Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Protecting Prized Possessions

October 1, 2004
Landmarks such as the Denny Chimes are among facilities under the watchful eye of the University of Alabama Police Department.
The University of Alabama is one of the South’s premier student-centered, research universities and one of the top 50 public universities in the country. With nearly 20,000 undergraduate, professional and graduate students enrolled, and a rich history that is reflected in the many priceless objects housed on campus, the university’s security needs are extremely demanding, to say the least.

Allowing easy access to extensive campus facilities while protecting both people and the university’s many physical assets required a robust, integrated, intelligent security system. The system had to be complex enough to provide varying levels of security where needed, yet easy to use. Tying together the university’s many security systems was a must.

Several thefts within the School of Arts and Science and the School of Business spurred us to take the initial first step of installing a large security video system on campus. Proposed was a GE digital system. Barry Komisar, president of Vision Southeast and a University of Alabama graduate, bid on the job and ultimately won the contract to install the first of many GE systems on campus. There now are alarmed recorders that can be viewed throughout campus over a fiber optic network system.

With upgrades of certain aspects of the security program, new technology was accommodated as well. Managed are security functions via a single graphical user interface and a relational database. The design integrates and manages digital video surveillance, intrusion alarm systems and the GE Secure Perfect access control system in the Athletics Building.

Security gear protects artifacts and memorabilia that draw thousands of visitors to the Paul W. Bryant Museum on the campus of the University of Alabama.
The main campus, located in the middle of Tuscaloosa, Ala., next to the Warrior River, is part of a larger, university-wide system. In addition to the security video systems across campus, there is an extensive system of intrusion alarms monitored through a proprietary central station, using GE alarm panels. In some buildings, there is older, legacy equipment. Once budgets allow or needs arise, all new equipment is being installed.

An existing access control system is based on magnetic stripe cards mainly used as debit cards on campus by students, faculty and staff. A few of the cards are currently used for access control and more will be employed for access to a new athletic facility once it is open. The plan: to move to a dual technology where one card lets the university use the magnetic stripe for debit and proximity for access control.

Eventually the facility will have one centralized area within the university police department to manage all security systems, with every campus building accessible through the network. An IP address is set up on a PC and then the user can access the cameras at any time. In addition, each building manager and police investigator is able to access the cameras using a password on the network.

Sports are a very important part of the University of Alabama’s history. The Paul W. Bryant Museum on campus is devoted to the memory of this famous football coach, nicknamed the "Bear," with extremely valuable awards, trophies and memorabilia on display, including the crystal football, an NCAA championship trophy.

The Bryant Museum at the University of Alabama is protected thanks to security video.

Action at museums

Security cameras are trained on the football and it is alarmed. Several times, the alarm has gone off and when a museum assistant went to check, no one was there. At first, staff thought there was something wrong with the equipment. When video playback was reviewed, however, someone was, in fact, touching the football but left before the museum assistant or the police could catch them.

In another area, the Special Collections Library contains singular and valuable items including artwork and historical letters. Students and individuals can request to view a collection hands-on, but items cannot leave the premises.

There was an incident where an individual was looking at a rare collection of letters by a famous writer of American folk songs from the 1800s. When the individual was finished looking at the letters, he put them back in their envelopes and returned the envelopes. Not long after, the letters were for sale on the online auction site eBay. The individual was apprehended and he said he did it just to see if he could.

Now, security video covers all six tables, the entry and exit in the Special Collections library. Also installed is a DVR with one terabyte of storage to view recorded video months or even years from now.

There are cameras at the Bryant-Denny Stadium, the on-campus home of the Alabama Crimson Tide football team. The stadium’s total seating capacity is 83,818. Cameras are just below the scoreboard. With them, security can view the entire stadium as it’s filling up. This powerful, versatile camera is a purely promotional tool for pre-game television and Internet coverage – it’s blacked out once the game starts.

Digital video security is the game plan at the University of Alabama, with cameras covering museums, the stadium and classroom buildings such as Bidgood Hall.

Moving forward

The university is in the process of installing eight cameras and eight card readers at Bryant-Denny Stadium, where expansion is a two-phase project that will increase the size of the stadium and its capacity greatly. There is also a major renovation project of the basketball venue, Coleman Coliseum. In addition, security has added security video to three academic and student center buildings. Secure Perfect will integrate the access control and security video functions for all of these buildings.

The new athletic facility is expected to be complete in December and will incorporate many state-of-the-art security features. Football head coach Mike Schula came from the NFL and he is very security conscious. Ultimately, security chose GE’s Secure Perfect access control and security management software. Offered on the Windows platform, Secure Perfect met current needs and could clearly grow into the future. The system integrates all disparate and legacy security programs into one system that is easy to configure and operate.

Currently buildings are locked down at night; and student workers open them in the morning and lock them during after-hours. Security wants to change that to a more automated access control system. The university’s goal ultimately is to secure the perimeter of every building.

The cameras are easy to operate, with color images that can be faxed, e-mailed, copied and distributed. Police investigators appreciate that they don’t have to hassle with the different time-lapse VHS formats and the clunky storage issues associated with VHS tapes.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • healthcare

    Protecting our Home Healthcare Heroes

    See More
  • Protecting from Identity Theft? A Good Start

    See More
  • Protecting the Most Important Network

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing