Banking On Convergence

Integration of physical access control with IT functions begins a major shift at Fifth Third Bank

FIFTH Third Bancorp is a diversified financial services company headquartered in Cincinnati. The company has $104.6 billion in assets and currently operates 19 affiliates with 1,100 full-service banking centers, including 128 Bank Mart® locations open seven days a week inside select grocery stores and 2,000 Jeanie® ATMs in Ohio, Kentucky, Indiana, Michigan, Illinois, Florida, Tennessee, West Virginia and Pennsylvania.

In the past, physical access control systems have typically resided within the security department, segregated from the rest of an organization's IT department. Meanwhile, the IT department has created an entirely different access system for network or logical access.

Today, that is no longer the desired or standard access control environment. Following this physical access control system paradigm shift, communication between the security and IT departments has become more critical than ever. Sharing the same infrastructure between the security and IT departments not only makes fiscal sense, but it makes security sense, as well.


Following this physical access control system paradigm shift, communication between the security and IT departments has become more critical than ever.

"It is our job in physical security to protect the bank," said Mike Neugebauer, manager of safety and security for Fifth Third. "It is IT's job to protect our systems. Our mission has been successful due to the partnership that has formed between our departments. While our roles are different, our objective is the same. By working together, we have been able to accomplish a number of things that simply could not have been done without this partnership."

For instance, Fifth Third Bank has been using GE's Picture Perfect access control and security management system at its headquarters and 42 other locations since the early 1990s. With it, someone can create and support an unlimited number of badge holders and card readers. The system also provides access to features such as database partitioning and occupancy control. Bank officials can delegate facility administration while still maintaining centralized control. Notably, the bank is provided real-time monitoring and audit trails.

Fifth Third Bank also is in the process of integrating the March Networks DVRs and the Picture Perfect system into the GE MASterMind central station package (formerly Monitoring Automation Systems). This will allow employees to monitor and respond to all alarms, whether generated from a standard burglary or fire panel or through the card access system in a single interface. The CCTV integration provides instant access to any associated video information. This integration allows security to quickly e-mail high-quality photos to the proper authorities. This has directly resulted in apprehension in a number of cases.

In addition to being monitored by the central station, the Picture Perfect system is integrated with Fifth Third Bank's e-mail system, so that certain high-security alarms can automatically be sent out to personal computers and to designated cell phones via text messaging. Employees generally receive the alarms within a few seconds of the alarm being tripped. This allows the operators to follow standard dispatch procedures while key individuals are notified automatically.

By centralizing the security operations, security can achieve tighter control and use of personnel at maximum efficiencies, even though facilities are spread throughout nine states.

The system allows security to determine precisely who receives access to designated areas and at what time, and this information can be printed out or e-mailed as a report. As an example, security officials can enter a badge holder's name and determine the time and place that individual entered or exited an area.

What Else Can It Do?

The security management system, along with March Networks' DVRs, have helped solve other problems not directly related to security. For instance, a few complaints were received that there were lines entering a building that had recently opened. The bank was able to create reports showing the number of reader swipes in a given time and pull video clips of the doors at peak times.

This clearly showed that the security portals were working efficiently enough to handle the traffic in and out. The problem was directly related to how employees used the revolving doors. Many employees would stand at the door while looking for their card, or try to enter while carrying bulky items. The bank was then able to educate the end users and eliminate the problem.

How the System Works
For Fifth Third Bank, the security management system not only manages access control, but works in conjunction with CCTV surveillance and fire alarm functions. A redundant server configuration is used, running the Red Hat Linux operating system. The security management system runs on the IT backbone. A hot backup server ensures that if the primary machine goes down, the backup will take over, with no loss of operation. The backup server is located in a separate location in another state.

Ten client workstations are used to run the security management system. Seven are regular workstations designated for system configuration and alarm management. Three workstations are used for creating employee badges, which are presented at card readers to access various areas of the bank. The bank has added several hundred readers since installing its first version of the security management system, and it plans to add more it expands into other states.

