Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Making a Great Entrance

April 1, 2008
At Hanover Hospital, a new pharmacy suite contains both single-door and double-door openings that are secured with flexible locksets.


Door controls may be old as the hills but they’re no longer ugly hills as security executives base today’s buying decisions on looks, expandability, low maintenance, higher technology and return on investment.

Hanover (Pa.) Hospital Director of Safety and Security Joe Bellino was assigned the task of selecting security components that would provide the highest levels of performance without going over budget. For Bob Perkins, director of safety and security at the Southern Baptist Theological Seminary in Louisville, he sought a better method of automating and monitoring key control. For Sue Stacy, the City of Tahlequah, Oklahoma, human resources director, she looked for a biometrics system that would work in tandem with time and attendance software.

In addition, numerous access hardware makers also have freshened their lines through unique products, accessories and solutions.

Hanover, for example, is nearing completion of a $32 million expansion project. Involved early, Bellino was part of a construction committee comprised of facility, safety and security, finance and operations personnel. From past experience, he realized one of his bigger challenges would be finding access control products that did not require proprietary software and would easily integrate with the existing Honeywell ProWatch security platform. “We wanted access control locking hardware that was cost effective without sacrificing performance. A security platform was already in place, so we wanted access control products that would run off this existing system,” he explained.

Bellino immediately took an interest in the Sargent Profile Series v.N1 lockset. This integrated Wiegand lockset allowed him to easily expand the system with a simple panel interface board and no additional software. Access control information is transferred between the lock and an interface module using RS485 communications.

Hanover’s systems integrator, Security Services & Technologies, tied the locks into the security platform with little effort. “This allows us to monitor the status of the doors from a centralized computer system in our security office,” Bellino noted.  The Sargent technology can configure the access profiles of the lockset remotely from a PC. “The programming flexibility of the lock,” he stated, “allowed us to incorporate different functions to accommodate the individual security needs of each door.” The hospital has strict access control procedures and requires all employees to carry HID 125kHz prox card ID badges. Bellino explained that the device works with the existing badges and also features a keypad that gives the hospital the option of dual credentialing, which is used on sensitive areas such as the pharmacy.

On top of that, Hanover also selected the optional MicroShield antimicrobial coating.

At the Southern Baptist Theological Seminary, Adam Panisiak, coordinator of keys and access control, sees value in use of better automated monitoring for campus key control.

KEEPING TRACK OF KEYS

If keeping track of your car keys or house keys can sometimes be a challenge, imagine what it must be like to have responsibility for the day to day management of hundreds of keys, all coming and going and being used by a multitude of individuals. But if you ask this question of Bob Perkins at the Southern Baptist Theological Seminary, he will tell you that it has not been a problem since the school installed a computerized key control and storage system.

“Our campus has over 3,000 doors and when we changed over to a patented smart key system last year, it was imperative that we implement a key control system at the same time because a manual system was just not an option,” said Perkins. “The Morse Watchmans KeyWatcher has provided us with a professional solution that has met our needs and more than lived up to its reputation for quality and ease of use.”

The school installed five units (three with 96 key capacity and two with 8 key capacity) and Perkins is particularly pleased with the online monitoring, updating and reporting capabilities of the system. “At any time, I can view who has keys out or who has had keys out and when,” he said. “We can add or delete names from the system through the network and it’s a very simple process. In fact, almost on a daily basis changes are requested and we can implement them immediately.”

According to Perkins, training was also a very easy process. Many of the housekeeping and grounds staff are non- (or limited) English speaking and the instructions for releasing a key from the KeyWatcher are no more complicated than entering an assigned code.

For the City of Tahlequah, it picked Schlage HandPunch 3000 terminals to track and manage the city’s 129 employees.  Eight of the hand geometry terminals reside on the city’s network while three remote locations use dial-up mode to transfer time and attendance data from the biometrics-based time clocks directly to the HR Department.

“The system calculates everything, including hours, sick leave and vacation.  It provides better management and tracking of our employees.  If a department head can’t find an employee, they simply call me and I let them know which clock the employee most recently used,” said Stacy.

All employees’ three-dimensional hand templates are registered in Stacy’s office where they are associated with each employee’s individual ID number.  To enroll, the employee simply places his or her hand on the platen three times.  From that point on, the resulting template of the hand scans and the associated ID number verify each particular employee every time he or she uses the biometric time clock.

With CyberLock, healthcare facilities can key control with the ability to audit traffic to pharmaceutical cabinets throughout their departments.

SIDEBAR: Locking in More Protection

There are advances in access controls.

For instance, for hospitals, long-term care facilities and medical clinics that are experiencing problems securing their pharmaceuticals, Videx has CyberLock. It quickly converts mechanical lock hardware to a full-functioning electronic access control system. This is done by replacing the mechanical cylinders inside the existing cabinet locks with electronic cylinders. No structural modifications or wiring are required for installation.

With the solution, healthcare facilities will gain key control and the ability to audit traffic to pharmaceutical cabinets throughout their departments. An administrator can track access to sensitive areas because both the electronic lock and key store a record of openings and denied entries. It is this detailed audit reporting that makes the system very powerful. It eliminates incidents of unauthorized entry and provides reports of openings, and exceptions such as unauthorized attempts to gain access.

For some door controls, there is engraved signage as compared to vinyl decals.

From Security Door Controls, SDC, it has a field upgradeable Emlock. Among features:
  • Modular upgrade kits

  • Field upgradeable without removing from the frame

  • Uniform design and installation

  • Identical housing, template and accessories

  • Quick mount assembly
From DynaLock, it now has optional engraved signage on its 6451 Series Exit Sensor Bar. As an alternative to vinyl decals, DynaLock provides durable, precision engraved “PUSH TO EXIT” signage, featuring red-filled, 1” high, 1/8” stroke lettering.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Cybersecurity management system

    Two fundamentals of great industrial cybersecurity decision-making

    See More
  • boon edam

    The process of future-proofing a secured entrance post-pandemic

    See More
  • SEC0721-WIS-Reid-Feat-slide_900px

    The Magic of Making a Difference

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • Physical Security and Safety: A Field Guide for the Practitioner

  • Optimizing Social Media from a B2B Perspective

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing