Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Building Princeton’s Defense

February 1, 2005
SNMP remote site managers can configure for different combinations, capabilities and potential threats. Simple Network Management Protocol or SNMP is a set of protocols for managing complex networks.
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.

The proliferation of increasingly strategic and sensitive networked equipment at remotely managed sites, including those where managers or supervisory personnel are occasionally offsite, has intensified the need to assure protection against such seen and unseen intruders.

The people, equipment and intellectual property inside the Princeton Computer Science building are protected by video but also thanks to monitoring devices to monitor heat, humidity and door activity.

Monitoring and management

One solution is to provide comprehensive remote monitoring and protection using a network peripheral device. Such devices must provide the right combination of monitoring and management capabilities, integrating multiple existing inputs into an SNMP trap alarm system that delivers immediate notification via the network’s native protocol. Such a project can be driven by executives representing facility, security and logical security.

Chartered in 1746, Princeton was the fourth college established in British colonial America. Last year the university enrolled 4,635 undergraduate and 1,997 graduate students at its 500-acre campus located in Princeton, N.J. The faculty of approximately 1,000 includes recipients of the Nobel Prize in physics, literature, economic sciences and medicine. All faculty members are expected to teach as well as engage in scholarly research.

Like other universities and research centers, Princeton has a need to protect the intellectual property. This includes securing facilities that house expensive equipment and sensitive data.

“Normally, the support staff members are offsite during nights and weekends,” said Chris Tengi, systems and network administrator at the university’s Department of Computer Science. “But we are always concerned about power supply, humidity, ambient temperature and related equipment that supports our facilities. If we have some sort of mishap that knocks out air conditioning in the middle of the night, we need to know about it.”

Remote site managers such as this one from Omnitronix monitor network infrastructure – environmental conditions and legacy equipment alarms – as well as doors. System designs can also accommodate digital video.
The facilities that Tengi supports include the department’s main computer room and labs that house workstations, PCs and other resources for undergraduate and graduate students in Computer Science. It also protects the school’s research, including advanced projects in alternative models of computation, computational biology and bioinformatics.

“The threats we encounter are mostly heat and humidity,” said Tengi. “Although we are certainly concerned about unauthorized entry or human actions that can compromise our systems.”

In fact, one of the department’s major investments in physical monitoring and protection equipment was in motion-activated security cameras (AXIS Communications, Chelmsford, Mass.), which are mounted facing outside entries of the Computer Science Building as well as the main computer room. But while the cameras addressed the need to detect and monitor human activity after hours, an integrated solution to monitoring and managing heat- and humidity-related situations was still needed.

Concerned about the prospects of system problems due to human or environmental impediments, Tengi investigated the SNMP-Link Model SL61 Remote Site Manager made by Omnitronix.

Based in Seattle, Omnitronix data collection devices includes site-management product line which grew out of experience in PBX alarm management and remote equipment access, especially for SNMP systems.

These devices typically monitor critical business equipment – phone systems, power supplies or communications/networking components – as well as the physical conditions that impact the health of such equipment. They then provide the network interface and intelligence required to get such non-networked devices into the control of the network.

With the SL61, in particular, as many as 16 different EventSensors that monitor temperature, humidity, airflow and noise, for example, can be daisy-chained for connection to Ethernet, phone line, Internet or wireless systems.

Networked cameras protect entry to the computer labs while remote site manager devices connect sensors in various lab interiors

The integration process

Tengi acquired three of these self-contained units for three separate Computer Science rooms and connected sensors that monitor heat, humidity and door activity to each unit.

“We used the event sensors to send SNMP traps so that if they detected high humidity or temperatures that are too high or too low, the corresponding trap will generate an e-mail message to our pagers,” said Tengi. “You can buy and configure these with different combinations of capabilities. So, if I only needed a temperature sensor in one place and I didn’t need to detect contact closure or humidity conditions, I can do just that. Being able to mix or match the sensors is convenient and saves on costs.”

Tengi also installed an Omnitronix SL10, a low-cost SNMP-Link, to monitor the environment in an additional lab.

Improved monitoring

Tengi noted that accidental environmental problems resulting from human intervention are now handled by the event sensor system. For example, since some of the computer lab facilities were previously standard office spaces, the air conditioning thermostats are accessible by occupants.

“If they feel the room is too cool, they raise the thermostat, but if they leave the room that way, it will get too hot for the equipment,” Tengi points out. “But now the sensors will detect the temperature rise at whatever threshold we have set and we can make corrections before the equipment is affected.”

In another instance, sensors detected when a maintenance crew entered the computer room out of hours to borrow a power outlet, disconnecting some equipment in the process. “The system notified me on my pager, so we were able to take care of the problem before any damage occurred,” said Tengi. “We then reviewed the images generated by the motion-detector-activated cameras, and we could see that the cleaning crew had unplugged our equipment by mistake.”

Also discussed is the possibility of integrating other devices, such as the surveillance cameras, with environmental event sensing capabilities.

“We purchased the motion detectors for the cameras before we installed the SL61s,” said Tengi. “But you can wire the cameras and configure them in such a way that when a contact closure on a door trips the SL61, it could trigger a camera to take pictures.

“We didn’t take advantage of all the features,” said Tengi, “but if we need other capabilities in the future we can simply order event sensors accordingly. For our application, getting the SNMP query capability without having to buy an SL61 for every location – and the flexibility of being able to put sensors in different configurations depending on what you need – all adds to the value of the basic device.”

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Red laptop

Cybersecurity leaders discuss Oracle’s second recent hack

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cybersecurity

    Siemens USA launches cybersecurity analytics lab to help protect operational technology

    See More
  • DoD Gets CAC Smart

    See More
  • It’s in the Mail – Oh, Oh!

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!