Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Access Control: In With The New

Tri-C community college

The Health Careers and Sciences building is part of Cuyahoga Community College’s four campuses and myriad other facilities that have received uniquely tailored access control solutions under Richard Frank’s watch.

Richard Frank

Richard Frank of Cuyahoga Community College uses his experience in retail security to adjust access control to each individual facility’s needs.

Tri-C community college
Richard Frank
June 1, 2012

It’s old, it’s outdated, it’s archaic – call it what you will. When the moment arrives when your card reader refuses to let you, your staff, or someone else who is authorized into your organization, it’s time for a change. How that change is done and how much it will cost is the hard part. But there’s good news: a switch might be on a smaller scale, like the Falls Church City Public School System in Virginia.

When the district switched from an individual client-based to a Web-based system, the school’s IT department was thrilled, says Seve Padilla, director of facility and security services for Falls Church City Public Schools. District administrators, on the other hand, did not relish the prospect of having to relinquish their computers to be added onto the system, which is what would have happened if Padilla and the IT department had decided to just buy the update for their existing system. Luckily for them, they didn’t.

“Our servers were aging, and we would have had to replace everything anyway,” says Padilla. “The Web-based system was considerably cheaper, with no additional hardware or replacements on the front end. We didn’t have to take our system down.

“We ran both systems, old and new, simultaneously for two or three weeks until I was sure that all the kinks were worked out. It was a gap-free transition period.”

But what about on a much larger scale, one where a two-week full-facility switch isn’t feasible? For example, Cuyahoga Community College (or Tri-C) has four campuses spread out across the Cleveland area, not to mention a variety of other facilities scattered in between.

“This has been a multiple-year shift,” says Richard Frank, director of fire prevention and security systems at Tri-C. “Everything we built or renovated over the past two or three years has the new systems, and we’re about halfway through replacing our current systems.

“We follow behind to check that everything is as seamless as possible. The same credentials that work today will work tomorrow, without users even knowing that there was a switch.

“Our goal is outstanding customer service,” adds Frank, whose previous experience includes a long stint in retail security. “If most people don’t notice the change, we did our job” — students are safer, and they don’t even know it.

“During operating hours, most buildings are open at the street level to everybody, but that doesn’t mean that there are no areas in that building with access control,” Frank says. “We have specific standards to judge how much security is required in, say, a computer lab or classroom, governing if we have to put access control on a room or group of rooms.”

Tri-C’s new system from AMAG and Karpinski Engineering Consultants integrates alarm and video with its access control capabilities to reduce false alarms and specifically tailor an area’s access control with its requirements. Frank had to adjust the system’s goals for each individual site, as the Tri-C campuses have some rather diverse sites, from hospitality management’s industrial kitchen-classrooms to the expensive equipment in the health technology careers department.

“We were very focused on each area when we integrated new access control,” Frank says. “We met with the leadership of that given operation so we can understand their hours, operations, equipment, etc., so we don’t create a roadblock to their future operations. This keeps people from trying to bypass our security measures.

“If we align ourselves with the operation, we get a much better response than if we were running a security dictatorship,” he says. “We just want to make security that fits so they can continue teaching. Other than our security staff, the end users have to know very little about it to keep doing what they normally do.”

Padilla, too, realizes that keeping new access control as simple as possible is the key to acceptance.

“Our last system was definitely designed for a military- or government-grade employee,” he says. “You had to know exactly what you were doing to get anything done. And with principals and staff moving between buildings and switching computers, it was incredibly complicated.

“Now it’s just an IP address and your credentials. Once you’re on the secure network, you log into the website and click on what you want, even from a smartphone,” Padilla says. “Everything that we had in our existing system, we didn’t have to rebuild. Even the wording’s the same, but the new icons are very intuitive. So there were no lags, no losses of information, and very little training needed. I can walk people through what they need over the phone, even.”

But why would you switch an entire organization over to a new system when certain parts of the old program still work? A unified, forward-looking system installed throughout an organization’s facilities helps to ensure ongoing security efficiency. Staff and students who move from building to building don’t have to deal with multiple access control systems, and credentials don’t have to be translated between facilities.

One set of credentials can get a qualified staff member into his or her authorized areas in a uniform, reliable manner, reducing the temptation to prop open doors, tailgate into restricted areas and ignore protocols (practically inviting risk over for dinner). If your organization decides to add a facility, the same card can apply there too. In an ever-evolving landscape, it pays to have a system that can grow, shrink or adapt to changes in a facility’s size or use.

The cost of changing the Falls Church City Public Schools to their new system from RedCloud, which brought with it multiple improvements and room for growth with fewer servers to maintain, was actually lower than the cost of upgrading their existing system. The changes to Tri-C integrated multiple aspects of the security system to maximize the number of unique uses for the program, including alarm video verification, people tracking and analytics, and multi-function access cards.

“Our older system had fallen behind the times, so we either had to update or find a new solution for our future operations,” Frank explains. “A new system is a better fit for construction and renovation, and it will stay current a lot longer. All in all, it gives us better bang for our buck.”

Both Padilla and Frank are able to access their systems from home to assist on-site staff, and Frank can even pull up video surveillance of what the dispatchers are looking at to help guide them through the proper actions.

“It’s a lot easier to discuss what they’re seeing when I can see it too, rather than them describing it to me,” Frank says. “So we can react faster and have fewer false alarms to keep from disrupting students and staff.”

 

Karen Keating

5 Steps for Converting Older Systems into Open Access Control Solutions

 

By Karen Keating, Ingersoll Rand Security Technologies,

Product Marketing Manager, Electronics

 

Converting to a more open system can be a daunting task, especially when budgetary restraints are pressing down on you. You may ask yourself, “How can I take advantage of new technologies using my current proprietary, legacy access control system?”

If your present system uses a Wiegand interface, it may not be difficult. With Wiegand, adding additional open system solutions such as smart cards, video and alarms interface systems, card system expansion to elevators, gates and remote doors, biometrics on high-security doors, and many more solutions are available to you.

Here are five steps to bring your proprietary system into today’s open world:

Step 1 – Verify software and panel boards. To optimize feature sets and cost-effectiveness, determine if your software and panel boards are up-to-date with the latest software and firmware. If not, consult your panel provider for information on upgrades and costs.

Step 2 – Meet with your integrator. Provide the information from Step 1 to your integrator. With this knowledge, your integrator can determine the limits of your present system. They will need to know

  • What software version do you have?
  • What version of your controller board(s) are you using?
  • What credentials are being used?
  • What other types of peripherals, such as electronic locks, are in the system?

Step 3 – Share your vision. Discuss with your integrator what you want to accomplish. Don’t worry about products to add yet.  Just concentrate on your security needs.

  • What are you trying to protect?
  • What are your immediate needs?
  • How might you improve your system beyond those needs?

Step 4 – Ask your integrator to get creative. How far can you expand your system without replacing present equipment? What’s the cost of expansion versus an entirely new system? Will this expansion stand the test of time?

Step 5 – Emphasize future proofing. To avoid revisiting this situation in the near future, ensure any new solutions are flexible enough to change with upcoming security trends such as these:

  • Smart cards will be the credential of choice in the near future. If you presently use proximity cards, make sure new readers are multi-technology, able to read both proximity and smart cards. Once the switchover begins, you won’t need to replace them along with your present legacy readers.
  • It’s going to be a hybrid credential world. Although smart cards may be the credential of choice, multiple types of credentials, such as key systems, PINs, various types of cards, and biometrics, will still be necessary for certain operations. You want one system to manage all of them.
  • Be ready for new technologies such as NFC. With NFC-enabled smart phones, users employ their own smart phones as an access credential, just like a smart card. Are the readers you will be using NFC ready?

Following these five simple steps, you’ll be surprised to see how easily you can convert from your current access control system to a cutting-edge open systems security solution.

KEYWORDS: card reader false alarms

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Door open access control

    The benefits of retrofitting new access control technology into older buildings

    See More
  • New Newswire Feature Image 3/8/2012

    Matrix Systems Announces New Divisions in Access Control and Integration

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing