Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

City of Ottawa Finds Integrated Security Solution

By John Mesenbrink
January 23, 2002
The city of Ottawa, Canada was facing a crisis. It needed to facilitate its growth plan by providing an expandable security system and provide for centralized monitoring and control of all its facilities. Johnson Controls/Cardkey Division, Simi Valley, Calif., installed its integrated security management system that serves over 55 facilities.

The new City of Ottawa was created on January 1, 2001. It encompasses the nation's capital and 11 former regional municipalities with over 700,000 residents and an area of 2,800 square-kilometers. A Cardkey security system, first installed in the former regional headquarters in 1990, has been expanded since then to serve municipal buildings throughout the new City. Suno-Tech, an authorized Cardkey dealer, was named service provider of choice for work on this large, integrated system.

To Johnson Controls, the solution was rather simple: research and provide the most efficient means of systems integration into additional facilities, and demonstrate ability to perform multiple tasks. This meant specifying Cardkey Pegasys 1000 Security Management System, Badgemaster photo identification and closed circuit television (CCTV). Also, they needed to install Cardkey CK720 controllers to communicate via customer's local and wide area networks.

The results were far-reaching:

  • Gained approval for Cardkey security systems expansion to more than 55 separate facilities. Named service provider of choice by city government.
  • Provided a flexible system accommodating growth, for performing security and non-security related tasks.
  • Provided complete monitoring and control from city hall while avoiding additional infrastructure costs.


Ottawa's City Hall features an integrated security management system, which serves over 55 facilities in Canada's capital city.

City Achieves its Goals

The Ottawa city government is responsible for major roads, waste management, police, social services, health services, sewers, drinking water, public works, transportation and oversight for the city's overall development plan. The facilities within the city house a variety of departments responsible for city services.

A Cardkey security system was originally installed in the City Hall when it was completed in 1990. In 1993, Bob Gauvreau, the current manager of corporate security for the City of Ottawa, became the security coordinator for the former Regional Municipality and began advocating for an expanded system. He turned to Frank Marschall, owner of Suno-Tech, a security systems integrator and authorized dealer of Cardkey security systems from Johnson Controls.

"I felt we needed to develop a complete integrated security management system, which would connect all of the facilities within the city," says Gauvreau. "My challenge was to sell this idea, and I needed strong dealer support to do that." Suno-Tech provided this support by taking an aggressive approach in researching the best way to meet the unique security needs of a new long-term care facility being planned.

Today, more than 55 buildings have been integrated using the Cardkey Pegasys 1000 Security System. More than 9,000 cards have been issued and more than 400 readers are in place. "With the constant addition of other facilities, we expect to have over 550 readers in place by the end of 2001," says John Gillen, regional manager for Suno-Tech. Currently, more than 1,000 points are monitored, which include access controls, fire alarm systems, life safety devices, standard alarm point monitoring, and security alarm interfaces, among others.

The Cardkey D620 and CK720 controllers facilitate communication among all facilities and continued growth of the system. "We needed a system with a lot of integrity, options and expansion capabilities," Gillen adds. "Because of the communications capabilities of the Cardkey controllers, the majority of buildings are connected by the customer's wide area network (WAN) with the remaining buildings connected by standard telephone lines." According to Gauvreau, the communications capabilities have been a key advantage of the Cardkey system. "We have avoided a lot of additional infrastructure and phone line rental costs," says Gauvreau.

The Robert O. Pickard Center uses the Cardkey security system to monitor and control the activity of outside contractors, who haul waste to the facility.

Security System Goes Beyond Access

With the large number of facilities involved, and the diversity of their functions, access control is just one of a number of applications that Suno-Tech and the region have found for Cardkey security systems. "The beauty of the system, and one of the reasons the city uses the Cardkey system, is that it is not just an access control system as much as it is a security management system, which can accommodate a multitude of devices," says Gillen. The Cardkey security system is also providing elevator control, intrusion detection, Badgemaster photo identification, monitoring of burglar alarm and duress alarm systems, and control of life safety devices at various buildings.

Unique applications include monitoring and access control of city government vehicles, which have been tagged and are scanned by underground readers located at the gates of various facilities. The Robert O. Pickard Environment Center uses this method to monitor and control the activity of outside contractors who haul waste to the facility. In addition to providing access and egress control, the system allows accounting personnel to verify the number of deliveries.

In order to meet the security needs of the new long-term care facility, Suno-Tech used the Cardkey security system to provide a safe, yet friendly, environment for the residents of the facility. "The challenge is to provide an open and friendly environment, yet maintain the safety of residents identified as at-risk," says Gillen. By using the proximity reader technology and identification wristbands, Suno-Tech programmed the readers to lock the doors when an at-risk resident approaches. This allows other patients, staff and family members to move about freely. If an at-risk resident somehow manages to bypass the system, a back-up alarm system is activated and the nurse's station and the central office downtown notified.

A recent system addition to the system was the city's two water purification plants (Britannia and Lemieux Island) that are now protected by access control. "With the security risks associated with these types of facilities in our modern age, I think it is most important to protect our drinking water," says Gauvreau.

The entire system is designed to work well with a minimum of human intervention. "This saves on contract security costs and man hours for a variety of security and non-security related functions. This allows the city's people to focus on their jobs and core mission. The end result is a safer, more efficient workplace," says Gillen. "The product is user-friendly. It works for all of our applications and gives us peace-of-mind by permitting us to have control when we want it," adds Gauvreau.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Mesenbrink is managing editor for SECURITY Magazine. He can be reached at 630-694-4026

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Inside Security Integration

    See More
  • Increasing Campus Security with Handhelds

    See More
  • Biometrics Plays Big Role with Airport Security

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing