Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Retrofit with Finance Card

June 15, 2008
Billy Simmons, key shop access control installer, Texas A & M University (TAMU), wires in another entry door card reader into a subsystem panel for a university building. Hundreds of doors were converted from key entry to access control card readers during the university’s retrofit.


The access control for this door and hundreds more was installed by the TAMU Physical Plant’s key shop department, which was trained by Matrix Systems. In-house installation saved significant costs on the access control retrofit.

Retrofitting the world’s largest contiguous college campus’s access control from a financial-based ID card system to true enterprise access control security was no easy task for Texas A&M University (TAMU), College Station, Texas.

Although the campus has over 200 academic buildings sprawled across many square miles that includes a veterinary research park, farms, and an airport, the TAMU access control review committee specified a centralized system that also innovatively enables decentralized control where needed. Careful research helped the committee choose the latest technology to accomplish state-of-the-art access control while also avoiding additional implementation expenses through several innovative cost-saving measures.

One thing is for sure, the centralized style access control system TAMU arrived at after several years of comprehensive procurement and implementation is without peer in the university world. Other universities typically operate an evolving building-by-building collection of incompatible systems throughout their campuses which leads to expensive operation, renovation, and expansion costs, according to Lance Parr, lead systems administrator, TAMU Telecommunications Department; and Ronnie Schultz, building access supervisor, TAMU Physical Plant Department/Facilities Maintenance. Both who helped spearhead the university’s new access control system. Unlike other university access control systems which are typically fragmented among different vendors that are commissioned for each new building phase, TAMU was able to put its entire system under one united system.

The university’s one centralized system uses Matrix Systems equipment, but through domains offered by the vendor’s Windows Frontier software package, each department can implement a decentralized and personalized approach. Thus, academic departments have the unique capability to view and control access in their own buildings (or domains) which TAMU feels is most effective. Besides the most common function of residence hall doors, card readers at TAMU now operate everything from parking lot gates and biological hazard suites to computer labs, classrooms, offices, and radiation freezers. “Through the use of domains, each department thinks they have their own software even though its part of our centralized system and we’ve tailored it so they can only view and control their own respective access lists, doors and schedules,” said Parr. “This eliminates the need of one centralized office doing nothing but administrative access all day. Also we feel individual departments know their students more personally and can grant or deny access more judiciously.”

The decentralization becomes as sophisticated as required via the software’s multiple calendar and access loop functions. For example a science building might have several layers of access – the building itself, instructor offices, general classrooms, and laboratories. Science building administrators can not only control access by person, but also by times throughout the day or the calendar year.

The Matrix system also allows for many customized approaches such as biometrics. Since access cards can be lost or stolen, sensitive locations depend on biometric hand scan readers by Bioscrypt and Ingersoll Rand hand geometry readers for access control security.

Many access control software programs today are designed for airports, factories, or office buildings where everything is administrated and controlled by a centralized security group. Conversely, TAMU sought an access control program it could customize into the more decentralized approach through domains, which was important because of the huge geographical size.



Retrofitting the world’s largest contiguous college campus’s access control from a financial-based ID card system to true enterprise access control security was no easy task for Texas A&M University (TAMU), College Station, Texas. The retrofit required retrofitting hundreds of doors from key entry to access control card readers.

SUB-SYSTEM GATEWAYS REDUCE BUILDING CONTROLLER EQUIPMENT

Another significant cost-saving factor was TAMU’s request for a sub-system gateway device that would use the campus’ existing Internet Protocol (IP) network to tie together all buildings while still reducing the need for building controllers in every building. TAMU’s request resulted in the vendor developing a gateway, which allows card swipe requests to be processed by building controllers in remote locations or other buildings. “We couldn’t justify the expense of building controller equipment in several hundred buildings, especially since many buildings might only be using two to four card readers,” noted Parr. “We also wanted the ability through the access gateway and IP architecture to deploy a door that might not even be on our campus. So it was important to find an access control system that could operate from Ethernet wiring rather than copper twisted-pair telephone cable.”

Previously TAMU’s access control was implemented through its Diebold Inc., Canton, Ohio, ICAM system, which is a one-card “declining balance” system designed for a variety of financial functions ranging from student on-campus debit and purchasing plus residence hall. “Auditors told us having money functions and access control on the same card wasn’t a good idea,” said Parr. “We requested bids from several companies because we wanted to upgrade to a full-featured access control system, rather than remain as an add-on system for a declining balance system.”

Consequently the successful financial part of the Diebold system remained and was placed under the guidance of the school’s financial department. TAMU hoped to eventually implement the dual-stripe card it uses today that keeps financial transactions and access control separate, but on the same card.



Although the campus has over 200 academic buildings sprawled across many square miles that includes a veterinary research park, farms, and an airport, the TAMU access control review committee specified a centralized system that also innovatively enables decentralized control where needed.

SAVING COSTS WITH IN-HOUSE INSTALLATION

The first step was spinning off access control’s keyless entry system responsibilities to the Physical Plant Department and its key shop subsidiary, which is facilitated by Schultz.

During the transition of separating financial and access control responsibilities, Schultz’s department began spearheading the actual wiring and installation of keyless entry systems, which Diebold had previously performed. Doing the keyless entry system’s installations in-house allowed TAMU to utilize their own personnel and also created a dependable single source responsibility that fell under Schultz’s control. Any emergency maintenance on keyless entry systems could be handled immediately by trained in-house Physical Plant Department maintenance people.

Developing an in-house installation team proved beneficial after choosing the new access control system. Although the access vendor has its own in-house installation department, TAMU requested that it train its key shop team to install the new access control system itself to avoid additional costs, according to Parr. “Once we were trained for installation on one or two of them, it was quite easy to handle the entire roll-out,” said Schultz.

Six major leading access control manufacturers were reviewed for industry longevity, track records, user interfaces, internal architecture, product quality, customization, customer support, and compatibility with existing equipment. An access control review committee was established with representatives from residence life, student housing, the ROTC, the Physical Plant’s key shop, telecommunications, and Computing and Information Services Department.

The fact the school wanted to retain its investment in 220 Matrix card readers that Diebold had used as an OEM product helped. Retaining the existing card readers saved TAMU several thousand dollars in materials and labor versus a new access control system.



The card reader can operate with simple card swipes, or have security upgrades to combine card swiping with keypad PIN number input. It also displays feedback readouts that can alert a campus crisis, reason for access rejection, and many other custom messages.

SEAMLESS CONVERSION BETWEEN OLD, NEW SYSTEMS

Saving money was important, however the University wanted a vendor that could customize to TAMU’s specifications. For example, one of the largest challenges was implementing a seamless database inversion between the outgoing and incoming systems on a reader-by-reader basis with little downtime, according to Parr. By carefully inspecting vendor capabilities and compatibilities beforehand, the database inversion saved thousands of man-hours by converting electronically versus manual data re-entry. Specifically, Matrix devised custom interfaces that allowed the University’s team to export data such as access lists from the existing VMS-based format to the relational database the vendor utilizes.

Keeping the ID production in TAMU’s finance department where physical equipment and trained personnel already existed saved significant costs in relocating, training and new ID equipment purchases. Making this choice possible however required the vendor to customize an interface that allows information to be generated in the original Diebold CS Gold system and immediately transferred to the Frontier access control software for instantaneous use. “When fall semester freshmen first get their ID cards on the CS Gold system, they can literally walk to their respective residence hall and swipe their new card through an existing card reader to gain access,” said Parr.



Roy Cox, planner/estimator in TAMU’s Planning & Engineering Department, oversaw hundreds of existing building retrofits of card readers for a smooth transition from financial-based ID card system to true enterprise access control security.

GOING MORE HIGH TECH IN THE FUTURE

As the new access control system evolves, TAMU is adding new features such as an elevator reader distribution panel (RDP), which interfaces elevator controls with the access control system. Three elevator RDPs are now in place and Parr estimates another six will soon be online. The elevator RDPs allows card swiping and then opens only on the user’s authorized floors.

In light of the Virginia Tech University tragedy in 2007, many universities are now looking for better lock down procedures and communications during disasters.

While TAMU residence halls have been locked down for over 30 years, the University is hoping to take precautions further than other institutions. In addition to tying together all campus e-mail, television, radio and other communications, he has also requested Matrix to interface with these alerts by providing text message readouts on building card readers.

Today, TAMU’s access control system is running at full function and the sophistication the University envisioned when they specified the system. Since the system is completely scalable, future expandability possibilities are almost infinite.

Future additions to the system will prove to be cost-cutting as well because TAMU plans to utilize new developments such as Power over Ethernet (PoE), which is an emerging security system technology that transmits electrical power and data to remote devices over an existing standard Ethernet network’s twisted-pair CAT5 cables. This potentially eliminates up to 33 percent in installation/labor costs associated with running individual AC power supplies to new entryway access control hardware. TAMU is also experimenting with wireless door locks from OSI, Chula Vista, Calif., which promises additional labor savings on new entry systems.

PoE is just one of many innovations TAMU has either used or plans to implement in the future to cut costs. While cutting edge systems are possible today, the TAMU’s review committee’s quest for reducing costs in the equipment procurement process makes it totally unique. Seamless conversion innovations between systems, in-house installation, and reusing existing equipment helped TAMU avoid additional costs but in no way sacrificed the integrity of the system.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • video-enews

    ONVIF: A Vital Tool for Retrofit Projects

    See More
  • ID Management security default

    Standards: A Vital Tool for Retrofit Projects

    See More
  • Value-Class Printer Line with Monochrome Card Printing Applications

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • Hospitality-Security.gif

    Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!