Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalSecurity NewswireAccess ManagementPhysical SecurityCase Studies (Physical)

Protecting 14 Campuses, All With Different Needs

By Security Staff
Campus building

Courtesy of AMAG Technology

May 23, 2025

Protecting any campus is a big job. Protecting 14 campuses and learning centers is almost herculean. But that’s what the security team of Portland Community College (PCC) in Portland, Oregon does for one of the Northwest’s largest college systems — with more than 26,000 students each term — every day and night, all year long. 

Symmetry for Places

PCC’s Electronic Security Systems Department Administrator David Squier describes the physical setup: “We’re spread out in the Greater Portland metropolitan area. We have four major campuses and 10 centers … the centers are smaller ‘mini campuses’ with maybe one large building on them.” 

Squier continues, “We have fiber connecting every campus and center. We have a central database, and the AMAG Symmetry server sits at our Sylvania main campus data center. 

“From there, we have just over 100 Symmetry 2150 controllers, mostly M2150 8DBCs, but in some of our bigger centers we might attach another M2150 8DC to that original 8DBC.

“Some of these buildings; they’re massive, like a mall. They are so large, with a huge number of controllers, that we’ve got things spread out between five or six different closets.”

“Then we have over 800 card readers, with electrified hardware attached to all those.”

Symmetry for People 

Each campus or center is in a different environment. Some are in or near the heart of town; others are more suburban. And each has its own unique needs. In one case, very unique: PCC leases space to several Oregon state government service divisions, so this means an entirely different set of access control and compliance parameters.

James Moir, PCC’s Public Safety Department Access Control Specialist, describes the day-to-day management of a big population that’s constantly coming and going.

“We’re probably one of the largest community colleges in the Northwest. We have about 835 readers and 3800 personnel we monitor. Full-time employees, casual employees, term employees, student employees, adjunct professors rotating in and out, vendors, other contractors … I get and manage access requests every day.

“And every term, the departments change a lot. We could be given a spreadsheet with anywhere from 10 individuals up to more than 80 who need changes in their access.”

These access needs can get highly specific, but the solution helps Moir handle them all. “When, say, a person wants access for specific dates and times, it’s really easy to do that … basically, I can program their card or individual cards to allow for specific dates and/or times. So they're allowed access to a certain area for just that time frame. That’s pretty cool.”

“We program for regular building hours, of course … and special access … we also preprogram for school breaks, holidays, and other days off. But we share some buildings with different tenants … for instance, the Oregon Department of Health. So we have to juggle their time frames and handle opening the building when school is out. Like Christmas break … the college is closed for almost two weeks, but the Oregon Employment Department is open, so we have to make sure our access readers and the doors of those buildings are working for them.

“Our department also handles reports for specific departments that are audited for federal funding. So we provide reports to those departments on a per-term basis.”

Moir and Squier both mention their appreciation of the solution’s programmable functions like “Card Watch” for investigations, and “Executive Command,” which allows card access by local law enforcement in a lockdown or other emergency.

“So if something should happen … law enforcement will have access to gain entry, saving minutes and seconds in neutralizing whatever threat we might have … and possibly saving lives,” Squier says.

Fairly recently, PCC upgraded Symmetry. Squier says, “We’re really happy with it.”

The updated version provides even greater ease of use and more-flexible functionality making Moir’s work simpler — even when he’s not at work.

“I love it … There’s so much stuff in here that we can integrate with other systems … I think this is a great tool for us to have. It’s so easy to use I’ve created a template for our department. If I’m gone, somebody could come in here and fill my shoes for a couple of days. I can do whatever I need to make a quick reference for somebody … it’s been great.”

Peace of Mind for the Security Team

At the end of the day, the solution helps security teams feel more secure, even in very large ecosystems. Squier concludes: “We’re one of the largest community colleges in the country. And you know, these kids … a lot of them … would not have a bright future without some kind of college education. Portland Community College is a way for people to get their way into higher education, to get their foot in that door … so, it’s so important that we have a safe place.

“That people feel safe … that they can come and focus on studying and learning more than worrying about things like security and all that other stuff that’s going on. It’s important to me, and I know everybody else I work with feels the same way. 

“We serve the community, and we just want these people to have a safe place.” 

KEYWORDS: campus security case study door controls

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Jewel Singh — Women in Security 2025

    Jewel Singh: Protecting Women At All Levels of an Organization

    See More
  • endpoint-sec-freepik1170.jpg

    Sustainable cybersecurity starts with protecting both sides of the entry point

    See More

Related Products

See More Products
  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing