Security Grows With Mesa

Continued security options are part of the changing needs in higher education

For the past several years, Colorado Mesa University (CMU) has been growing rapidly, and its access control system has continued to grow with it. What began as an effort to standardize and improve the way building security hardware met the changing needs of the campus has led to an integrated system that provides flexibility and grows with the university’s requirements.

Colorado Mesa University, which recently changed its name from Mesa State College, was founded in 1925 as Grand Junction Junior College. Since then, the school has grown to an enrollment of more than 3,000 students, including almost 1,900 students who reside on campus. As is the case with many colleges, CMU installed a variety of access control hardware as buildings were built or renovated.

“When I took over, we had a little bit of everything. I had to consolidate because the campus was growing, and I didn’t have enough space to store spares and parts for everything,” said Preston C. Ellis, a locksmith at the university. “Part of the concern, as at any public institution, was finding products that work together to fulfill the security and operating needs of the institution yet are available from multiple sources to accommodate the competitive bidding process.”

Ellis notes that some products were available through only a single source or at a fixed price, which made it impossible to get comparative bids. After identifying the products that met the university’s current and expected future needs could be obtained through several sources, RFPs were issued, and a supplier was awarded a multi-year contract based on cost and service considerations.

Because Grand Junction is located midway between Denver and Salt Lake City, support plays an important role.

“It’s 250 miles in either direction, and you can’t buy anything here,” Ellis said. “I have to be able to get help over the telephone because, in winter, the pass may be closed, and we may have to do our own troubleshooting and repair.”

From Keys to Cards

Beginning with the key system, CMU has steadily upgraded its security and now is implementing the latest electronic security solutions. Where keys are needed, patent-protected keyways are used to prevent unauthorized duplication.

“I still have two buildings on the original grand master, but we’re moving toward Schlage Everest keyways,” Ellis said. “We use Primus selectively where it overrides the perimeter of a building or in areas that are secured by card readers.”

Because the Primus keys are needed only for overrides, they are kept in a lockbox rather than being carried, to prevent possible loss.

Residence halls have followed the migration from keys to keyless access control. Initially, offline locks were used in most applications. One building uses offline Schlage Campus Locks on pod entrances with SFIC Everest B locks on the four bedroom doors in each pod. The high-security keys prevent unauthorized duplication while the electronic locks on the pods eliminate the need for multiple key levels and frequent rekeying.

As student preference for keyless entry increased, the campus locks were used exclusively on the successive buildings. While access data is computer-managed with these locks, the actual credential resides on the card. This eliminates the need to update each lock whenever there is new data. Audit trails and other data still can be downloaded from the lock via a PDA and transferred to the computer. The offline locks can manage an unlimited number of cards and require no hardwiring.

In its latest residence halls and academic buildings, CMU is moving toward the newest generation of electronic locks. Schlage AD Series locks are designed so they can be changed easily to another configuration if needed by simply replacing a module instead of the entire lock.

The new Bunting Residence Hall, opened in fall 2011, is equipped with more than 500 Schlage AD-250 locks, which perform the same function as the campus locks used in existing buildings. Both have access rights stored on the user’s card.

Perimeter access control for academic buildings outside of normal operating hours generally is provided by card reader. These are mainly hardwired online installations, although a few are wireless. All are controlled by a Schlage security management system, which also is integrated with the university’s one-card system. Ellis says CMU has one of the largest SMS installations in the state, with 15 or 16 panels.

Card access is especially beneficial in the large University Center building, which houses a wide variety of organizations that include student government, the campus radio station, an art gallery and much more. When the building is locked, authorized students have access around the clock with their cards. Ellis says the cards eliminate the costs and time associated with keys that are lost or not turned in when a student leaves.

Currently, CMU is renovating its oldest classroom building, which made it necessary to move its offices to temporary buildings. To secure the temporary offices, Ellis used wireless locks to simplify installation. Once the renovation is complete, he will use the locks on other buildings. One panel interface module (PIM) controls access to four of the temporary buildings.

Wireless access control also is used at the Hamilton Recreation Center and El Pomar Natatorium. Here administrators solved a different problem. When the natatorium was built, conduits were not installed for access control and the amount of concrete made it impossible to add them later. Instead, the Von Duprin WA993 access devices and trim were easy to install without wiring.

Growth continues at CMU, with a new residence hall or academic building springing up every 12 to 18 months. As the campus grows, access control solutions that have the flexibility to meet changing needs will make it easier to maintain security for people and property.

“The people are the most important part, but we have to look at the property as part of the package,” Ellis said. “If we lost a classroom full of computers, it would affect the people who need them.”

This article originally appeared in the May 2012 issue of Security Today.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.