Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Access Control for Smaller Facilities

By Diane Ritchey
July 1, 2009
Small retail stores, offices, universities and school districts and small manufacturers need access control just as larger facilities do, but sometimes, can be limited with smaller budgets and other obstacles. In addition, these smaller enterprises need simple, easy-to-operate and easy-to-program systems that often may not require full-time administration of the system.
     
Unaccounted for keys and untraceable access are concerns for any size facility. Recently, these issues were faced by the Polk County Composite Squadron of the Civil Air Patrol in Florida. The group’s facility needs to be accessible by the squadron at any time of the day or night to handle search and rescue emergencies; however, the building is generally unmanned. Squadron members had been issued keys in the past, but when keys are lost, the expense of re-keying the locks must be incurred. In addition, it can be a headache to keep key assignments current as personnel changes occur.
     
With only two doors needing to be secured, a typical computer based card access system was too complex and exceeded the budget. The Civil Air Patrol squadron ultimately selected the EZ-Access product from Dortronics Systems. The system includes strikes installed on two doors to utilize the existing lockset hardware and to avoid special door preparation.
     
Jon Petersen, the local squadron commander, wanted the squad’s 30 members to have 24-hour access through the main entrance while limiting access into the secure radio room to only a few people. This was accomplished by programming all cards into a main entry reader, but only cards for authorized personnel into the radio room card reader. The facility is now secured 24 hours a day, and any time a member enters the facility using his card, a historical entry is added to the database for future reporting.


Small Defined

Kirk Davidson, president of Commercial Security Integration, in Austin, Tex. said that small is a relative term in small access control installations. “We define small as anything less than about 15 doors, and we separate it into two groups,” he said. “The first group is what we call beginners, who are controlling two or thee or four doors. This group has three primary objectives: getting rid of keys, establishing an audit trail of some kind and acquiring the ability to automatically schedule access to these doors.” Davidson has used RS2’s First Step System with many companies because he said it provides small access control at a low cost.
     
The second group in the “small” category, said Davidson, is users who need to control approximately 5-15 doors. “At this level, they want to include badging, security video, and possibly some biometric recognition,” he said. “In terms of integrating with other systems like video analytics, etc., this starts to happen at around that 15-door level. So, the whole issue of expandability or scalability is extremely important. They have to have a system that can grow with the organization.”
     
Davidson added that many small companies will install access control because they want to protect a server room. That point – and others – was echoed by Randy Jara, general manager, Red Rock Cabling in Irvine, Calif. “Our small users start out with some basic needs. Within the organization, they need to limit – and track – access to high-value areas like server rooms and inventory storage areas, and they want to get rid of having to manage keys. That’s what they start with, and then they move out from there.”


Smaller, with Room to Grow

Guy Grace, director of security and emergency planning for Littleton, Colo. Public Schools, said that in his opinion, no matter the size, “every school, every business and home need some type of security system in this day and age. Our needs were based upon protecting the users and the facilities that the community has invested in since the founding of the
community.”
     
One challenge Grace said he faces with the security system is that schools in his community are “major centerpieces. A typical school is in use 16 hours per day, 7 days a week. During school hours, the security system must address the needs of both the staff and students. It has to provide a reliable operation and a very user friendly interaction with the staff and students, while keeping the potential threats out.”
     
The district’s current security system consists of eight card reader points for a typical high school, in addition to 20 external cameras with 20-40 internal cameras. There are also 20 external sensors such as beam detectors and motion detectors for after hour’s security concerns.
     
A typical middle school has six card reader points, in addition to 15 external sensors, while a typical elementary school has five card reader points, in addition to 10 external sensors.
     
All of the school district’s security systems are integrated from the readers, motion detectors and door contacts, said Grace. For example, he said, “area cameras will come up when a door is open or other device is tripped and then go back to its assigned duty after the event.”
     
Before choosing the current system, Grace said he looked at how he could best protect the district’s children, staff and the community assets. And as is often the case with most small security installations, Grace said that he had to ensure that the system would grow with the school district’s needs.
     
“When we were looking for a system in 2002, we only had a very basic idea of what we wanted in a security system,” he said. “The infrastructure was in place by 2007. However, a good security system today must be able to grow, and as a result, we have added significantly to our security system. A security system and the practices that it brings is never finished in a school environment. Good security departments will always look for ways to improve. Money is certainly an issue, but if the system in truly integrated, then new technology should have no problem being integrated into the system as you can afford it. In that sense, you always have more than what you started with, blending the old and the new always complimenting each other,” he said.
     
Use of the system has resulted in property crime decreasing from 92 percent to 62 percent per school night since 2004. “Initially there was a dramatic increase of incidents when we first started,” Grace said. “That increase was only because we were now detecting things we never knew about. As the issues were addressed, incidents and crime decreased.”
     
He added that there used to be an average of 12 burglaries a year in the schools, in addition to major vandalism attempts. “With this security system we know when people are on our grounds. As a result, our return on investment is measureable by the vandalism and crimes that we deter versus the vandalism damage we were unable to deter or apprehend the persons responsible.”


Smaller is Better

A small security installation has worked for the past 11 years at San Diego State University (SDSU). The college is using 12 hand geometry readers from Ingersoll Rand Security Technologies to provide access into its six entrances at its Aztec Recreation Center, Aztec Center bowling and games facility and a racquetball court, as well as four entrances to the Aztec Aquaplex.
     
Instead of verifying a card or code, the readers verify the person who is at the entrance. It looks at the three-dimensional size and shape of a member’s hand. The result of 90 hand measurements, including lengths, widths, thickness and surface areas, is converted into a mathematical representation of the hand, which is stored as a template for later use and verification. 
     
To enter the university’s facilities, a student enters an ID number on the keypad and presents her hand to gain entry. The readers are networked using a biometric software package for distributing the hand geometry templates across the network, allowing a member to enter any of the approved entrances.
     
“The HandKey readers minimize people’s ability to transfer IDs for admittance into our Center,” said Vicki Greene, member services coordinator for the Associated Students of SDSU.  “The hand readers also allow us to provide better service. This also means we don’t need to have an employee out front checking cards. In addition, we feel that hand geometry is the least invasive of the biometric technologies and seems simple compared to the others.”
 
Small access installations can also work well at small manufacturing facilities, as demonstrated by Brainard Rivet Company of Girard, Ohio, a manufacturer of rivets and drilled products. The company needed increased protection for its payroll records room.
     
The new security system uses the Lathem LX100, a keyless/proximity badge door lock that fits standard interior doors and allows for proximity badges to be compatible between the two systems. With the system, Brainard employees can now clock and lock in or out with the same badges. Brainard management can also assign or delete employee access when needed.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Facilities Open Doors to Custom Access

    See More
  • Security Talk Default

    Using Smartphone-Based Access Control to Keep Students Happy

    See More
  • Cover Story March 2011 image

    From Top to Bottom, Inside and Out: Five Facilities, One Shared Focus

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!