Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Meeting Tenant Needs

February 24, 2003
Built in 1932 and then called The Commerce Building, it’s no New York skyscraper. Only 16 stories tall, nonetheless the facility is huge — covering an entire city block, from 15th Street to 16th Street and from Eighth Avenue to Ninth Avenue. There is 2.8 million square feet of floor space, and in the beginning, it was reported as the second largest building in the world.

In the 1960s, the Port Authority of New York, the original builder, sold the building to a private interest.

It would be another 30 years before the building caught the eye of one of the leading developers and operators of telecommunications properties in the U.S., Taconic Investment Partners LLC. The founders, Paul Pariser and Charles Bendit, saw the building at 111 Eighth Avenue as having great potential for multiple company office space use.

New Security Plan Needed

The advantages that the building offers such high-tech entities are its 15-foot ceilings, 23-foot column spacing and 200-pound floor loads, ideal for heavy racks of equipment.

The one amenity lacking, however, was an adequate security system. For decades, the building was open to anyone.

“It is a problematic building with four major tenant entrances, several loading dock entrances and several freight openings,” says Andrew Nick, principal for Taconic. “It is a big building, and the entrances are spread far apart.”

The tenants include 35 telecommunications companies that specialize in telephone traffic, data traffic and switching and Web hosting. The building is also home to many non-technical corporations.

The investors hired Aggleton and Associates, an independent security consultancy in New York City, to assess the problem. Bob Hardy, vice president and senior consultant, led the task. “We did a risk assessment of the building and an in-depth study of the structure and its operations. We had to determine the staffing level of security people, how the building would be accessed by the public and the type of tenancy.”

Building, Tenant Needs

The investors completed the design process, concentrating on the areas that were a concern to all parties. Each company would still provide its own access control within its area, and the parking garage security would still be maintained by an outsourced party. The actual access into the building, though, was the challenge of the consultants and, ultimately, of the system integrators.

After thorough consideration, the contract was awarded to Siemens Building Technologies Inc. in late 2001.

“Siemens had already been a great success in the building,” says Jim Rice, project manager for Taconic. “They had just completed the installation of the building management system, which monitors the HVAC, energy system, fuel farm and back up power generators and is linked to the security command center as well as having remote access capabilities.”

“The closed building concept ensures that no one and nothing enters the building without being tracked,” says Phil Agranoff of Siemens. “Unless you have a valid access card to enter through the turnstiles, you cannot access the building without going through the one of the three visitor’s centers.”

An Integrated Approach

In choosing the products to meet the stringent criteria, Agranoff says he looked at four or five of the “best of breed” for each part of the system. The final solution included optical turnstiles with glass barriers, electronic access control, digital CCTV, a visitor management system and a package management system.

Roughly 6,100 tenants who enter the pedestrian lobbies during the workweek must present their proximity card to the reader installed in the fully motorized, bi-directional pedestrian gate. The 47-inch-high panels are 0.5-inch-thick, clear safety glass, framed with stainless steel. The gate is activated by badge readers, which were manufactured into the frame.

The access control system, Software House C-Cure 800, Model 40 redundant, controls the 78 HID ThinLine II proximity card readers and Corporate 1000 proximity cards. Tenants’ cards are printed with Software House’s C-Cure Vision, a badging program with digital photo ID capabilities.

Visitors may enter through any of four visitor centers located in the pedestrian lobbies, each of which operates on its own workstation. Three visitor processing stations are located on the 15th Street/Eighth Avenue lobby, and one is located at 15th St./Ninth Avenue.

The visitor center uses STOPware’s PassagePoint Visitor Management system with Photo Capture, and ties to C-Cure’s database for linking tenants to visitors and recording visitor access and egress.

Visitors present a driver’s license or another form of valid identification to the security attendant, who then photographs each visitor and records a digital signature before supplying the guest with a color-coded, dated pass that includes the visitor’s name, company and photo.

At the 16th Street entries, two similar visitor centers are for contractors working for the building management or a tenant. “The contractor center lets us know what crews are in the building, how big the crew is and where they will be working,” says Jerry Dunleavy, director of fire and life safety/security for Taconic.

Package Delivery Security

The building further tightened security by installing a messenger center and a delivery area at the 16th Street, Eighth Avenue loading dock area. Uniformed, bonded delivery services are authorized to enter the building and deliver packages. The messenger center accommodates all other incoming and outgoing packages delivered by foot and bike messengers, says Agranoff. “There are four workstations for package processing. The package is processed and barcoded, after which the in-house couriers deliver the package to the tenant.”

The couriers carry a wireless Palm-enabled, handheld PDA with signature capture and barcode reader. As each package is picked up and delivered, the courier prints out and attaches a barcode to the package, scans the barcode and obtains signatures from the origination and destination party in the building. The barcode and signatures are then synchronized with the PassagePoint delivery tracking system to ensure accuracy and accountability for each package.

Directly adjacent to the messenger center is a delivery area for food, beverages and flowers. “The delivery comes in through the freight entrance in the loading dock,” says Dunleavy. “The delivery person picks up a phone to call their customer, and places the delivery at a desk. The customer must then come down to pick up and pay for the delivery.”

Kalatel’s KTC 215C fixed cameras complement the extensive access and package control system, and are monitored by Kalatel’s DVMRe-16CD CCTV digital video management system. The system is Ethernet ready for both onsite and remote monitoring, and displays live video from up to sixteen cameras in multiscreen, full-screen or sequencing full-screen modes.

Security guards man the system and the building 24/7, 365 days a year. Dunleavy says that this is above and beyond the requirements of the city, which does not require manned security unless there are at least 100 people above the first floor or below the ground floor after normal business hours.

Wiring, Communications Challenges

The challenges in outfitting such a large building were numerous, says Rice. “The electricians had to drill through the one-foot-thick, concrete floors to install the electrical wiring for the turnstiles and card readers. Every cable run had to go the full length from whatever floor it was on — or whatever side of the building it was on — to the control center.”

That was no easy task, as the wiring alone required about 45 miles of cable. “We had a good relationship with the electrical contractor,” says Bob Smith, project manager for Siemens. “I met with them daily, working with drawings, ordering and delivering equipment, and implementing all of the change orders throughout the installation.”

Because the building is so immense, and built of solid concrete, radio communications were tenuous at best. To improve the system for the multiple departments that used radios within the building, Taconic had the building equipped with a repeater system. The result was a digital/analog, UHF frequency repeater that is part of a network of 6,700 feet of cabling through the floors, roof and elevator shafts to provide five separate repeater lines.

Four of the lines are for building management, including the departments of engineering, security and housekeeping. The fifth is a dedicated line for the Fire Department. “We keep it on a lockdown switch so that when the fire departments respond to an emergency,” says Dunleavy, “We can activate the repeater antenna system. The system ensures the operability of their radios, from the chief staff cars to the hand radios of the firefighters wherever they may have to go within the sixteen-story building.”

The final testing for the system was set up in three segments, as each section of the project was completed, said Smith. “We tested and received approval on the as-built drawings for electrical and electrical-mechanical tubing routing. We did point by point tests of all the access controlled doors, cameras and locations, turnstiles, and made sure the customer was satisfied with the entire installation.”

The payoff is clear to both the owners and the tenants, and the security solution of a closed building concept has thrust the building into the forefront as a successful prototype for others to emulate. “No one leases space in a building because there is a security system in place,” concludes Nick. “But people don’t go into buildings because the building doesn’t have security.”

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0721-Tenant-Feat-slide1_900px

    Identity management for multi-tenant buildings

    See More
  • Security newswire default

    Big Data Collection Needs Transparency for Public Acceptance

    See More
  • datacenter_gov1

    Survey says Most Data Centers Don't Meet the Needs of their Users

    See More

Related Products

See More Products
  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing