Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Outside, Inside Protection

July 1, 2005
An electronic security system at Florida Community College’s Deerwood Center is meeting the changing access control needs of the facility, as it continues its growth from a former shopping mall to a full-fledged campus.

Deerwood Center is part of the Florida Community College of Jacksonville, the 10th largest community college in the U.S. and the second largest in the state. The state of Florida differentiates between a campus and center based on student population requirements and other physical criteria. Still defined as a center, Deerwood serves approximately 8,000 students and continues to grow.

Originally built as an upscale retail mall that served the surrounding area on Jacksonville’s southeast side, the facility was purchased in 1994 when the mall failed and the last store closed. Since then, the College has remodeled the facility extensively but kept some of the mall’s character, including a central open area atrium that functions as a gathering spot.

Handling growth

Dr. Patty Adeeb, executive director of Deerwood Center, points out that a majority of its enrolled students are working adults earning AA degrees. As a result, the facility is extremely busy during evening hours. She explains, “We’re to full capacity in the evening with regard to available classroom spaces, thus our parking lot also is full.” To help accommodate the growth, the busy and growing facility will be adding a parking garage and has recently purchased an adjacent vacant store building to expand its classroom space. Dr. Adeeb says this will add 80,000 sq. ft., bringing the center’s size to almost 400,000 sq. ft. With the expansion, she notes, will come additional security needs.

Ties access, monitoring together

The building is protected by an IR Geoffrey system that controls access at critical locations with card readers, as well as managing security video and door position monitoring. In addition to exterior doors, the system secures a tunnel gate, a remnant of the former mall, where authorized staff members and vehicles can enter.

Although one of the system’s main functions is to secure the building’s perimeter outside of operating hours, it also protects more sensitive areas within the facility. Sergeant Nick Williams, of Deerwood Center’s security staff points out, “We host the Network Operations Center for the entire college, as well as the TV studio, and we’re also the backup TV station for Channel 4 emergency weather news. These are the kind of areas that you have to swipe a card to enter. We have set up a variety of security zones, and access can be limited to a confined area.” Areas that are not sensitive use a standard mechanical key system.

Sergeant Nick Williams uses his proximity card to open the gate to the underground tunnel used by staff members
Williams says the system is programmed to automatically lock the entrances after normal hours of operation and unlock them again the next morning. He explains, “After 6:00 at night, it automatically shuts down the offices, and it locks the rest of the building and areas like the computer and science labs, library and learning center after 10:00 PM when classes are finished.”

To expand the building’s security coverage, an outside security company is used to help monitor the IR Geoffrey system. Williams explains, “If an officer isn’t immediately available, we get a call from them when a motion sensor is activated. If it indicates motion inside the building, the system helps us define areas that are breached and determine whether it is a false alarm or requires a response. We can then make the decision whether we need to check it out or not.”

Motion detector above door alerts security staff or monitoring service to activity.
Some entrances are equipped with card readers that also can be programmed to require PIN codes at certain times. This is used primarily to provide better control of after-hours access when the building is locked. Matching the proper credentials to the access needs of individual faculty and staff members is a challenge in itself. Dr. Adeeb points out that the center has a small permanent faculty but also has about 120 part-time instructors in addition to temporary employees.

The security video system includes 16 cameras positioned around the building and its exterior, including the parking lot. Williams says additional cameras will be added when the parking garage is built, and existing cameras are being converted to rotate. “Right now,” he notes, “we have to aim them manually toward the doors at night and the parking lot during the day. The cameras have the capability to rotate, and one of our IT technicians is working on getting the necessary software.”

Williams says the system has been effective, with very few thefts despite the volume of electronic equipment in the building. He notes that Florida has seen a rash of thefts of overhead projectors from classrooms, apparently because they can be used to build large-screen TVs, yet such incidents have been avoided at Deerwood Center. He adds, “This being a former mall, it creates a more challenging security environment than a traditional school, which would have doors from the classrooms all exiting into a hallway. We’ve set up the exit doors, so people can’t get back in except through the main entrances once they leave.”

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • travel-enews

    Pandemic border management: An inside look

    See More
  • Digital Shreds: Armor Inside Documents

    See More
  • buy in from the c suite

    5 Cyber Basics for the C Suite From the Outside In

    See More

Related Products

See More Products
  • Physical Security and Environmental Protection

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products

Events

View AllSubmit An Event
  • June 24, 2025

    Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

    ON DEMAND: For today's security teams, making informed decisions in the first moments of a crisis is critical.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing