Download PDF version Contact company

Operating a large university campus in a busy urban setting can be challenging enough. When the campus spans dozens of geographically dispersed buildings housing expensive equipment and high-value student work product, the challenge becomes even more complex. Academy of Art University in San Francisco met these challenges with an access control system that simulta­neously delivers the security it needs along with important new capabilities and an improved campus experience. 

Challenges

The Academy of Art University in San Francisco was established in 1929 by Richard S. Stephens, a fine art painter and creative director for Sunset Magazine. Opened in a single rented loft initially to teach advertising art, the university soon assembled a distinguished faculty of practicing art and design professionals with a shared philosophy: hire established professionals to teach future professionals. Today, the university has more than 18,000 students and 30 areas of academic emphasis, making it the country’s largest private school of art and design. At the same time, the university boasts a thriving campus life including clubs, special events, social activities, and its Urban Knights athletic program which competes at the NCAA Division II level.

By the mid-2000s, the Academy of Art University occupied approximately 20 buildings housing classrooms, offices and residential halls that were scattered across the city. Each location had multiple points of access, and was protected only by basic locks and metal keys. The inadequate security of this arrangement became painfully apparent after a daylight break-in and burglary at one of the university residence halls resulted in significant property losses. According to the university’s campus safety director, Mike Petricca, this was unacceptable for a university that prides itself in giving students a safe place to learn where they could nurture their creativity and put countless hours into valuable work portfolios.

To improve security, the university took what previously was a one-man campus safety organization augmented by security guards and replaced it with an organization spanning 130 employees, a 24-hour patrol team, a campus communications center with emergency dispatching service, and round-the-clock safety hosts stationed at most buildings. Additionally, the university embarked on a program to secure every building across its widely dispersed campus. “What has resulted is the nation’s first university to be completely locked down with all access controlled through a single, centralized system,” Petricca said. “Securing all of our doors with an access control system was the single most important thing we had to do to improve our campus security.” 

In addition to increasing campus safety and security, the university also needed its access control system to be easy to expand without forfeiting earlier investments. Meeting the twin needs for both security and scalability would require a move to a system based on an open architecture that could support multiple card technologies and future enhancements. With this platform in place, the university’s cardholders would eventually be able to more than just open doors with their ID cards, including making secure purchases and gaining access to Urban Knights athletic events. 

The university is now issuing approximately 65,000 to 75,000 ID cards each semester using HID Global’s Corporate 1000 programme
The university installed a total of nearly 260 readers at approximately 50 buildings including 17 residential halls

Solutions

The Academy of Art University turned for its solution to Microbiz Security Company, a long-time HID Global partner and leading provider of consolidated security solutions including video surveillance, intrusion and access control products. Microbiz recommended the HID Global iCLASS SE® platform, including the company’s multiCLASS SE™ readers that support both its Indala® low-frequency, entry-level proximity cards for physical access control, as well as HID Global’s iCLASS SE high-security smart card credentials.

The iCLASS SE platform can be used with iCLASS, MIFARE® and DESFire® card technology, as well as iCLASS Seos™ high-security smart card credentials. Both iCLASS SE and iCLASS Seos card technology use HID Global’s Secure Identity Object (SIO) data model, which represents many forms of identity information on any device that has been enabled to work within the secure boundary and central identity-management ecosystem of the company’s Trusted Identity Platform (TIP). TIP and SIOs enable iCLASS Seos credentials to be carried inside Near Field Communications (NFC)-enabled smartphones in a managed access environment. The Academy of Art sees this as an important future capability that will be extremely attractive to students, faculty and staff who rely more and more heavily on smartphones for a variety of daily tasks.

In the first two months after initiating deployment, the university installed approximately 40 multiCLASS readers at 14 buildings. It has since installed a total of nearly 260 readers at approximately 50 buildings including 17 residential halls. Every residential hall and computer lab is now protected, and the university continues to install new readers as it acquires buildings and adds or reconfigures rooms to house valuable equipment and assets.

The university has realized a number of important benefits from its new access control system, including documented reductions in theft even as enrollment has increased, and an improved campus experience

Additionally, the university has completely replaced the previous magnetic stripe (magstripe) cards that had been issued but were never carried or used. The university is now issuing approximately 65,000 to 75,000 ID cards each semester using HID Global’s Corporate 1000 program, which provides a unique 35-bit card format that supports just over 1 million individual card numbers for use with standard HID proximity readers. Approximately 25,000 cards are in use at any given time, and card numbers are tracked in the manufacturing process to ensure they are not duplicated. The university’s access control system automatically turns the cards off at the conclusion of one semester and back on again at the beginning of the next, or permanently disables the student’s identity following their resignation or failure to re-enroll.

With its new access control solution, metal keys are no longer required and the ID cards enable users to open doors much more quickly, which can be very important in an urban environment. Also, the same card that is used to open doors can also be used to enter Urban Knights sporting events, or make purchases using Knight Kash, the university’s debit program for meals and cashless vending. 

The Academy of Art University created its Knight Kash program to be the ultimate complement to the university experience. ID cards are used not just for dining on campus, but also at off-campus merchant partner establishments to provide the greatest possible flexibility, variety and value. The university also uses the cards for a part- and full-time employee payroll system, and is considering using the cards for student attendance systems and other applications in the future, as well as enabling users to carry the ID cards on their smartphones.

Results

The university has realised a number of important benefits from its new access control system, including documented reductions in theft even as enrollment has increased, and an improved campus experience. The system has also significantly improved reporting capabilities, enabling the security team to, for instance, provide valuable input about building usage that resulted in new building access hours and policies.

“We’ve certainly seen a lot of change at our campus, in terms of technologies, policies and procedures, and it was all necessary in order for us to achieve the security we needed along with an enhanced experience for everyone that spends time here,” Petricca said. “With our new access control foundation in place, we can now embrace change and rely on this system infrastructure to support future improvements that will benefit faculty and staff, as well as students and their parents.”

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

Why Visualization Platforms Are Vital For An Effective Security Operation Center (SOC)
Why Visualization Platforms Are Vital For An Effective Security Operation Center (SOC)

Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualize and share the multiple data sources needed in an SOC today. Security Operation Center (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as well as dashboards and web apps for cyber security applications. Today’s advancements in technology and computing power not only have increasingly made security systems much more scalable, by adding hundreds, if not thousands, of more data points to an SOC, but the rate at which the data comes in has significantly increased as well. Accurate monitoring and surveillance This has made monitoring and surveillance much more accurate and effective, but also more challenging for operators, as they can’t realistically monitor the hundreds, even thousands of cameras, dashboards, calls, etc. in a reactive manner. Lacking situational awareness is often one of the primary factors in poor decision making In order for operators in SOC’s to be able to mitigate incidents in a less reactive way and take meaningful action, streamlined actionable data is needed. This is what will ensure operators in SOC truly have situational awareness. Situational awareness is a key foundation of effective decision making. In its simplest form, ‘It is knowing what is going on’. Lacking situational awareness is often one of the primary factors in poor decision making and in accidents attributed to human error. Achieving ‘true’ situational awareness Situational awareness isn’t just what has already happened, but what is likely to happen next and to achieve ‘true’ situational awareness, a combination of actionable data and the ability to deliver that information or data to the right people, at the right time. This is where visualization platforms (known as visual networking platforms) that provide both the situational real estate, as well as support for computer vision and AI, can help SOCs achieve true situational awareness Role of computer vision and AI technologies Proactive situational awareness is when the data coming into the SOC is analyzed in real time and then, brought forward to operators who are decision makers and key stakeholders in near real time for actionable visualization. Computer vision is a field of Artificial Intelligence that trains computers to interpret and understand digital images and videos. It is a way to automate tasks that the human visual system can also carry out, the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. There are numerous potential value adds that computer vision can provide to operation centers of different kinds. Here are some examples: Face Recognition: Face detection algorithms can be applied to filter and identify an individual. Biometric Systems: AI can be applied to biometric descriptions such as fingerprint, iris, and face matching. Surveillance: Computer vision supports IoT cameras used to monitor activities and movements of just about any kind that might be related to security and safety, whether that's on the job safety or physical security. Smart Cities: AI and computer vision can be used to improve mobility through quantitative, objective and automated management of resource use (car parks, roads, public squares, etc.) based on the analysis of CCTV data. Event Recognition: Improve the visualization and the decision-making process of human operators or existing video surveillance solutions, by integrating real-time video data analysis algorithms to understand the content of the filmed scene and to extract the relevant information from it. Monitoring: Responding to specific tasks in terms of continuous monitoring and surveillance in many different application frameworks: improved management of logistics in storage warehouses, counting of people during event gatherings, monitoring of subway stations, coastal areas, etc. Computer Vision applications When considering a Computer Vision application, it’s important to ensure that the rest of the infrastructure in the Operation Center, for example the solution that drives the displays and video walls, will connect and work well with the computer vision application. The best way to do this of course is to use a software-driven approach to displaying information and data, rather than a traditional AV hardware approach, which may present incompatibilities. Software-defined and open technology solutions Software-defined and open technology solutions provide a wider support for any type of application the SOC may need Software-defined and open technology solutions provide a wider support for any type of application the SOC may need, including computer vision. In the modern world, with everything going digital, all security services and applications have become networked, and as such, they belong to IT. AV applications and services have increasingly become an integral part of an organization’s IT infrastructure. Software-defined approach to AV IT teams responsible for data protection are more in favor of a software-defined approach to AV that allow virtualised, open technologies as opposed to traditional hardware-based solutions. Software’s flexibility allows for more efficient refreshment cycles, expansions and upgrades. The rise of AV-over-IP technologies have enabled IT teams in SOC’s to effectively integrate AV solutions into their existing stack, greatly reducing overhead costs, when it comes to technology investments, staff training, maintenance, and even physical infrastructure. AV-over-IP software platforms Moreover, with AV-over-IP, software-defined AV platforms, IT teams can more easily integrate AI and Computer Vision applications within the SOC, and have better control of the data coming in, while achieving true situational awareness. Situational awareness is all about actionable data delivered to the right people, at the right time, in order to address security incidents and challenges. Situational awareness is all about actionable data delivered to the right people Often, the people who need to know about security risks or breaches are not physically present in the operation centers, so having the data and information locked up within the four walls of the SOC does not provide true situational awareness. hyper-scalable visual platforms Instead there is a need to be able to deliver the video stream, the dashboard of the data and information to any screen anywhere, at any time — including desktops, tablets phones — for the right people to see, whether that is an executive in a different office or working from home, or security guards walking the halls or streets. New technologies are continuing to extend the reach and the benefits of security operation centers. However, interoperability plays a key role in bringing together AI, machine learning and computer vision technologies, in order to ensure data is turned into actionable data, which is delivered to the right people to provide ‘true’ situational awareness. Software-defined, AV-over-IP platforms are the perfect medium to facilitate this for any organizations with physical and cyber security needs.

What New Technologies And Trends Will Shape Video Analytics?
What New Technologies And Trends Will Shape Video Analytics?

The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.