Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Future Proofing

February 6, 2006
Director of Electronic Security Robin Brown and ADT integrator, Mike Abbott, make no small technology plans as they develop a huge national life sciences campus. The challenge: future proofing a project being developed over several years.


It’s a long way from today’s suburb of Denver to the 1970s of artist Andy Warhol. But he may have had good advice for Robin Brown: “They always say time changes things, but you actually have to change them yourself.”

Brown, director of electronic security at the University of Colorado at Denver and Health Sciences Center, faces a billion dollar-plus project of renovation and new construction with a security aim to future proof what will be America’s top-notch life sciences campus. To accomplish such an aggressive business goal, Brown has partnered with a systems integrator as dedicated to his goals.

Located in Aurora, Colo., the former Fitzsimons Army Medical Center has a colorful and historic past. Built beginning in 1918, the base has served as a home and hospital for troops from World War I through the early 1990s Desert Storm operation. President Eisenhower stayed seven weeks in 1955 while recuperating from a heart attack. Former presidential candidate Sen. John Kerry was born there in 1943.

But major changes will turn the former Army post into a “Silicon Valley of life sciences” after being decommissioned and turned over to the University of Colorado. The university now is moving forward with an ambitious plan to demolish some buildings, renovate others and build a host of new medical-related facilities over the next 10 years.

Robin Brown, director of electronic security at UCHSC, presents his finger to a biometric reader to enter one of the center’s biomedical research laboratories. Many of the labs contain highly contagious agents such as tuberculosis and the SARS virus.
By the end of 2007, more than $1.3 billion will be spent to add 2.7 million square feet of space. Facilities totaling another 1.5 million square feet are planned for later phases. When finished, the University of Colorado at Denver and Health Sciences Center (UCDHSC) will include five medical schools and a variety of hospitals, laboratories, classrooms, medical offices and other research facilities. It will become the largest such center west of the Mississippi River.

Protecting this vast investment in people, buildings, equipment and research falls largely to Robin Brown. A 23-year veteran of the FBI, Brown created the security department at UCDHSC when he took the job two years ago. He and his staff of seven work in conjunction with the campus police department.

“This is like building a city from scratch,” Brown said. “The work we are doing is critical as the university is looking at this becoming a premier research center that will help the staff to win grants and attract contributions to fund vital medical research, treatment and education. We need to make security as much a part of these buildings as the air conditioning or lighting.”

Working with Brown to help design an electronic security plan is Boca Raton, Fla.-based ADT Security Services, Inc. Last year, ADT won a competitive bid for a five-year contract to serve as the project’s sole electronic security provider. “Having a resource-rich organization such as ADT is a key to our success,” Brown said.

The recently built Research Complex 1 facility provides 12 floors of labs and offices for cancer research at the University of Colorado Health Sciences Center. The building is joined by an aerial walkway to a nine-story tower used for biomedical research.
Over the life of the contract, ADT expects to install hundreds of video surveillance cameras and thousands of access card readers, alarms, sensors and monitoring equipment. The systems integrator will also maintain the equipment once installed and is also involved in the retrofit and then decommissioning of the old campus in Denver. As the project evolves, service tickets for the systems integrator are revised once a week.

As new buildings are completed and ground is broken for others, the security staff works with the police, staff, doctors, researchers – even regular visitors to the campus – to identify and remedy security concerns. For example, Brown said lighting has been added to areas where people said they felt unsafe at night. The ever-growing video surveillance system frequently is being used to “escort” staff to the parking lots after dark.

“As we identify risk, we work with ADT to identify the best method to mitigate that risk,” Brown said. “We try to make sure that we protect people first and then the property and resources. You can tell people on campus that they are safe, but they have to believe it. The perception is important.”

The command and control center features four 20-inch monitors for 100 cameras. Another 200 will be added as construction continues. Alarms generate video displayed on one of two 42-inch plasma screens. All card reader activity is also displayed, along with the associated employee photo.
There are diverse technologies in the design. A C CURE 8000 access control system by Software House currently monitors about 250 card readers. That number will swell to about 1,500 within the next few years. Biometric readers are on doors to what the university calls “high-value” laboratories. These research labs may contain highly contagious diseases such as tuberculosis or the SARS virus. For the labs, protection will be at biosafety level 4. There are freezers in the labs that demand environmental monitoring. Warnings will be delivered by pages and email.

The access system also automatically locks all building entries each evening. “If you are outdoors at 6 p.m., you can hear all the doors locking at once,” said Mike Abbott, ADT’s national accounts manager.

There is currently a mixture of about 100 dome and fixed cameras from American Dynamics, Pelco and Burle spread across the campus. A minimum of 200 more cameras are planned for installation as building construction continues. The cameras provide video of building perimeters, certain interiors, entries, and parking lots and garages. No cameras are or will be placed to monitor any medical treatment, research areas or individual workplaces, Brown said.

Code Blue panic alarms, placed strategically around the campus, allow for immediate voice access to the campus police.

The Fitzsimmons General Hospital, built in 1918, has treated thousands of soldiers wounded in five wars. President Eisenhower recuperated here following a 1955 heart attack. As construction continues at the University of Colorado Health Sciences Center, the building, now known as Building 500, will be remodeled to serve as the administrative center for the project.
The heart of the electronic security system is a command and control center adjacent to the campus police headquarters and dispatch center. All entries into reader-protected doors record and display on a 20-inch monitor. By mouse clicking on any entry, the system displays the name and an identification photo associated with the card that was used. An access card is also required in order to exit many laboratories.

An Ageis software package from CapLogic displays on an adjacent access control monitor. It provides a graphical interface showing the campus layout and all alarm points. In case of an alarm, a security operator clicks on the highlighted site to see the most recent access activity and live and/or recorded video of the location.

“Within a year, we hope to have monitors in all campus police vehicles giving officers access to the mapping feature and related video so that they will have a better idea of what to expect when responding to an alarm,” said Tom Cummiskey, ADT’s director of national accounts.

During an alarm event, video displays on one of two 42-inch wall-mounted plasma monitors. Ten Intellex video management systems from American Dynamics can each record 16 cameras simultaneously. In non-alarm situations, the video displays on four 20-inch color monitors. Brown will add additional monitors as more cameras come online. The Intellex units provide a video tour of the buildings by sequentially rotating through the cameras and also allow for a rapid search of recorded video based on criteria such as date, time, changes in lighting, motion or activities within a user-defined area.

The control room also houses a redundant server so that there will be no interruption in the electronic security system should the main unit fail.

Brown said he is aware of the value his department brings to the ultimate success of the UCDHSC. He is also aware that the project is being counted on to provide much more than just quality medical instruction, treatment and research.

“When fully built out, this project is expected to generate 14,000 jobs and help revitalize the surrounding neighborhoods with new housing, retail operations and other businesses,” Brown said. “With expectations like that, our job takes on an even greater importance.”

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Future Proofing After Magnetic Stripe

    See More
  • Smart Cards

    Future-Proofing with Smart Card Investments

    See More
  • future-proofing your enterprise's data against hackers

    Future-proofing data against hackers

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!