The access control and security management system is used in all Fifth Third Bank corporate offices, which are usually located in denser downtown areas. The system controls more than 1,100 doors throughout the bank's nine-state area, some with both inbound and outbound readers.

In order to smoothen the transition to new credentials, the latest installation includes GE's new Transition card readers, which can read most types of access control cards including all popular proximity and smart cards. In fact, the bank is switching from magnetic-stripe to Mifare cards to stay on top of technology. The bank also has biometric readers for high-security areas.

The security management system allows remote management of access control functions, including scheduling what time doors will lock and unlock in other states. The automatic time zone feature is helpful. In the past, officials had to adjust for different time zones manually. Now, they can schedule doors to unlock at 8 a.m., and the system automatically converts to the time zone for that door.

Both CCTV surveillance cameras and fire alarm systems work in conjunction with the Picture Perfect security system. The cameras are always recording, and officials can find out who really used a given door and at what time by going to the camera. The bank can visually identify the people using doors synchronized to the second. If researching an incident, officials can look at a badge activity report and pull the exact time from the March DVR.

New Features Add Flexibility
Fifth Third Bank was the among the first sites to go live with the Picture Perfect 3.0 beta software. With this latest version, officials are now customizing forms for better appearance for the operator and changing the screen so that different tasks are seen in a more efficient way, depending on what the operator is working on.

Using database triggers, the bank can add its own features to customize the system even further. If needed, the triggers can be turned off and on, and will revert to the way that it was before. New scripts don't permanently affect the system and, more importantly, don't affect support agreements with vendors.

When the bank does its badge imaging, capturing photos for IDs, it can now use one security management system for two card access systems. These systems will eventually be integrated so that card management will be handled in Picture Perfect and automatically update the Verex alarm system used for burglary alarm and card access in retail locations.

Bank officials also use the reporting tool often, exporting to Excel or a PDF file. They can now write reports with drop-down boxes, which makes the information easier to find. Reports contain information on everything from who has access to certain areas, to system configuration information.

Automating the regular reports has allowed console operators to focus on more critical tasks rather than the manual tasks of pulling reports. The bank runs approximately 200 automated reports at various intervals, from weekly to monthly or quarterly. Recipients receive the reports as Excel files. In addition to saving operators time, automated reporting ensures that the reports go out on schedule and are never overlooked. This helps the bank maintain a high level of audit compliance.

Security officials also have written scripts that ensure that no employee has duplicate badges and that contractor badges are deactivated after a certain period of inactivity.

Fifth Third Bank's human resources department shares some non-sensitive employee information -- such as name, department and phone numbers -- so personnel changes are automatically imported to the system and terminations automatically deactivate a former employee's badge.

Adding Fire Capabilities

At Fifth Third Bank, officials also can use fire alarm software and fire alarm panels in conjunction with Picture Perfect at many of its facilities. GE's Fireworks software allows officials to quickly look at alarm conditions, find exact locations and produce a history file. It also gives dispositions and a global dispatch. For example, the fire department can be given an exact drawing of where the alarm is. The software reads the EST3 fire alarm panel.

The entire system has been designed to be non-proprietary in that the end user can go to any EST strategic partner. If the user doesn't like the service or otherwise has a problem, he or she can go to another strategic partner.

Already, there has been a return on investment with the extended warranty and the sensitivity of the smoke alarm heads. Companies can recover the cost of the system by not having to manually test smoke alarm heads.

What's more, there was an incident where the motor on an HVAC unit shorted out. The alarm detected it immediately and pinpointed its exact location. The bank quickly determined that it was not a threat to the building, within 10 minutes. When you factor in the cost of emptying out an entire office tower, the cost savings are considerable for a single event.

What It's All About
Without question, physical access control systems on an enterprise level are now described as much in IT terms as they are in access control terms. The openness of these integrated physical security systems lets security officials integrate security solutions with other business application systems, such as personnel and enterprise resource planning.

That's what convergence is all about.

This article originally appeared in the February 2006 issue of Security Products, pgs. 52-56.

Featured

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.