Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Protecting Prized Possessions

October 1, 2004
Landmarks such as the Denny Chimes are among facilities under the watchful eye of the University of Alabama Police Department.
The University of Alabama is one of the South’s premier student-centered, research universities and one of the top 50 public universities in the country. With nearly 20,000 undergraduate, professional and graduate students enrolled, and a rich history that is reflected in the many priceless objects housed on campus, the university’s security needs are extremely demanding, to say the least.

Allowing easy access to extensive campus facilities while protecting both people and the university’s many physical assets required a robust, integrated, intelligent security system. The system had to be complex enough to provide varying levels of security where needed, yet easy to use. Tying together the university’s many security systems was a must.

Several thefts within the School of Arts and Science and the School of Business spurred us to take the initial first step of installing a large security video system on campus. Proposed was a GE digital system. Barry Komisar, president of Vision Southeast and a University of Alabama graduate, bid on the job and ultimately won the contract to install the first of many GE systems on campus. There now are alarmed recorders that can be viewed throughout campus over a fiber optic network system.

With upgrades of certain aspects of the security program, new technology was accommodated as well. Managed are security functions via a single graphical user interface and a relational database. The design integrates and manages digital video surveillance, intrusion alarm systems and the GE Secure Perfect access control system in the Athletics Building.

Security gear protects artifacts and memorabilia that draw thousands of visitors to the Paul W. Bryant Museum on the campus of the University of Alabama.
The main campus, located in the middle of Tuscaloosa, Ala., next to the Warrior River, is part of a larger, university-wide system. In addition to the security video systems across campus, there is an extensive system of intrusion alarms monitored through a proprietary central station, using GE alarm panels. In some buildings, there is older, legacy equipment. Once budgets allow or needs arise, all new equipment is being installed.

An existing access control system is based on magnetic stripe cards mainly used as debit cards on campus by students, faculty and staff. A few of the cards are currently used for access control and more will be employed for access to a new athletic facility once it is open. The plan: to move to a dual technology where one card lets the university use the magnetic stripe for debit and proximity for access control.

Eventually the facility will have one centralized area within the university police department to manage all security systems, with every campus building accessible through the network. An IP address is set up on a PC and then the user can access the cameras at any time. In addition, each building manager and police investigator is able to access the cameras using a password on the network.

Sports are a very important part of the University of Alabama’s history. The Paul W. Bryant Museum on campus is devoted to the memory of this famous football coach, nicknamed the "Bear," with extremely valuable awards, trophies and memorabilia on display, including the crystal football, an NCAA championship trophy.

The Bryant Museum at the University of Alabama is protected thanks to security video.

Action at museums

Security cameras are trained on the football and it is alarmed. Several times, the alarm has gone off and when a museum assistant went to check, no one was there. At first, staff thought there was something wrong with the equipment. When video playback was reviewed, however, someone was, in fact, touching the football but left before the museum assistant or the police could catch them.

In another area, the Special Collections Library contains singular and valuable items including artwork and historical letters. Students and individuals can request to view a collection hands-on, but items cannot leave the premises.

There was an incident where an individual was looking at a rare collection of letters by a famous writer of American folk songs from the 1800s. When the individual was finished looking at the letters, he put them back in their envelopes and returned the envelopes. Not long after, the letters were for sale on the online auction site eBay. The individual was apprehended and he said he did it just to see if he could.

Now, security video covers all six tables, the entry and exit in the Special Collections library. Also installed is a DVR with one terabyte of storage to view recorded video months or even years from now.

There are cameras at the Bryant-Denny Stadium, the on-campus home of the Alabama Crimson Tide football team. The stadium’s total seating capacity is 83,818. Cameras are just below the scoreboard. With them, security can view the entire stadium as it’s filling up. This powerful, versatile camera is a purely promotional tool for pre-game television and Internet coverage – it’s blacked out once the game starts.

Digital video security is the game plan at the University of Alabama, with cameras covering museums, the stadium and classroom buildings such as Bidgood Hall.

Moving forward

The university is in the process of installing eight cameras and eight card readers at Bryant-Denny Stadium, where expansion is a two-phase project that will increase the size of the stadium and its capacity greatly. There is also a major renovation project of the basketball venue, Coleman Coliseum. In addition, security has added security video to three academic and student center buildings. Secure Perfect will integrate the access control and security video functions for all of these buildings.

The new athletic facility is expected to be complete in December and will incorporate many state-of-the-art security features. Football head coach Mike Schula came from the NFL and he is very security conscious. Ultimately, security chose GE’s Secure Perfect access control and security management software. Offered on the Windows platform, Secure Perfect met current needs and could clearly grow into the future. The system integrates all disparate and legacy security programs into one system that is easy to configure and operate.

Currently buildings are locked down at night; and student workers open them in the morning and lock them during after-hours. Security wants to change that to a more automated access control system. The university’s goal ultimately is to secure the perimeter of every building.

The cameras are easy to operate, with color images that can be faxed, e-mailed, copied and distributed. Police investigators appreciate that they don’t have to hassle with the different time-lapse VHS formats and the clunky storage issues associated with VHS tapes.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Guarding Hogs

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!