Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

VPN for VIPs

January 1, 2006
After successfully running the VPN-enabled access card solution at 14 locations, Product Action’s now integrating it with new keypad readers, reports Facilities Engineer Shawn Oliver. He has begun plans to deploy new technology at another eight to ten locations.

Device networking, whether Windows, IP-based or with serial bridges, has extra appeal to security operations that must cover multiple locations with access controls. And a virtual private network (VPN) takes standardized security enterprise-wide.

This is even more apparent at enterprises where corporate espionage threats are added to such standbys as theft, violence and unauthorized visitors.

One example comes from the cutthroat field of automobile manufacturing. When these firms encounter defective or improper parts, they call on quality control vendor Product Action, based in Indianapolis, to analyze and sort out the problem parts to keep the production line running. Protecting the anonymity of Product Action clients is imperative. To better ensure no unauthorized people gain facility entry, the company recently installed door controllers and access control software from Kantech Systems (Brossard, Ontario) at 14 of 40 North American locations.

Eliminating security failures

In its business model, if an assembly plant or supplier has a quality problem, Product Action’s inspection teams help identify nonconforming parts and improve manufacturing operations. This may involve meeting with clients at a Product Action facility or dispatching engineers to the auto plant’s assembly line to resolve a defect and get them back up to speed.

The company had become frustrated with the unreliability of its previous access system. “We’re very big on security,” said Facilities Engineer Shawn Oliver. “We need to know who is entering a building and when, and verify that the person is authorized to enter the facility – our customers expect it of us. The card swipe system we had used at our Toledo, Ohio, location failed many times. The reader would lose information and often had to be reprogrammed. This took up valuable time that we can’t afford to spend.”

Oliver was introduced to Kantech, part of Tyco Fire & Security’s Access Control & Video Systems, by General Security Services when Product Action opened its first facility in Canada. “I liked the fact that the products could be integrated into a centralized access control system, so security for all of our 40 plus sites could be managed from one location.” Oliver evaluated numerous access systems, selecting Kantech based on its reliability and ease of use. “With our previous solution, each of the 44 devices controlled access to up to 16 doors,” explained Oliver. “If one controller failed, it interfered with access for all of those doors. Each Kantech controller handles a maximum of two doors, so it limits exposure.”

The company chose KT-300 Door Controllers and EntraPass Corporate Edition software to control door access, and a Lantronix (Irvine, Calif.) UDS-10 Device Server for better data accessibility and remote management of devices unconnectable to the network. The device server allows almost any device with an RS-232 serial port, including Kantech’s controllers, to connect to networks. It included all of the elements needed for device networking, including a TCP/IP to RS-232 converter, Web server and a network connection to provide an Ethernet bridge to serial devices.

Product Action hired F&J Security of Ohio to install the equipment at 12 facilities. EntraPass connected all of the controllers and readers, which were in turn tied to the main server at the corporate office in Indianapolis. This software displays current activities that occur throughout the day and has pop-up alarms for pre-programmed activities.

Through the access control software and the Lantronix device on its main server, the company can now add, delete and update security access for personnel from its corporate office instead of site by site. Authorized employees use a proximity card, eliminating wear and tear typical of physical swiping of a card.

F&J also integrated EntraPass with an existing security system from Tyco’s Digital Security Controls at two facilities. This enabled the vendor to use its access system to activate and deactivate the system, and access information such as the name of the person who last activated the alarm and when it occurred, even for offsite locations. The system also ties to unlock doors in case of a fire.

All locations connect through the VPN, enabling a secure communication link from each facility to the corporate office. If communication is lost, the security system goes stand-alone until VPN is restored.

Improving accountability

“We can see when people enter and exit each building,” said Oliver. “I can log onto EntraPass from anywhere to add or remove employees’ access. If we encounter a problem, such as a break-in, the system identifies when the last person was on the premises and the time they left. We’ve been able to save costly staff time and also keep extraneous people out of the system. It’s a lot easier to have one person activate/deactivate cards and avoid the hassle of going to every location.”

The new system has also been beneficial for employees who travel to multiple locations. Previously, they had to use a different card for each site they visited. This meant inconvenience for traveling employees as well as the significant cost of issuing close to $100 in cards for each person, as each site had a different card reader. With a staff of 4,500 employees, these costs could be significant. Now employees simply notify Oliver that they’ll be traveling and he activates one card to give them access to all applicable facilities. “They love how they can just go to a site and not have to shuffle multiple cards to enter various facilities.”

A smart card at Pfizer allows the company to converge its network and facility access controls and have two-factor authentication, too.

Sidebar: Smart Badges for ‘Ultra-security’

Pfizer, Inc., the world’s largest research-based pharmaceutical company, is deploying a smart badge identity management system that sets the bar higher for security convergence. The approach includes technology from Horsham Pa.-based Gemplus International S.A.

The leap-forward mirrors convergence strategies of enterprise companies identified through Security Magazine studies and other research in which physical and logical access are combined in one system and, often, one credential. A recent Security Magazine poll, for example, found security executives view smart cards as a means of blending functions together.

The pioneering Pfizer system enables digital signatures, and will secure employee access to networks and facilities worldwide. To date, Gemplus told Security Magazine that it has shipped over 100,000 smart cards to Pfizer. The deployment of smart identity badges is part of what Pfizer calls its “Global Identity Services” or GIS program. Upon completion, employees, contractors and business partners will use GIS.

Pfizer’s program seeks to build a globally aligned, company-wide electronic identity management infrastructure that is provisioned via an integrated smart badge. The objective of implementing smart cards is to improve the overall level of protection against intrusion, while enabling more efficient and secure collaboration among employees and business partners using digital signatures, according to the company.

The Gemplus identity management solution, called SafesITe, allows Pfizer to benefit from two-factor authentication, which combines the traditional “something you know” (password or PIN) with “something you have” (smart integrated badge), enabling greater security than traditional username/passwords.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Going Global? DHS Program Expands for Speedy Screening for You or Your VIPs

    See More
  • Need a Safe Room for Your Corporate VIPs at Home? Resilient Homes can be Last Room Standing

    See More
  • VPN for remote workers

    The evolution of the corporate VPN: How COVID-19 has redefined VPN security

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!