Security Solution Saves Money

Security Solution Saves Money

Streamlining operations may help the human condition

An independent, nonprofit research institute dedicated to improving the human condition boasts many accomplishments in the areas of health, energy, workforce development, environmental sciences and social policies. It is also highly involved in research projects that help communities or local governments in foreign countries.

The employees work on highly-sensitive projects that require strict security. The headquarter campus and 11 field offices throughout the United States used two different legacy security systems. The headquarter location system did not have the capacity to meet their growing needs; they were rebooting the system three times per week to keep it running, the holiday scheduling did not operate correctly and keeping cards loaded in the access control panels was a challenge. The other U.S. office locations were using a hosted physical access control system, which lead to exorbitant operational and maintenance fees at these locations.

When it came to upgrading these legacy systems, the global security manager and the systems administrator conducted their own research and discovered AMAG Technology’s Symmetry Access Control system.

The Global Security Operations Center (GSOC), located at the company headquarters, is the point of contact for threats and global travel incidents, and the central hub where all security is managed: access control, video, mass notification, License Plate Recognition (LRP) and Long-Range Vehicle Credential readers. As the research institute acquires new businesses and offices, they convert the existing system to Symmetry, and monitor the new offices within the GSOC.

Super User Status

The institute’s forward-thinking security team researches its own systems and finds creative solutions to solve its security challenges. For example, the system administrator created a button within the system that locks down the campus. Tapping into the card plus PIN mode feature in Symmetry using an HID reader without a keypad, doors would only open for security officers and emergency responders if the system administrator enabled executive card mode on their card holder record.

If there is an active shooter or emergency, they can lock down building by building. With one click they can shut down all of campus and keep a shooter out or try to slow him down.

More than an access control system, the system is used to troubleshoot door hardware when door-forced and door-held open alarms occur. By proactively managing Symmetry, they reduced the number of unnecessary alarms received and streamlined their security processes.

They have reduced the number of alarms coming in to the point where their officers trust the information and alarms they are getting and send patrol officers to any location that might have a door problem or a break in. All alarms mean something and need escalation.

Years ago after some potentially dangerous employees and contractors were terminated, the institute deployed a stand-alone License Plate Recognition (LPR) and Long Range Vehicle Access Credential system to monitor incoming traffic. The LPR cameras capture the license plate images and compare it to what is in the database. An alert sounds and an email sent to designated employees when a person of interest has entered campus. The campus is set up so all vehicles have to drive by two LPRs to get on campus.

The LPR cameras have a greater than 90 percent chance of reading a license plate and the security team receives a notice when someone who should not be on campus has arrived.

The sensitive nature of their work requires strict access control measures to ensure that only authorized employees are allowed in sensitive areas. To achieve tight control, they use two-factor authentication, card plus PIN in critical areas such as data centers.

Looking Ahead

The research institute plans to integrate Symmetry with its video management system and LPR system with long range readers. An integrated system will provide a more complete security management system where everything works together to secure their properties, employees and intellectual property.

As more audit requirements are needed around access control, they will need to track who has been where and their processes surrounding that data. The risk of someone entering an unauthorized area is a great concern. While they have processes in place to manage compliance, they are looking into better ways to manage identities to automate processes and become more efficient. They are also in the planning stages of upgrading their system to SMART cards using OSDP compliant Symmetry Blue Bluetooth readers and Symmetry M4000 Intelligent Controllers.

This article originally appeared in the November/December 2019 issue of Campus Security Today.

About the Author

Kim Rahfaldt is Director of Media Relations at AMAG Technology, Inc., based in Torrance, Calif.

Featured

  • Transformed Yale Peabody Museum Reopens in Stunning Style

    Emerging from a major four-year renovation, the reimagined Yale Peabody Museum of Natural History has reopened its doors to the delight of the citizens of its longtime home in New Haven, Connecticut and the many visitors, students, and researchers who come to explore and learn about its breathtaking collections and fascinating exhibitions. Read Now

  • CISA Releases Anonymous Threat Response Guidance and Toolkit for K-12 Schools

    The Cybersecurity and Infrastructure Security Agency (CISA) recently released the Anonymized Threat Response Guidance: A Toolkit for K-12 Schools, a new resource to help kindergarten through grade 12 (K-12) schools and their law enforcement and community partners create tailored approaches to addressing anonymous threats of violence, including those received on social media. The toolkit outlines steps school leaders can take to assess and respond to anonymous threats, better prepare for and prevent future threats, and work in coordination with law enforcement and other local partners when these threats arise. It is co-sealed with the Federal Bureau of Investigation (FBI), which provided expert feedback on the toolkit’s key principles and strategies. Read Now

  • How Hospitals are Using Modern Technology to Improve Security

    Workplace violence is a serious and growing challenge for many organizations — including those in the healthcare industry. According to the U.S. Bureau of Labor Statistics, workers in healthcare and social services experience the highest rates of injuries caused by workplace violence and are five times as likely to suffer a workplace violence injury than workers overall — and aggressive incidents are rising. Read Now

  • Father of Georgia School Shooting Suspect Charged in Connection With Attack

    Colin Gray, the father of the 14-year-old Georgia school shooting suspect, has also been charged in connection with the attack. The 54-year-old father was charged with four counts of involuntary manslaughter, two counts of second-degree murder and eight counts of cruelty to children. Read Now

Webinars