Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

19th Century Courthouse Goes Digital with Cloud-Based Access Control

June 20, 2013
Sections of this 19th Century courthouse were converted into retail and office space, but the old lock-and-key access control system was out of control. It was time to look to the Cloud. Image courtesy of Brivo Systems.
Sections of this 19th Century courthouse were converted into retail and office space, but the old lock-and-key access control system was out of control. It was time to look to the Cloud. Image courtesy of Brivo Systems.

Brivo Systems LLC, leader in cloud applications for security management, today announced that the historic courthouse in Crown Point, IN, has substantially upgraded their access control management capabilities with a cloud-based Brivo ACS WebService system. The new system was specified and installed by Phil and Son, Inc.

After the town of Crown Point built a new courthouse complex, the historic courthouse, under the leadership of the Crown Point Courthouse Foundation, was transformed into a three-story mix of retail, offices, ballroom function space, and a still-functioning courtroom. Security for the remodeled historic courthouse remained standard lock and key, and that’s where the problems began.

“It really got out of control,” related Allen Pante, of Phil and Son. “While there are only four entrances, there were over 200 keys in circulation, so when the Foundation took over, they faced the hassle and expense of re-keying the entire building. Then, once retail and event rental operations started up, there were so many people coming and going but somehow access had to managed for all these different and growing needs.”

For the new mixed-use complex, someone had to manually open all four doors each morning and then re-lock them at 6:00 pm each evening. After-hours access for events was needed, as was a way to grant after-hours access to the businesses that maintained offices in the upper floors. “Clearly, the Foundation needed a better, more efficient way to manage access for the many and varying demands of all the building’s tenants, visitors, and customers,” Pante explained.

Phil and Son looked at a number of different access control providers to solve the Foundation’s access management challenges. “It was important that we understood the Foundation’s needs at this time, but also in the future. The Foundation Board members wanted access card control, add and delete capabilities, remote access, and to provide specific access privileges. And the retail shop owners wanted a lot more—door scheduling, and to be able to change and add system features.”

Pante continued, “When I evaluated the different choices, the Brivo system just shined. Many of the systems we looked at were ‘fix it now,’ but I could see the Brivo system had the flexibility for future needs as well. Other systems required that I load software onto Board members’ computers—that wasn’t going to work—and most did not offer mobile access. The building’s internal network is out-sourced, so we needed a solution that wouldn’t compromise the network. In the end result, it was clear the Brivo system would allow the Foundation to expand and do whatever the Board members could dream up.”

Another key feature of the Brivo ACS WebService solution is remote management. So, now Pante and his Phil and Son colleagues can assist the Foundation staff in managing the system and provide important back-up resources for any of their needs or questions. “It’s been a pretty big change going from keys to something this sophisticated,” Pante explained, “so being able to help the staff along the way and provide a comfort level has been a tremendous advantage.”

The Brivo system is used to manage the four main doors located on the north, south, east, and west sides of the building, as well as two bathroom entrances. Two of the main entrance doors lead to the first floor and the retail shops, and the other two doors provide access to the upper floors, where the offices, ballroom, and courtroom are located. The system manages access for over 100 users a day and upwards of 200 users for after-hours events and/or office access.

The "Grand Old Lady" has been placed on the National Register of Historic Places, but as it still functions as a retail, office and courtroom space, modern access control was needed. Photo courtesy of Brivo Systems.
The "Grand Old Lady" has been placed on the National Register of Historic Places, but as it still functions as a retail, office and courtroom space, modern access control was needed. Photo courtesy of Brivo Systems.

Phil and Son has assisted the Foundation staff to create separate groups with specific access for the retailers in the basement (first floor), clients on the 2nd and 3rd floors, Foundation management, different service providers, cleaning crews, and Foundation volunteers. The main doors automatically unlock each morning and relock in the evening; they are programmed for specific access on the weekends, and to provide different access for each special event in the ballroom after hours. “The Brivo system does an awesome job of letting us manage all the different public and private groups and their specific needs,” Pante observed.

In addition to highly-specific access management, as well as system flexibility and scalability, the Brivo system offered other valuable advantages as well. “The Board did not want any construction on this historic building, so that locked out a number of technology providers. Luckily, through Brivo’s integration with Schlage, we had a wireless solution—problem solved,” Pante related. Also, for Phil and Son, they’re saving money. “With the remote access and management, I don’t have to roll a truck to the site every time there is a program change or request and Brivo ACS WebService eliminates questions of warranty and service agreements; there are no hidden costs, and they’re buying a complete system, a total package.”

Recently, the Foundation Board came to Pante with a problem—they needed to limit retail customer access to the upper floor offices on the weekend. “We integrated the Brivo system with the elevator controls, and we were able to close off access to the offices as needed. Everything the Board has asked for, we’ve been able to deliver. The end result speaks for itself in terms of what this system can do. The Foundation has been pleased we can solve all these issues and each time they come up with a new request, it doesn’t cost them thousands of dollars.”

KEYWORDS: cloud computing cloud computing services cloud security Crown Point Courthouse historical spaces and security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • University classroom

    Transforming Higher Ed Safety and Efficiency with Cloud-Based Access Control

    See More
  • hotel implementation of cloud-based access control

    Arena Del Mar Hotel deploys digital keys and cloud-based access management

    See More

Related Products

See More Products
  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Events

View AllSubmit An Event
  • September 25, 2025

    Cloud or On-Premise: Navigating Access Control and Cybersecurity Choices

    ON DEMAND: Join Schneider Electric for an in-depth webinar exploring the critical decisions security professionals face when choosing between cloud-based or on-premise access control solutions. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing