Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

VPN for VIPs

January 1, 2006
After successfully running the VPN-enabled access card solution at 14 locations, Product Action’s now integrating it with new keypad readers, reports Facilities Engineer Shawn Oliver. He has begun plans to deploy new technology at another eight to ten locations.

Device networking, whether Windows, IP-based or with serial bridges, has extra appeal to security operations that must cover multiple locations with access controls. And a virtual private network (VPN) takes standardized security enterprise-wide.

This is even more apparent at enterprises where corporate espionage threats are added to such standbys as theft, violence and unauthorized visitors.

One example comes from the cutthroat field of automobile manufacturing. When these firms encounter defective or improper parts, they call on quality control vendor Product Action, based in Indianapolis, to analyze and sort out the problem parts to keep the production line running. Protecting the anonymity of Product Action clients is imperative. To better ensure no unauthorized people gain facility entry, the company recently installed door controllers and access control software from Kantech Systems (Brossard, Ontario) at 14 of 40 North American locations.

Eliminating security failures

In its business model, if an assembly plant or supplier has a quality problem, Product Action’s inspection teams help identify nonconforming parts and improve manufacturing operations. This may involve meeting with clients at a Product Action facility or dispatching engineers to the auto plant’s assembly line to resolve a defect and get them back up to speed.

The company had become frustrated with the unreliability of its previous access system. “We’re very big on security,” said Facilities Engineer Shawn Oliver. “We need to know who is entering a building and when, and verify that the person is authorized to enter the facility – our customers expect it of us. The card swipe system we had used at our Toledo, Ohio, location failed many times. The reader would lose information and often had to be reprogrammed. This took up valuable time that we can’t afford to spend.”

Oliver was introduced to Kantech, part of Tyco Fire & Security’s Access Control & Video Systems, by General Security Services when Product Action opened its first facility in Canada. “I liked the fact that the products could be integrated into a centralized access control system, so security for all of our 40 plus sites could be managed from one location.” Oliver evaluated numerous access systems, selecting Kantech based on its reliability and ease of use. “With our previous solution, each of the 44 devices controlled access to up to 16 doors,” explained Oliver. “If one controller failed, it interfered with access for all of those doors. Each Kantech controller handles a maximum of two doors, so it limits exposure.”

The company chose KT-300 Door Controllers and EntraPass Corporate Edition software to control door access, and a Lantronix (Irvine, Calif.) UDS-10 Device Server for better data accessibility and remote management of devices unconnectable to the network. The device server allows almost any device with an RS-232 serial port, including Kantech’s controllers, to connect to networks. It included all of the elements needed for device networking, including a TCP/IP to RS-232 converter, Web server and a network connection to provide an Ethernet bridge to serial devices.

Product Action hired F&J Security of Ohio to install the equipment at 12 facilities. EntraPass connected all of the controllers and readers, which were in turn tied to the main server at the corporate office in Indianapolis. This software displays current activities that occur throughout the day and has pop-up alarms for pre-programmed activities.

Through the access control software and the Lantronix device on its main server, the company can now add, delete and update security access for personnel from its corporate office instead of site by site. Authorized employees use a proximity card, eliminating wear and tear typical of physical swiping of a card.

F&J also integrated EntraPass with an existing security system from Tyco’s Digital Security Controls at two facilities. This enabled the vendor to use its access system to activate and deactivate the system, and access information such as the name of the person who last activated the alarm and when it occurred, even for offsite locations. The system also ties to unlock doors in case of a fire.

All locations connect through the VPN, enabling a secure communication link from each facility to the corporate office. If communication is lost, the security system goes stand-alone until VPN is restored.

Improving accountability

“We can see when people enter and exit each building,” said Oliver. “I can log onto EntraPass from anywhere to add or remove employees’ access. If we encounter a problem, such as a break-in, the system identifies when the last person was on the premises and the time they left. We’ve been able to save costly staff time and also keep extraneous people out of the system. It’s a lot easier to have one person activate/deactivate cards and avoid the hassle of going to every location.”

The new system has also been beneficial for employees who travel to multiple locations. Previously, they had to use a different card for each site they visited. This meant inconvenience for traveling employees as well as the significant cost of issuing close to $100 in cards for each person, as each site had a different card reader. With a staff of 4,500 employees, these costs could be significant. Now employees simply notify Oliver that they’ll be traveling and he activates one card to give them access to all applicable facilities. “They love how they can just go to a site and not have to shuffle multiple cards to enter various facilities.”

A smart card at Pfizer allows the company to converge its network and facility access controls and have two-factor authentication, too.

Sidebar: Smart Badges for ‘Ultra-security’

Pfizer, Inc., the world’s largest research-based pharmaceutical company, is deploying a smart badge identity management system that sets the bar higher for security convergence. The approach includes technology from Horsham Pa.-based Gemplus International S.A.

The leap-forward mirrors convergence strategies of enterprise companies identified through Security Magazine studies and other research in which physical and logical access are combined in one system and, often, one credential. A recent Security Magazine poll, for example, found security executives view smart cards as a means of blending functions together.

The pioneering Pfizer system enables digital signatures, and will secure employee access to networks and facilities worldwide. To date, Gemplus told Security Magazine that it has shipped over 100,000 smart cards to Pfizer. The deployment of smart identity badges is part of what Pfizer calls its “Global Identity Services” or GIS program. Upon completion, employees, contractors and business partners will use GIS.

Pfizer’s program seeks to build a globally aligned, company-wide electronic identity management infrastructure that is provisioned via an integrated smart badge. The objective of implementing smart cards is to improve the overall level of protection against intrusion, while enabling more efficient and secure collaboration among employees and business partners using digital signatures, according to the company.

The Gemplus identity management solution, called SafesITe, allows Pfizer to benefit from two-factor authentication, which combines the traditional “something you know” (password or PIN) with “something you have” (smart integrated badge), enabling greater security than traditional username/passwords.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • New Newswire Feature Image 3/8/2012

    Executives' Phones Vulnerable Abroad

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing