Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

No Chicken with Web-hosted Access Systems

By Bill Zalud
July 1, 2007


One of the first interviews I conducted after getting out of Vietnam was with Ross Perot. Son of a cotton broker, U.S. Naval Academy graduate, one-time top IBM salesman, widely acknowledged as the founder of the IT services industry and unfortunate third-party Presidential candidate, Perot told me two things that stuck even today.

One thing: The future of a business is three-fold. Keep doing things that work; stop doing things that do not work; and start a few new things. The other thing: Products turn into systems and systems turn into services.

Which, in a Perot sort of way, gets me to IP.

With the startling growth of IP in the physical security arena, chief security officers, integrators, IT firms and traditional security equipment makers have jumped on the IP bandwagon. It’s most apparent in the video sector.

But the biggest growth may be on the access control side.

There is less need to upgrade equipment; there is less worry about bandwidth; and there are more business applications beyond security and images.

Michael Edwards of Clemson University’s Livestock Poultry Health Programs knows the charms of Web-based access control by installing Brivo’s ACS WebService. The Livestock Poultry Health facility houses four agricultural departments and sees upwards of 200 staff and visitors a day. ADT Security Systems of Columbia assisted Clemson staff in their search for a new access control system introducing the Brivo system and its many benefits and helping to write the bid specifications. “Our last system was run on one PC and if that person wasn’t there, you were out of luck,” said Edwards, information resource consultant for Clemson University Livestock and Poultry Health Programs.

The design controls five exterior doors and several interior doors to divide access areas within the building. The building is a research and testing facility but does not conduct live animal research. Nevertheless, Edwards is able to ensure full lockdown of the lab and effective control over which personnel groups have access to the lab, where and during what hours. In addition, the Web-based system enables staff to funnel all visitors to the main entrance lobby, facilitating visitor monitoring and proper routing, and ensuring improved control and audit trails for deliveries and samples sent to the laboratory.

“I ran extensive reports of system activity during the first several months of operation (of the Web-hosted access system) but found over time that staff learned what they can and cannot do and his familiarity with the system grew so fast, I only runs reports on demand now,” said Michael Edwards of Clemson University’s Livestock Poultry Health Programs.

Easy Web-based Access Administration

Mike Edwards is the main administrator for the system, but he also has two back-up staff. He hasn’t really needed them. “The only time I don’t manage the system is when I’m on vacation – it’s great I can jump on a PC anywhere and do whatever needs to be done,” he said.

One system feature he does rely on is automatic alerts. Alerts are sent, for example, when personnel act outside of privileges or when the system may be experiencing a problem. But alerts aren’t always an indication that something is wrong: on one occasion a temporary employee was made permanent, but his privileges had not been updated. Upon request for entry, Edwards received an alert while on a business trip. “I had his privileges updated in two minutes from my remote location; it’s really a great system.”

There’s even more services available through Web-based access. It’s now possible, for example, to leverage existing access systems by connecting them to the vast information services available on the Internet. Web-hosted access control services can provide a single point of integration that can be shared across thousands of accounts, sites, and control panels.

This integration enables access control, device management and other systems to “listen” and respond to data such as weather conditions, public service announcements and much more. Accessing data in this manner allows municipalities, schools, and businesses to address or respond to changing conditions. The same techniques can be applied to corporate data sources such as human resources systems and automated kiosks.

Among examples: Integrating Web applications can open the door to new services, such as combining online hotel reservations with access control, so a guest arriving after hours can be assigned a PIN code to enter after the front desk is closed for the night. In another scenario, there are kiosks located in shopping malls that allow prospective buyers to register to visit properties offered by real estate companies. An XML interface links the kiosks to the access control system and in turn to the individual properties. Wireless control panels at each property avoid the need for special wiring. The visitors are able to register at the kiosks and immediately receive a PIN that will grant them access to the property.

Thank you, Ross Perot, for helping define the future of IT and security services.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Poor Sister No More: Access Enters Spotlight, Again

    See More
  • TWIC and PIV Integration with Physical Access Control Systems

    See More
  • Intercom Works with Electronic Access Control, Analog Systems

    See More

Related Products

See More Products
  • SSCP.jpg

    SSCP Systems Security Certified Practitioner Practice Exams

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing