Campus Access Controlled: In Need of an Access Control System, Security at the University of Pittsburgh Sought a Solution That Would Support Existing ID Cards

Article excerpt

WHEN JOSHUA COCHRAN, manager of integrated security for the University of Pittsburgh Police Department, went shopping for an access control and alarm system, he had already laid the groundwork. He had established a computer network and installed electronic key locks on the perimeters of campus buildings. What he needed was access control hardware and software that could be integrated into the existing system.


The University of Pittsburgh, founded in 1787, consists of 68 buildings on 132 acres in southwestern Pennsylvania. More than 11,000 employees and about 25,000 students work and study there.

Though the police department had always been tasked with keeping the peace on campus, Cochran took on access control duties from the operations department several years ago. After the change, he set about replacing old mechanical locks with new electronic keypad locking units and establishing the computer network, independent of the university's network, for security-related systems.

Two years ago, when he was ready to purchase an access control system, he had two requirements. First, the access control system must have a hardware base that was compatible with the Mercury Systems hardware that Cochran was already using for the locking devices. "Part of our research process was to find a software application that could use the hardware that we had already invested in," says Cochran.

Second, the software had to have the ability to interface with the university's existing ID cards, which were also used to store funds for meal plans, to serve as ATM cards, and as a library card.

For advice, Cochran turned to the Pittsburgh Steelers football team, which he knew had recently installed a security system. Both the Steelers and the Pitt Panthers play their home games at Heinz Field in downtown Pittsburgh. Senior management from the Steelers put Cochran in touch with a security consultant. The consultant, in turn, suggested several product manufacturers.

Cochran narrowed it down to two possible vendors. "The biggest variable was their ability to interface with our system," says Cochran. "One company was willing to spend a lot of time with us exploring what our needs were and then rewriting their program to meet those needs."


That company, RS2 Technologies, LLC, of Munster, Indiana, used Mercury hardware for its backbone system, including the card readers so it could interface with the existing mechanical locks. The company then rewrote its Access It Enterprise software, which was designed for campus and multibuilding environments so that it would work with the university's existing ID cards. …