Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Upgrading Security by Migrating from Keys to Cards, Apps and More

By Sarah Ludwig
Mike Grupe, Director of Security at Williamson Medical Center in Franklin, Tennessee.

"One of the reasons we decided to convert to an electronic access control system was the convenience and the speed of being able to get to a location with your badge as opposed to having it unlocked for you or having to use your key,â?? says Mike Grupe, Director of Security at Williamson Medical Center in Franklin, Tennessee.

Williamson Medical Center in Franklin, Tennessee, switched to electronic access control because of convenience and speed of badge access.

Williamson Medical Center in Franklin, Tennessee, switched to electronic access control because of convenience and speed of badge access. Photo courtesy of Williamson Medical Center

Mike Grupe, Director of Security at Williamson Medical Center in Franklin, Tennessee.
Williamson Medical Center in Franklin, Tennessee, switched to electronic access control because of convenience and speed of badge access.
October 1, 2014

Imagine the day when you can check-in and choose your hotel room using your mobile phone. You may soon be able to do that at Hilton hotels, as the chain says it will offer digital check-in and room selection at 11 of its brands, across more than 4,000 properties. The service will be available to Hilton HHonors members in more than 80 countries, the company said. “We analyzed data and feedback from more than 40 million HHonors members, as well as guest surveys, social media posts, and review sites, and it’s clear that guests want greater choice and control,” said Geraldine Calpin, SVP and global head of digital at Hilton Worldwide, in a statement.

Smartphone apps are the most recent wave of technology to hit the electronic access control arena. And while smartphone technology is just gaining popularity, all electronic access control systems have a number of advantages, which is why many businesses are making the switch from mechanical keys. These systems allow tracking, increased security, compliance with industry and/or insurance standards and restriction of unauthorized access. They are convenient and, in the long run, cost efficient.  

Convenience

Networked electronic access control systems, where the locks communicate with a central computer, are inherently flexible and simple to use, from easily assigning electronic cards, badges and passcodes, to deactivating them with a few mouse clicks, to programming doors to stay unlocked during specific time periods. “One of the reasons we decided to convert to an electronic access control system was the convenience and the speed of being able to get to a location with your badge as opposed to having it unlocked for you or having to use your key,” says Mike Grupe, Director of Security at Williamson Medical Center in Franklin, Tennessee.

Grupe also appreciates the ease with which cards can be programmed and deactivated, as well as the way employees can be sorted into groups with access to only certain doors. “It makes the badge simple because a new employee can be dropped into a group and can access the doors they are supposed to,” he says. “We can also make temporary cards that allow a vendor or sales rep a short time of entrance. If someone is terminated or they leave, (even if) they have their badge, it’s a simple process to deactivate that badge, and it no longer functions. In addition, we can also set up an alarm if that person comes back later and tries to get in.”

Instead of having to use multiple keys, electronic access allows you to use just one card or passcode to get through the doors in your building, rather than having the old janitor key chain, says Stephen Kirkman, VP of Electronic Security at Global Security Services. “We have some areas that are locked that have medication that the doctors in a quick emergency situation can get into much faster than fumbling for keys or trying to get someone to call security officers to come and unlock it,” adds Grupe.

Another advantage: “With the click of a mouse, specific doors, entire wings, or even entire buildings, may be locked down or unlocked instantaneously,” says Emily Godefroid, an access control and electronic security coordinator in St. Louis, Missouri.

Grupe praises the use of “time zones.” “At certain times of the day, we may have the door unlocked, and that’s set in the computer, so it automatically unlocks during the day and locks when it’s supposed to,” he says. He also appreciates being able to temporarily program a door to do the same thing.

“The time savings are unbelievable,” adds Grupe. “With nearly 2,000 people, it makes a huge difference for us because we can get people in and out of areas and shut people out of places they’re not supposed to be. We can lock down the entire hospital in just a matter of a couple of minutes.” Adding a new hire to the system is quick and easy as well, he says.

 

Tracking Abilities

One of the greatest advantages of an electronic access control system is the ability to track in the form of an audit trail. “Administrators have the capability of running audit reports that are date and time stamped with information regarding who entered and exited a specific location and what time,” Godefroid says.

“There’s a tremendous amount of key control because we have around 2,000 employees,” Grupe adds. Audit trails are also invaluable for areas such as storage closets, where theft may occur.

 

Better Security

The higher tech the security system, the more secure it is, and electronic access control systems have the edge over mechanical keys. “Security breaches, or the threat of potential security breaches, often create a greater need for a higher and more efficient security system,” says Godefroid. “Possible security breaches could be as simple as a mechanical master key being lost or the mechanical keying system in use was not managed well, creating confusion regarding who actually has keys and to what spaces or buildings.”

Electronic access systems are more secure than mechanical systems because they have a digital signature for each user, says Steve Spatig, General Manager of Electronic Access Solutions at Southco Inc. Also, with a regular key, especially a master key, if you don’t get it back when an employee leaves or it gets lost, this creates security risks and reinstalling locks may be necessary, according to Jeremy Earles, Credentials Business Leader at Allegion, PLC.

 

Different Systems, Different Benefits

Often, companies use two different systems concurrently in order to meet certain standards, such as a keypad and a card reader, says Kirkman. “The thought behind that is if the employee loses the card or it gets stolen, somebody can’t just get in with their card. If they just give away their code, someone else can’t get in without the card too.” Cameras are also often utilized in conjunction with an electronic access control system of any type as well, so security officers can see who is actually gaining access, Kirkman says.

 

Keypads

Keypads are a great alternative for businesses with multiple, fluctuating customers, such as a 24-hour tanning salon or gym. “Instead of having cards that have to be reissued, and with thousands of customers, there would be thousands of cards out there, it’s much easier to just have a keypad on the side of the building so codes can be issued to individuals,” Kirkman says. Ideally, keypads should not be used in high security areas unless they are used in conjunction with another form of security, since codes can be easily lost or shared.

 

Magnetic Stripe Cards

These are the oldest type of electronic access with a fairly low level of security, but they are a low-cost option. Magnetic stripe cards are extremely easy to duplicate, says Earles, so they should be used for lower security environments.

 

Proximity Cards

These cards must be held within several inches of the reader, rather than inserted as magnetic stripe cards are. Each card has a facility number, along with its own individual number, embedded inside, so the numbers cannot be changed. Like magnetic stripe, though, they can be easily duplicated, Earles says, so they aren’t very secure either, though many companies still use them because of their simplicity.

 

Smart Cards

The highest level of contactless cards, smart cards have the greatest amount of security. They have encryption and can store data. These cards are very difficult to duplicate or break into, and since their cost is about the same as that of proximity cards, the majority of card manufacturers are pushing this technology in an effort to boost security, says Earles.

 

Smartphone Apps

Smartphone app-driven access control solutions have not been around for long and are just beginning to be used more often, but the convenience of not having to carry around a badge or key can’t be denied, since people typically have their phones with them at all times.

Apps also have greater security than mechanical keys or badges if they are stolen or lost. Phone data can be wiped remotely before anyone else has an opportunity to get into it, and most phones also have a pass code lock on them, making access difficult, says Earles.  

 

Biometrics

Biometric systems are used for high security areas and typically require a fingerprint, retina scan, or hand geometry. “Biometric security is growing in popularity as well, but it is an expensive solution and normally used in conjunction with other electronic access control applications for highly restricted access areas,” says Godefroid.

The best electronic access control system really depends on the needs of the business, the standards they must follow, and their budget, says Kirkman. If a proximity card system is being considered, definitely look into smart cards as an alternative, since they offer much greater security and have virtually the same cost, Earles says. In general, if you have three or more doors in your building, it’s smart to consider electronic access control systems. 

KEYWORDS: access control access management tools biometric security electronic access control key control security retrofit

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • migrating feat

    Migrating from Keys: It’s All in the Journey

    See More
  • cards feat

    Adding Value by Adding Functions to Cards and Badges

    See More
  • Keys to Employee Cybersecurity

    Keys to Employee Cybersecurity

    See More
×
"One of the reasons we decided to convert to an electronic access control system was the convenience and the speed of being able to get to a location with your badge as opposed to having it unlocked for you or having to use your key,â?? says Mike Grupe, Director of Security at Williamson Medical Center in Franklin, Tennessee.
Williamson Medical Center in Franklin, Tennessee, switched to electronic access control because of convenience and speed of badge access. Photo courtesy of Williamson Medical Center

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!