Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesAccess ManagementPhysical SecurityCase Studies (Physical)

Access control secures Ohio homeless shelter

By Karen Evans
Access control
November 23, 2021

In January 2020, on the brink of the pandemic, there were 580,466 people experiencing homelessness in America, according to the most recent count by the National Alliance to End Homelessness. It is the greatest number of homeless people in the U.S. since 2013. What’s more, demographics show that men are far more likely to experience homelessness than women. Of every 10,000 males, 22 are homeless. For females, that number is 13, the organization reports.

Due to the harsh reality of these statistics, the Refuge of Hope Ministries was a momentous project within its community when it was constructed in 2019. Refuge of Hope is the only men’s homeless shelter in Stark County, Ohio, which covers a 580-square-mile area. Approximately 15 percent of Stark County’s population (57,080 individuals) are food insecure, making the shelter an essential service for the community. Even in the city of Canton, the largest in Stark County, one in six residents lives at or below the federal poverty level.

Today, the 19,000-square-foot Refuge of Hope facility accommodates up to 66 homeless men and feeds up to 500 meals at lunch and dinner times. The ministry partners with local agencies to overcome issues that lead to homelessness. It also provides services such as clothing and personal hygiene items, laundry and shower facilities, and assistance with job and apartment searching when the men transition to independence.

While providing a safe haven for people is one of their main goals, shelters themselves can be dangerous places due to circumstances surrounding poverty and homelessness. From the beginning, Refuge of Hope Ministries wanted to address the propensity for violence in shelters.

“During the construction of the building, our ultimate goal was to make it the most secure building in Canton, Ohio,” said Tim O’Neill, Director of Operations at Refuge of Hope Ministries.

The shelter selected Sielox LLC’s Pinnacle Access Control Platform to secure the building. The system operates as part of a comprehensive security and surveillance solution at Refuge of Hope Ministries. O’Neill designed the system and integrator Ashton Sound & Communications Inc. of Ravenna, Ohio, installed it.

The building is divided into three areas: kitchen, shelter and administrative offices. It required the ability to automatically lock down different areas throughout the day while simultaneously unlocking other areas. Because the shelter is manned 24/7, it needed a robust system that could control access of the staff. For example, the system needed to be able to restrict access of the third-shift supervisor to the admin area.

To simplify and expedite the installation, Ashton installed hundreds of feet of access control banana peel composite cable from Anixter. The cable provided the correct wire gauge and color code for each device at every door, O’Neill said. The wire was then homerun back to two Sielox control panels located at the two furthest points in the building.

The cabling helped ensure that the installation at the shelter went smoothly, according to O’Neill. The access control solution consists of Pinnacle Lite software and two Sielox 1700 eight-door controllers to control the 16 secured doors at the shelter. O’Neill selected HID readers and credentials for the system.

Refuge of Hope Ministries decided on the Pinnacle Lite version of event management software, which can secure any combination of 32 exterior and interior doors for up to 2,000 users.

The facility uses a Sielox 1700 Access Controller that provides facility protection even if communications are interrupted. It connects directly to a network and each panel can control two wired doors and up to 32 wireless doors.

Also part of the shelter’s access control solution is Sielox CLASS – Crisis Lockdown Alert Status System, which is a browser-based application for emergency communications.

In the case of a security incident and lockdown, CLASS provides situational awareness to responders so they can gain much-needed situational awareness before entering a facility or location. Administrators or any designated initiator can issue an emergency alert to notify responders of conditions in real time while communicating status via one of five programmable color-coded alert levels. Occupants within the facility can then report status at their specific location, enabling responders to view detailed facility maps on a room-by-room basis. A chat feature enables two-way communications between occupants and first responders to exchange information or instructions.

In addition to the electronic security measures, a Canton police officer is onsite at the shelter daily.

The Refuge of Hope Ministries is a busy place, never closing for holidays or inclement weather. Last year it provided over 75,000 meals and more than 16,000 bedded nights of emergency shelter to homeless men in Stark County. The organization’s new technology helps support safe operation day in and day out.

Two years after the initial build, Refuge of Hope Ministries is adding on a new 7,500-square-foot community center adjacent to the shelter. It will have eight additional doors of access control, which will integrate into the existing Pinnacle head end, O’Neill explains.

KEYWORDS: access control access control as a service (ACaaS) case study door controls facility management lockdown procedures security alert Situational Awareness

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Karen evans
Karen Evans is CEO of Sielox.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Star of Hope Mission security technology case study

    The Star of Hope Mission secures homeless facilities with video surveillance tech

    See More
  • Abloy's mobile access app in Nokia Arena

    Mobile access control secures Finland's Nokia Arena

    See More
  • Victoria Save-on-Foods hockey arena

    Cloud-based access control secures hockey stadium

    See More

Related Products

See More Products
  • 9781138378339.jpg

    Surveillance, Crime and Social Control

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing