Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Protecting Prized Possessions

October 1, 2004
Landmarks such as the Denny Chimes are among facilities under the watchful eye of the University of Alabama Police Department.
The University of Alabama is one of the South’s premier student-centered, research universities and one of the top 50 public universities in the country. With nearly 20,000 undergraduate, professional and graduate students enrolled, and a rich history that is reflected in the many priceless objects housed on campus, the university’s security needs are extremely demanding, to say the least.

Allowing easy access to extensive campus facilities while protecting both people and the university’s many physical assets required a robust, integrated, intelligent security system. The system had to be complex enough to provide varying levels of security where needed, yet easy to use. Tying together the university’s many security systems was a must.

Several thefts within the School of Arts and Science and the School of Business spurred us to take the initial first step of installing a large security video system on campus. Proposed was a GE digital system. Barry Komisar, president of Vision Southeast and a University of Alabama graduate, bid on the job and ultimately won the contract to install the first of many GE systems on campus. There now are alarmed recorders that can be viewed throughout campus over a fiber optic network system.

With upgrades of certain aspects of the security program, new technology was accommodated as well. Managed are security functions via a single graphical user interface and a relational database. The design integrates and manages digital video surveillance, intrusion alarm systems and the GE Secure Perfect access control system in the Athletics Building.

Security gear protects artifacts and memorabilia that draw thousands of visitors to the Paul W. Bryant Museum on the campus of the University of Alabama.
The main campus, located in the middle of Tuscaloosa, Ala., next to the Warrior River, is part of a larger, university-wide system. In addition to the security video systems across campus, there is an extensive system of intrusion alarms monitored through a proprietary central station, using GE alarm panels. In some buildings, there is older, legacy equipment. Once budgets allow or needs arise, all new equipment is being installed.

An existing access control system is based on magnetic stripe cards mainly used as debit cards on campus by students, faculty and staff. A few of the cards are currently used for access control and more will be employed for access to a new athletic facility once it is open. The plan: to move to a dual technology where one card lets the university use the magnetic stripe for debit and proximity for access control.

Eventually the facility will have one centralized area within the university police department to manage all security systems, with every campus building accessible through the network. An IP address is set up on a PC and then the user can access the cameras at any time. In addition, each building manager and police investigator is able to access the cameras using a password on the network.

Sports are a very important part of the University of Alabama’s history. The Paul W. Bryant Museum on campus is devoted to the memory of this famous football coach, nicknamed the "Bear," with extremely valuable awards, trophies and memorabilia on display, including the crystal football, an NCAA championship trophy.

The Bryant Museum at the University of Alabama is protected thanks to security video.

Action at museums

Security cameras are trained on the football and it is alarmed. Several times, the alarm has gone off and when a museum assistant went to check, no one was there. At first, staff thought there was something wrong with the equipment. When video playback was reviewed, however, someone was, in fact, touching the football but left before the museum assistant or the police could catch them.

In another area, the Special Collections Library contains singular and valuable items including artwork and historical letters. Students and individuals can request to view a collection hands-on, but items cannot leave the premises.

There was an incident where an individual was looking at a rare collection of letters by a famous writer of American folk songs from the 1800s. When the individual was finished looking at the letters, he put them back in their envelopes and returned the envelopes. Not long after, the letters were for sale on the online auction site eBay. The individual was apprehended and he said he did it just to see if he could.

Now, security video covers all six tables, the entry and exit in the Special Collections library. Also installed is a DVR with one terabyte of storage to view recorded video months or even years from now.

There are cameras at the Bryant-Denny Stadium, the on-campus home of the Alabama Crimson Tide football team. The stadium’s total seating capacity is 83,818. Cameras are just below the scoreboard. With them, security can view the entire stadium as it’s filling up. This powerful, versatile camera is a purely promotional tool for pre-game television and Internet coverage – it’s blacked out once the game starts.

Digital video security is the game plan at the University of Alabama, with cameras covering museums, the stadium and classroom buildings such as Bidgood Hall.

Moving forward

The university is in the process of installing eight cameras and eight card readers at Bryant-Denny Stadium, where expansion is a two-phase project that will increase the size of the stadium and its capacity greatly. There is also a major renovation project of the basketball venue, Coleman Coliseum. In addition, security has added security video to three academic and student center buildings. Secure Perfect will integrate the access control and security video functions for all of these buildings.

The new athletic facility is expected to be complete in December and will incorporate many state-of-the-art security features. Football head coach Mike Schula came from the NFL and he is very security conscious. Ultimately, security chose GE’s Secure Perfect access control and security management software. Offered on the Windows platform, Secure Perfect met current needs and could clearly grow into the future. The system integrates all disparate and legacy security programs into one system that is easy to configure and operate.

Currently buildings are locked down at night; and student workers open them in the morning and lock them during after-hours. Security wants to change that to a more automated access control system. The university’s goal ultimately is to secure the perimeter of every building.

The cameras are easy to operate, with color images that can be faxed, e-mailed, copied and distributed. Police investigators appreciate that they don’t have to hassle with the different time-lapse VHS formats and the clunky storage issues associated with VHS tapes.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

Phone with message icon

The Post-Breach Narrative: Winning Back Trust After the Headlines Fade

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • healthcare

    Protecting our Home Healthcare Heroes

    See More
  • Protecting from Identity Theft? A Good Start

    See More
  • Protecting the Most Important Network

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • The Complete Guide to Physical Security

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing