Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Outside, Inside Protection

July 1, 2005
An electronic security system at Florida Community College’s Deerwood Center is meeting the changing access control needs of the facility, as it continues its growth from a former shopping mall to a full-fledged campus.

Deerwood Center is part of the Florida Community College of Jacksonville, the 10th largest community college in the U.S. and the second largest in the state. The state of Florida differentiates between a campus and center based on student population requirements and other physical criteria. Still defined as a center, Deerwood serves approximately 8,000 students and continues to grow.

Originally built as an upscale retail mall that served the surrounding area on Jacksonville’s southeast side, the facility was purchased in 1994 when the mall failed and the last store closed. Since then, the College has remodeled the facility extensively but kept some of the mall’s character, including a central open area atrium that functions as a gathering spot.

Handling growth

Dr. Patty Adeeb, executive director of Deerwood Center, points out that a majority of its enrolled students are working adults earning AA degrees. As a result, the facility is extremely busy during evening hours. She explains, “We’re to full capacity in the evening with regard to available classroom spaces, thus our parking lot also is full.” To help accommodate the growth, the busy and growing facility will be adding a parking garage and has recently purchased an adjacent vacant store building to expand its classroom space. Dr. Adeeb says this will add 80,000 sq. ft., bringing the center’s size to almost 400,000 sq. ft. With the expansion, she notes, will come additional security needs.

Ties access, monitoring together

The building is protected by an IR Geoffrey system that controls access at critical locations with card readers, as well as managing security video and door position monitoring. In addition to exterior doors, the system secures a tunnel gate, a remnant of the former mall, where authorized staff members and vehicles can enter.

Although one of the system’s main functions is to secure the building’s perimeter outside of operating hours, it also protects more sensitive areas within the facility. Sergeant Nick Williams, of Deerwood Center’s security staff points out, “We host the Network Operations Center for the entire college, as well as the TV studio, and we’re also the backup TV station for Channel 4 emergency weather news. These are the kind of areas that you have to swipe a card to enter. We have set up a variety of security zones, and access can be limited to a confined area.” Areas that are not sensitive use a standard mechanical key system.

Sergeant Nick Williams uses his proximity card to open the gate to the underground tunnel used by staff members
Williams says the system is programmed to automatically lock the entrances after normal hours of operation and unlock them again the next morning. He explains, “After 6:00 at night, it automatically shuts down the offices, and it locks the rest of the building and areas like the computer and science labs, library and learning center after 10:00 PM when classes are finished.”

To expand the building’s security coverage, an outside security company is used to help monitor the IR Geoffrey system. Williams explains, “If an officer isn’t immediately available, we get a call from them when a motion sensor is activated. If it indicates motion inside the building, the system helps us define areas that are breached and determine whether it is a false alarm or requires a response. We can then make the decision whether we need to check it out or not.”

Motion detector above door alerts security staff or monitoring service to activity.
Some entrances are equipped with card readers that also can be programmed to require PIN codes at certain times. This is used primarily to provide better control of after-hours access when the building is locked. Matching the proper credentials to the access needs of individual faculty and staff members is a challenge in itself. Dr. Adeeb points out that the center has a small permanent faculty but also has about 120 part-time instructors in addition to temporary employees.

The security video system includes 16 cameras positioned around the building and its exterior, including the parking lot. Williams says additional cameras will be added when the parking garage is built, and existing cameras are being converted to rotate. “Right now,” he notes, “we have to aim them manually toward the doors at night and the parking lot during the day. The cameras have the capability to rotate, and one of our IT technicians is working on getting the necessary software.”

Williams says the system has been effective, with very few thefts despite the volume of electronic equipment in the building. He notes that Florida has seen a rash of thefts of overhead projectors from classrooms, apparently because they can be used to build large-screen TVs, yet such incidents have been avoided at Deerwood Center. He adds, “This being a former mall, it creates a more challenging security environment than a traditional school, which would have doors from the classrooms all exiting into a hallway. We’ve set up the exit doors, so people can’t get back in except through the main entrances once they leave.”

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Digital Shreds: Armor Inside Documents

    See More
  • buy in from the c suite

    5 Cyber Basics for the C Suite From the Outside In

    See More
  • Synergy: Focusing Outside

    See More

Related Products

See More Products
  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing