Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

IP at the Door

April 1, 2009

When security leaders think about IP-based security systems, often they reach for video. But it’s access control that can make a faster bottom line kick. Charles Bailey knows.
     
The director of human resources, safety and security for Goodwill Industries of Eastern North Carolina, he has standardized on an access control Web service for 29 retail program centers. “Before (the system from Brivo), we had a standard lock and key system,” said Bailey. “Each manager had to manually open the store and then turn off the alarm. The problem was we didn’t know who had entered a store and we would have to do a lot research to answer some pretty simple questions on access.”


COVERAGE AMONG LOCATIONS

All employee entrance doors are monitored by the Web-based service. “The great part about it,” commented Bailey, “is when 9:00 comes around and we know the status of every one of our stores. If an area manager sees one of his or her stores isn’t open, they’re on the phone solving the problem. We’re spread out over half of the state. The system gives us the accurate, instantaneous information we need. About a month ago, we had a big snowstorm here. On that day, we could sit and monitor the e-mails coming in to know that all our stores opened on time, we didn’t have employees sitting in the parking lot waiting for a manager, and our customers were being served.”
     
There are business uses of Web-based access beyond security.
     
For example, Goodwill uses it to monitor cleaning operations. Cleaning staff have access cards. Not only can manager confirm that their stores are being cleaned, the organization can analyze access control data when paying cleaning service invoices.
     
Another source, StandGuard has a Web-hosted service offering end-user management of security, access control, and HVAC systems. Through one secure login by the end-user, the service allows for management of locations, systems, and personnel from any Web-enabled device.
     
Just like IP-based video, on the access control side there are numerous ways to skin the IP cat.
     
In one way, panels make the decision themselves in a decentralized fashion whether or not to admit a person. Many times, these systems are connected to the enterprise’s computer network. With another generation of Web-based access control, the control panels not only make the opening decisions themselves, but are complete computers that can be accessed over the Internet.
     
Of course, the next logical step is making access control a third-party Web-based service.
     
The access control market is on the verge of a technological revolution. As IP networking technology matures and computer processors attain new levels of performance and reliability, the industry is shifting from older technology based on hardware panels and proprietary protocols to new high-technology systems consisting of innovative software, PCs, and IP-enabled edge devices. This trend is simply a migration from controller-based access towards server- or host-based access control.
     
IP-based communication with IP door controllers also facilitates the setup process. The end-to-end IP architecture represents a true rebirth of access control technology.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • 7 Myths about IP Access Control to the Door

    See More
  • COVID-19 Proves It’s Time for the IRS to Stop Identity Fraud at the Front Door

    See More
  • Find Out Who’s Really at the Door

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing