Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Commercial Buildings Cover the Night Shift

June 17, 2008
Just because access is granted to an outer means of egress doesn’t mean you’re free to roam the building. The Sielox software in conjunction with Excel access control provider creates an additional security barrier against those looking to get access to unauthorized floors.


As operating costs such as fuel and electricity continue to increase, owners of commercial buildings are exploring options to reduce operating overhead.

Scott Grossinger Etess of Excel Global Security has witnessed this first-hand. “On average we receive two to three calls a week from commercial property managers or owners. They want suggestions on how to reduce their costs and continue to provide tenants with a safe environment,” said Etess.



EMERGING TRENDS

A recent trend in the metropolitan marketplace has been to reduce operating costs by installing building-wide access control systems on what Etess refers to as Excel’s “strategic security partner” model.

“It’s an easy way to ensure minimal impact on the building’s long-term bottom line by reducing recurring operating costs,” said Etess. “This model allows a building to eliminate the cost of staffing the lobby with a uniformed security officer overnight and replacing him/her with an effective access control system.”

At the heart of the fully integrated platform sits the Pinnacle access control system from Sielox. This software provides total control of the entire access control network, plus the ability to upgrade or reconfigure controllers, readers, proximity cards and other hardware remotely. It incorporates agile methodology for software development. The company also offers backward-compatible technology to support its legacy products.

The systems incorporating such software technologies are installed at numerous midtown office buildings. After standard business hours, the exterior doors to the facility are locked, with the locking controlled remotely at the command center. Tenants who desire to gain access to the premises after standard business hours (the hours when a security officer is no longer on-site) must be equipped with an access control card and the appropriate access level (as determined by their employer in conjunction with building management). On presenting an access card with the proper authorization or configuration to a proximity reader at the building’s exterior, those authorized are granted entry to the facility.




THE STRATEGIC SECURITY PARTNER MODEL

Building security, however, does not stop there. Once inside the facility, the authorized cardholder enters the elevator. Only upon presenting their card to a proximity reader in the elevator cab itself can the tenant access their authorized floor or floors. If desired, the system can be extended to authorize access to only specified doors within the tenant’s space.

“New York City is a very complex market with regard to its security needs,” explained Etess. “What sets apart from other cities is the fact that most buildings are home to multiple tenants. This plays an integral role in designing an appropriate security system. It is not as simple as adding access to the exterior entry doors to the facility.”




SAVING WITH CABLE/DSL

The system offers the capability of communicating with and monitoring all of its remote buildings through cable or DSL lines, eliminating the use of telephone lines for its multiplicity of applications. It also provides real-time remote event management and control functionality.

Partition databases are another benefit. Although Excel is the master controller of the security system, the software can be set up to allow multiple databases for tenants. Unique configuration and control functions to suit individual tenant requirements are available, with no chance of confusion or conflict because each is treated separately. There is no limit to the number of tenants that can be set up in their own unique partitions.




THE PLATFORM IN ACTION

The fully integrated platform is in action at the company’s Security and . On entering Excel’s facility, a visitor will see an array of 42-inch flat-panel video monitors. The monitors display live feeds from security cameras installed at commercial facilities around New York City and the Tri-State area. At the many workstations, highly trained professionals administer and monitor access systems. System monitoring combined with live video feeds allows the staff to receive alarm signals, verify their accuracy and determine the appropriate response. Additionally, Excel maintains multiple response teams, who respond to alarm conditions. When they are not responding to alarm conditions, response teams travel from site to site to ensure each facility is safe and secure.

As a result, the need for overnight guard service has been eliminated at some facilities. Of course the model does not fit all buildings, but those capable of utilizing such a system reap the rewards immediately. “Hourly rates associated with guard service can add up. The access system and the monthly fees associated with monitoring and administration are significantly less, thereby making access control an attractive alternative to some,” Etess said.  

 

About the Sources

Scott Grossinger Etess is director of sales and marketing for Excel Global Security. Also contributing is Dave Taylor, a security manager at Excel.


Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Circle K gas station at night.

    OSHA cites Circle K following attack on Orlando night shift employee

    See More
  • Commercial and Retail Buildings Fastest Adopters of Remote Monitoring Services

    See More
  • Brightening the Night with Day/Night Cameras

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The Database Hacker's Handboo

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing