enterprise and how Atlanta increased security by sharing surveillance.
Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+