Case Studies | Keri Systems https://kerisys.com Access Control & Security Specialists Fri, 11 Jul 2025 13:55:17 +0000 en-US hourly 1 https://kerisys.com/wp-content/uploads/2021/01/favicon.png Case Studies | Keri Systems https://kerisys.com 32 32 247116124 Keeping Kids Safe and Supported at Eagle Village https://kerisys.com/case-studies/supporting-eagle-village/ Thu, 10 Jul 2025 11:54:35 +0000 https://kerisys.com/?post_type=case-study&p=31379 Safe and Supported at Eagle Village

For more than five decades, Eagle Village has been a place where young people can grow, learn, and thrive. Nestled on a beautiful 681-acre campus in Michigan, the organization offers a variety of programs designed to support kids and teens as they build brighter futures. With a caring staff and a strong sense of community, Eagle Village is dedicated to making a positive difference for youth from all across the state.

  • Installation Without Disruption
  • 681 Acres & 50 Buildings
  • 70 Card Readers Installed
  • Doors.NET & Authentic Mercury
  • Warm Hospitality and a Shared Mission
  • Seamless Software Integration With Kronus

The Goal

With 50 buildings spread across a large property, Eagle Village needed a reliable, secure, and easy-to-manage access control system. The goal was to enhance safety for everyone on campus while making sure that day-to-day activities for the kids and staff could continue smoothly.

The Solution

Eagle Village partnered with Jimmy Mayer Lock and Repair to install a comprehensive access control system, utilising Mercury MP1502 panels and MR52 interface boards, all neatly housed in Altronix Trove enclosures. The installation included 70 card readers placed throughout the Eagle Village Center to manage entry and keep the campus secure.

105

Jimmy Mayer’s own grandkids even got involved—helping mount the troves and install the boards. It was a fun and meaningful way to bring the next generation into the project!

To manage the system, Eagle Village chose Doors.NET software due to its user-friendly features and seamless integration with their existing Kronus software. This made managing access and tracking users efficient and straightforward.

Training with a Personal Touch

During the installation, Keri Systems Sean Leggott and Jeff McCormick were welcomed with open arms. Eagle Village staff made sure they were comfortable by providing a cozy cabin to stay in and serving up delicious breakfasts and lunches. The experience was more than just a training—it felt like being part of a family.

Sean Leggott shared:
“I’ve never been around a group of people so passionate about helping kids. They made sure everything we did supported the mission and didn’t interrupt the care and attention the kids were receiving. Their commitment to safety and community really stood out.”

The Results

  • 70 Card Readers installed for secure and efficient access
  • Doors.NET Software Deployed
  • Smooth Software Integration with existing systems
  • Hands-On Installation with help from the community
  • Warm Hospitality and a shared mission
  • Enhanced Campus Safety without disruption

Conclusion

At Eagle Village, it’s all about people—staff, kids, and the wider community working together to create a safe and supportive environment. By upgrading their access control system with the help of trusted partners and a little help from the next generation, Eagle Village continues to lead the way in making a positive impact for youth across Michigan.

SocialMedia 2

]]>
31379
Defending our Students – Efficient Response to an Active Shooter https://kerisys.com/case-studies/defending-our-students-efficient-response-to-an-active-shooter/ Fri, 22 Jul 2022 09:43:57 +0000 https://kerisys.com/?post_type=case-study&p=28695 Defending our Students – Efficient Response to an Active Shooter

In the previous article on school security I discussed various forms of perimeter protection.  As a part of that article I referred to the Concentric Rings of Security in NFPA 730.  They are Deter, Detect, Delay and Respond.  This article will detail the most important part of those rings, “Respond”.

Continuing on, let’s examine how you can provide a more secure interior to the building or buildings in question.  First, I should define the building structure. This system for the most part deals with those buildings with central hallways having limited entrances and exits.  I realize that many schools, especially in the south and west, have very open campuses and buildings with doors to the classrooms being exterior doors.  There are no central hallways.  Certain elements of this system, may be employed, however the issues on those campuses are better dealt with by elements described in the article on Perimeter Control.

For purposes of this article I will deal with those structures that have central hallways.  Main entries to the structure should have a true vestibule set up, with a set of exterior doors and a set of interior doors capable of producing a Man Trap.  The areas should be, but are not limited to; the main administrative offices, athletic facilities, auditoriums, and any other site that the public might be directed to.

A part of school security that is seldom mentioned, is the potential for parental interference with a student.  There may be an effort by a non-custodial parent to take their son or daughter; but by court action they have an injunction against them.  While not as widely published, it is an area to be concerned about.  By employing a Visitor Management system, drivers’ licenses can be scanned for any outstanding issues.  If properly set up the visitor is in the vestibule as the license in being scanned.  If there are any issues you can deny access to the interior of the facility.  Visitor management can also be used to track tours of a facility, assuring administrators of the security of the people touring and of others who are not regularly a part of the facility

Video Analytics, are also a part of interior protection.  Not only for background object recognition but also for tracking an incident.  Analytics are a very necessary component of the alert system for an active shooter, which will be discussed later in the article.

A critical and rapidly growing issue throughout the country, is the frequency of card cloning Kiosks that are appearing in malls and convenience stores.  The 125KHz card (standard access control card for most systems) has now become less secure as a result and it is my suggestion that facilities, especially educational institutions begin to migrate to the 13.56MHz cards for the added security in their access control systems.  Any new construction, or installation of an access system should begin with a “Smart Card”, not the standard 125KHz proximity card.

The primary goal of this article is to address the problem that continues to haunt this country and that is an active shooter.  In order to protect the greatest number of students during an attack, I suggest you begin by segmenting or “zoning” the school. The purpose of this action is to limit a shooter from moving throughout a building, thus exposing a greater number of students to their violence.  Segmenting can be done using cross-corridor doors, but is perhaps best accomplished by using Security Grilles.  These grilles will provide a barrier to any attacker who is trying to move from one zone to another.  They should automatically engage on lock-down but can be controlled by responders either remotely by means of the access control system, or on site by proper school personnel, if necessary.  They do not take up corridor space and are difficult to breach.  In creating these zones, particular care should be taken to allow egress from each zone to exterior in the event that an incident begins within that zone.

In evaluating your institutions, I suggest that areas of mass congregation be zones unto themselves.  cafeterias, auditoriums, and athletic facilities should be sectioned off from classroom areas, school offices.  If the structure has multiple wings with classes, then each wing may be considered a zone.

Within these zones, I suggest that classrooms should have access control devices.  To hardwire all the classroom doors can be extremely costly.  However, in this case a WiFi lock can be used.  The function of this lock should be a Storeroom function.  The Storeroom function is defined as a lock that has a fixed exterior lever, which can never be unlocked. The interior lever will always allow egress.  An access card or credential is presented to the reader that is an integral part of the lock and the lock unlocks to allow entry into the room.  A faculty member can then prop the door open so that students can enter the classroom.  In the event that a Lockdown is required, that is accomplished by simply closing the door, no locking by key should be required.  The suggested procedure, once an alert is broadcast, is to close the door, turn off the lights and have the students sit against the wall that is common to the corridor.  If the school is zoned correctly, then this action affords the greatest protection.

For those who are opponents of “shelter in place” and advocate sending people to bunkers, or to exterior, how can you be certain that the students are not heading into a shooter with an automatic weapon?  How do you know what is happening and where it is?  Do you know that an incident is in a static location?  Do you know how many shooters may be involved?  Has someone begun an attack to get students out of the building into the field of fire for automatic weapons?   You don’t know any of the answers to those questions and as such cannot make decisions based on assumptions.

How should we begin to respond to an active shooter or other emergency and how do we put a school in lockdown?  There are various devices that can be used.  Among those are Gunshot Detectors, emergency buttons, and wireless transponders.  To further define the use of and function of the wireless transponder, receivers in each zone will be set for directional areas of coverage that will correspond to the zone as set up.  The receiving unit will pick up the signal from a transponder in the possession of and activated by a faculty or staff member or any other authorized individual within a school and the system will immediately respond.  We know that the potential for a staff member to witness the beginning of an incident may be rare, thus the other devices are necessary.  As the system triggers a lockdown, it should also activate an audio system that will produce an appropriate message throughout the school. A suggested message might be “This school is in lockdown, Zones 1, 2,4 and 5 shelter in place.  This indicates that there is a serious incident in Zone 3.  As to procedures in Zone 3, I will leave that to the various community practices.  They vary widely and I will not presume to establish a protocol that fits all.  By blocking an attackers’ movement throughout the building, and having students shelter in place in those protected zones, you offer the greatest protection.

The activation will immediately trigger the access control system and automated procedures will be put in play to respond to the incident.  In all cases the Situation Manager and Global linkage are critical to the system design.

To date most incidents have been communicated by calling 911.  Regrettably, that is no longer effective in most communities.  A traditional 911 call takes on average 4 minutes.  By the time a person gets to and dials a phone, explains the problem; the Police are notified and the situation is explained, the most damaging part of the incident has already occurred.  For rural communities that do not have a central police or fire department, it may still be necessary.  However, the single most effective means of response to an incident is by a Federated Command and Control Mapping system integrated into the access system.  Once a signal is received by the access system and the lockdown commences, the mapping system will immediately transmit a map of the structure to the local Police Department.  The zone of activation will be highlighted and all cameras within that zone will appear at the Police department.  It is the grouping of and transmission of the cameras that requires the Video Analytics system.   Within seconds, the Police can begin to roll their officers with full “eyes on” the problem.  There will be no excuses about entering the zone of activation, as the attacker will be in full view.  The school will already be in a lock down condition, and audio messages directing students as to how to proceed will have been sent.  As this is happening, the 911 caller is still trying to explain the incident.  For the most part a local Police Department can have officers on scene in less than 2 minutes, — the 911 caller is still talking.  It is technology that is the defining difference between old and new processes and defines the “Response” section of the Concentric Rings of Protection.

The response to the incident is now being controlled by a commander at the PD.  They can direct their officers to a safe entry into the building by unlocking doors through the mapping client.  This image can also be presented at a security office, or main office within the school, so that school officials can also begin to respond to the incident.

Once the officers are ready to attack the perpetrator, another option can be available. That is a dry sprinkler system.  A dry system can be zoned in accordance with the security zoning.  It can be activated through a click of the mouse by the commanding officer.  This will cause a shooter, to “assume a defensive stance” for up to 5 or 6 seconds.  While that is not a lot of time, the police can make full use of that to take the attacker down.  No other response system can give as much information in as short a time as this.

In addition to the notification to the Police other procedures may be employed.  Among those might be “killing all cell communication”.  Why?  There have been incidents where the students through the immediacy of text or email messages can reach out to their parents to tell them what is going on prior to the police being dispatched.  Parents have then sped to the school, blocking first responders from getting there.  Let the first responders do their work.  Additionally, an attacker with accomplices will not be able to transmit information to those accomplices.

While the defense against the active shooter is our primary area of concern and the subject of this article, there exists the potential for other issues in our schools, such as fire, natural gas leaks, and weather emergencies.  The Situation Manager will be programmed for the various actions defined by the emergency.  For example, a natural gas leak will require a different set of first responders than an active shooter.  The system needs to be able to recognize the difference and respond accordingly.  What devices can be used as alert mechanisms to trigger the access system to respond?  Certainly, the traditional fire alarms, flow values, or environmental sensors, can cause the software to respond in accordance with the situation, and the first responders may be Firemen, or EMT’s.  Like the police in an active shooter, they can have full control of the situation.   The messages broadcast through the school will be very different as students will be led away from the emergency.  The fire department then will have notification on the device activation as all of their devices will be identified on the mapping program.  Their actions can be positive and direct in the correction of the problem.

In certain areas of the country you may have weather emergencies such as tornados. Triggers for notification can come from school officials who have reports from various sources. As with the active shooter or fire emergency, audio systems will signal actions to be taken while the access system will unlock areas for safe haven.

A proper mapping program will allow for the customization of and placement of icons that represent all devices being used in the building.  The linking of those icons to inputs and outputs that are a part of the access system, so that by a mouse click on an icon, the desired result is achieved.  A click on a door icon will unlock the door.  A click on a sprinkler icon will activate the sprinkler.  Each of these activations are in addition to the standard use of these devices.  Alarm panel locations, and fire panel locations all can be mapped.   The mapping is not intended to control the components of a fire system, only to give information to the respondents.

A properly designed access control system is at the core of all that can be done to prevent or minimize problems that are plaguing our schools today.  Since the above actions are dependent on a network-based access system, it becomes critical that the system have multiple fiber connections between all structures with dummy feeds to prevent compromise.  Fail safe redundant servers will be used to insure continued communication.  These servers will be located in a controlled and secure location.

In reviewing the various access control systems on the market, I suggest that a proper system will be an Interoperable software product.  A properly designed system will allow multiple manufactures to integrate with it, so as to give the end user options.  As an example, you may be able to choose from 3 different Video Analytic products.  In short it is flexible, scalable and will meet your needs.  It should offer an Active Directory interface so as to link it to other programs for data entry and deletion and most of all must be a network-based product with sufficient security within the software to prevent, or at least deter hackers. Perhaps the greatest benefit of an inter-operable product is the ability to change with advancing technologies.  Fully integrated systems are captive to the components in them and cannot change to keep up with the growth of new technology.

I have encountered people who see access control systems as being restrictive or confining.  They see them as an element of “Big Brother” — wanting to control others.  Consider this as an example of the freedom that access systems can allow you.  Through the proper set up and design of an access system, we can give permissions well beyond those that can be achieved by a mechanical keying system.  We can open up buildings to activities and to people who require access beyond the normal lock/unlock times of a building.  For example, a science professor at a college can have 24/7 access into a building.  They would be allowed through specific sets of doors, into the area where their classroom or lab is so that they have no restrictions on when they choose to work.  You cannot do that with a standard keying system.  One additional note with regard to keying systems, a proper system will consist of patent restricted keys.  Only a few select people will have those keys as they will override an access system.  By using patent restricted keys, you are assured that no key will be duplicated without proper authorization.   One additional benefit of an access system over a keyed campus, is this – if you lose a Master key or worse a Grand Master key, to a campus you will have to re-key an entire campus.  The cost for that is enormous and can run from tens of thousands of dollars to hundreds of thousands depending on the size of the campus.  If someone loses an access card, the rights to that card can be cancelled with a click of a mouse, and security is maintained.

Throughout this article I have talked about schools, however this technology is not restricted to schools only.  It can be used throughout entire communities, town offices, libraries, recreation centers and all other buildings within a community.

It is regrettable that we have to put together programs such as these to defend not only our students but our citizens.  Maybe one day we will be able to feel safe again in our community buildings but until that time comes, we can at least know that there are systems that are available that can minimize damage if not prevent it.

 

]]>
28695
Mystic Aquarium https://kerisys.com/case-studies/mystic-aquarium/ Sun, 13 Dec 2020 22:17:17 +0000 https://kerisys.com/?post_type=case-study&p=4473 Mystic Aquarium
  • Located on the scenic shoreline of Long Island Sound in Mystic, Connecticut
  • Founded in 1973
  • 700,000 annual Visitors
  • Non-profit public facility and research organization
  • Many hand-on exhibits

Site Description

Mystic Aquarium in located on the scenic shoreline of Long Island Sound in Mystic, Connecticut, the location for the popular movie Mystic Pizza starring Julia Roberts. Originally named Mystic Marinelife Aquarium, it was founded in 1973 to serve as a living laboratory and major public exhibit, highlighting some of the most intriguing species in the world. The aquarium is now part of a non-profit organization (Sea Research Foundation) and generates its funds through ticket sales and grants. Their mission is to inspire people to care for and protect our ocean planet through education, research and exploration.

  • 700,000 annual Visitors
  • Founded in 1973
  • Non-profit public facility and research organization
  • Many hands-on exhibits
  • Managed via Keri's Doors.NET

Among the many attractions, the aquarium houses a large number of fish exhibits, a one acre Beluga Whale pool, a Titanic exhibit, a Penguin house, several theaters, and a sea lion show. Over 700,000 annual visitors are drawn to Mystic Aquarium’s charming animals for hands on fun.

The Situation

Because it is a public facility that houses a significant marine life population Mystic Aquarium was in need of more sophisticated control of access than traditional methods. With more than 250 employees, 300 volunteers, 12 interns, and a host of contractors and vendors all working on site, locks and keys were no longer viable.

Aquarium officials wanted to electronically control access to approximately 50 doors in order to eliminate the costs, hassles, and risks associated with mechanical keys. The goal was not only to make it easier to manage employee and volunteer access privileges, but also the vendors and contractors who are granted temporary access rights. Additionally, photo IDs add another layer of security enabling staff to quickly identify individuals as interns, volunteers or contractors.

The Solution

As a part of their process in looking for a solution, aquarium facilities staff did some online research as well as consulting with their locksmith Dave Vessels form AA Lock and Key. Dave had been servicing the facility for some time. As a part of their search for an access control solution, Dave recommended Keri Systems. The Keri Rep introduced them to the Keri product and to an integrator that could handle the project. He brought in Fire Alarm Specialty and Design, a company that Dave had worked with in the past. After reviewing the software for it’s ease of use; it’s price point and the pre-sale support from the Keri Sales Rep, they made the move to Keri.

Because the aquarium has a number of buildings with an established network for running their operations, Keri’s NXT hardware was chosen because it is TCP/IP-ready and was easy to deploy on their network. Clusters of NXT controllers are located around the facility and located in utility closets along with other electronic infrastructure and are connected directly to the aquarium’s Ethernet.

The system took about 4 weeks to install, with very little disruption to the public or workers. FASD worked closely with the aquarium’s IT department to ensure a smooth installation and commissioning of the system. Afterward, staff was trained by Keri’s local sales rep, Bob Stosse of Titus Management Group, and are now self sufficient, though occasionally have system use questions that are answered by FASD or Bob.

The system is managed via Keri’s Doors.NET software by employees from the Facilities Department’s Safety & Security division.

Results

Aquarium Safety and Facilities administrators are very happy with the system performance and the support they have received. The system operates flawlessly, and the staff are pleased at the flexibility it provides. An additional benefit realized is the ease at which contractors and vendors can be issued temporary passes that expire automatically at a predetermined date and time.

According to Tom Thompson, Director of Safety & Security, “We have a special responsibility here at Mystic Aquarium. Not only are our security goals concerned with protecting the physical campus and providing a safe environment for our guests but we house a wonderful collection of marine mammals, penguins and over 350 species of fish, invertebrates and reptiles.

There are special considerations associated with creating a safe home for these animals. Keri systems helped us reach these security goals. Installation was painless, support has been great and the system is dynamic yet manageable.”

]]>
4473
Viking Yacht Company https://kerisys.com/case-studies/viking-yacht-company/ Sun, 13 Dec 2020 22:12:55 +0000 https://kerisys.com/?post_type=case-study&p=4462
  • Over 1200 Employees
  • Manufacturing facilities spans more than 550,000 square feet of floor space
  • One of the largest yacht building companies in the world
  • 23 Door System
  • Site Description

    Bill and Bob Healey, brothers, established the Viking Yacht Company in 1963. With an engineering mission to build the best boat possible that is fast, safe, luxuriously outfitted and with master sea-keeping abilities, Viking Yacht has become one of the largest, if not the largest, yacht building companies in the world. Located in New Gretna, New Jersey, Viking’s manufacturing facilities spans more than 550,000 square feet of floor space. Employment at the plant has swelled to over 1200 employees. Their new service center located in Riviera Beach, Florida employs another 100 people.

    Innovative designs, new marine engineering advances have earned the brothers numerous awards for outstanding contributions to the sport of boating. Having built more than 4000 yachts over the past four decades, Viking Yacht has recently undergone over $10 million worth of plant improvements and machinery upgrades, further enhancing their position as an innovative leader in the boating industry.

    The Situation

    The large New Gretna facility consists of five buildings with a total of 23 perimeter doors. Craftsmen who have the freedom of access to the facility used three of these doors. Using mechanical keys to control the doors proved to be a colossal problem. Allowing dedicated craftsmen freedom of movement meant issuing individuals their own keys to the facility. Key management and maintaining security is a difficult task at best. Every time a key was lost it was necessary to re-key the doors. Re-keying doors is an expensive proposition and does not guarantee security; keys can be copied. There had to be a solution to this problem that would allow the company to provide key employees freedom to access the facility while maintaining a high level of security.

    Controlling the shop overhead doors was another objective the security system had to address. The doors could be opened by anyone and were often left open causing a security and heating problem. The security system installed had to secure the overhead doors and provide a comprehensive record of activity. It was also required that management of the system would have minimal effect on administrative costs.

    The Keri Solution

    It was decided that the installation of card access security system would satisfy Viking Yacht Company’s security and management objectives. The access control system selected was the Keri Systems’ PXL-250 Tiger Controller with proximity card reading technology.

    The readers selected were Keri’s MS series reader with a read range for a credit card shaped card of up to three to 15 inches, depending on the reader style used. Each card is encoded with a unique number that can only be read by the reader and is practically impossible to decipher. When an authorized card is passed within close proximity to the reader, the card’s unique number is read and will cause the door to unlock allowing the card holder access. If the card is lost, or if there is a disgruntled employee problem, the card can be deleted or turned-off by the click of a computer mouse. The lock does not need to be re-keyed.

    The act of using the card causes an access control event. The access control events include granting or denying access to an individual cardholder, automatic unlocking of a door, alarm conditions, door status conditions, etc. The Keri Doors software allows for the collection and storage of events. If a situation warrants investigation, the events can be retrieved and presented in an activity report. The tracking of an individual or the use activity of a door can be reported and examined. Knowing when a door was opened and by whom, has been effective in reducing heating costs and loses due to theft.

    Doors and cards are programmed to operate at specific times. Time schedules are created for unlocking and re-locking doors for normal plant operation and scheduled holidays. Cardholders are assigned an ‘access group’—a time schedule that restricts access to specific doors at specific times of the day. The Doors software can create and handle an extremely large number of access groups. Once programmed, the day to day operations of the system will run automatically, without the need of a computer, minimizing administration costs.

    Because the system uses the proximity card technology, maintenance costs are minimized. There is no contact between the card and reader so usage does not cause wear. The readers have no slots to clean or to be clogged and both the cards and readers are very ruggedly constructed. So much so that the readers and cards are lifetime warranted against damage due to normal usage.

    Results

    The Viking Yacht Company officials are very pleased with the system’s performance. The Doors software screens are very clear and easy to understand. Self-explanatory graphics and descriptive Icons make traveling through the software very straightforward.

    According to Dan Passarelli, facility supervisor, the original installation controlled access through three doors. The system has since grown to include 23 doors. The company recently bought a nearby marina facility and it is the company’s intent to add Keri to the new facility.

    ]]>
    4462
    Scrubbie Pines Campground https://kerisys.com/case-studies/scrubbie_pines_campground/ Thu, 12 Nov 2020 09:48:43 +0000 https://kerisys.com/?post_type=case-study&p=1778 Scrubbie Pines Campground
    • 70 acres
    • 18-hole Miniature Golf Course
    • 107 Campsites
    • Softball Fields
    • 7 Cabins
    • Playground

    Site Description

    Scrubbie Pines Campground (www.scrubbiepines.com) is a 70-acre family camping resort located in the pine forest of southern New Jersey. Opened in 1973, the facility has 107 campsites, 7 cabins, an 18-hole mini golf course, softball fields, hiking and nature trails, store, dump station, laundry, and more. Approximately 1,800 families visit Scrubbie Pines every year during its April-October season, for recreation from day visits to full-season stays. The property is completed fenced in and has five gates. Guests enter and exit through the main gate, one gate is for employees only, and the other three public gates are exit-only gates.

    The Situation

    Before they installed the Keri access control system, “it was party time here,” says Vicki Elley, co-owner with her husband, Robert Elley. “People were bringing in 15 relatives. There were many openings we couldn’t see from our office. It was horrible.” She knew they needed a way to keep out nonpayers and troublemakers.

    Then in 1997, during a tour of other campgrounds sponsored by the New Jersey Campground Owners Association, Vicki Elley noticed that one of the locations was secured with gates requiring access control cards for entry. Rules for entry and day use, including charges for guest access cards, were prominently posted. “I asked the owner about it and she said, ‘It’s going to make you a lot of money’ – so we decided to look into it.”

     

    The Keri Solution

    The Keri system was initially installed at the Scrubbie Pines main gate in 1998. In 2002 the controller was upgraded to the PXL-500, with the MS-3000 MicroStar Proximity Reader. KC-10X Standard Light Proximity Cards are used for guest access at the main gate. DoorsTM software enables the Elleys to manually lock and unlock the gate, add and delete cards as guests enter and leave the campground, create temporary cards, track guest entrances and exits, and keep a database of guest names and license plate numbers.

    Results

    “In just two years we made back our entire investment,” says Vicki Elley. Scrubbie Pines keeps 60 designated proximity cards for day visitors. Along with the day use charge, visitors pay a $10 refundable gate card pass charge, which entitles them to a temporary card. The visitor’s name and license plate number are recorded in the Doors database. When the card is returned, the gate card pass charge is refunded in full. Says Ms. Elley, “I don’t make money on the card, because they want their $10 back. Most people won’t walk away from ten bucks. I make money on the fees letting them in.” And because all gates are locked and the fence is well maintained, “I can go on the computer and know who’s here,” she adds.

    If the visitor leaves without returning the card, after two days the card is unenrolled. For returning guests, the office staff can search the database to learn whether there were any problems.

    Every campground owner knows that keeping children safe is crucial to their operation. The Keri system especially helps to provide a feeling of security and peace of mind for families at Scrubbie Pines. Notes Ms. Elley, “Pedophiles stay away from a campground with gates. Pedophiles can’t get into our campground without having to show their face and car, and they don’t want to do that.”

    The Elleys particularly like how easy the system is to use. “It’s the best thing we ever did in our campground,” says Vicki Elley. “It produces income – and keeps my clients’ kids safe. We love the Keri system!”

     

    Equipment Used

    • 1 PXL-500 Tiger II Controller
    • 1 MS-3000 MicroStar Proximity Reader
    • KC-10X Standard Light Proximity Cards
    • Doors Software
    ]]>
    1778
    Rocky Top Dog Park https://kerisys.com/case-studies/rocky_top_dog_park/ Thu, 12 Nov 2020 09:47:53 +0000 https://kerisys.com/?post_type=case-study&p=1777 Rocky Top Dog Park

    Site Description

    Rocky Top Dog Park is a beautiful exercise yard and playground for dogs. Located in historic Little Rocky Hill area of South Brunswick, New Jersey it was established in 2001, by owner Gretchen Zimmer. The park is a fenced area where dog owners can exercise their dogs off leash. In most communities, strict leash laws prohibit dog owners from releasing their dog to run free. Most dogs, to be healthy, both physically and behaviorally, must have exercise that amounts to more than a walk around the block tethered to a leash. The dog park provides a safe and legal place for dogs to run off leash.

    One look at the park, and it is clear that owner Gretchen Zimmer knows and loves dogs. Ms. Zimmer has trained dogs in pet obedience, competition obedience and the sport of agility. She is a qualified dog-behavioral specialist. During the past thirteen years, Ms Zimmer has fostered numerous homeless dogs.

    The park is divided into three separate fenced areas. The main dog park measures 1.6 acres; the small dog area, intended primarily for dogs less than 45 pounds, measures 6,000 square feet; and the puppy area, for puppies up to six months of age, is 4,000 square feet. Access to each area is through double gated entries – to prevent escapes. The park features a beautiful rustic setting with many shade trees.

    The main park area includes a dog-swimming pond. It measures 25 feet in diameter and its average depth is two feet. The pond is fed fresh water from a well on the property. Both a mechanical and biological filtration system is installed to keep the pond clean

    Use of the park is based on a monthly membership fee. Members adhere to park rules and must qualify their dogs. No aggressive dogs are allowed. Dogs must have proof of good health, properly inoculated against pet diseases and be parasite free. Owners must supervise their dogs at all times and clean up after them. Only member dogs are allowed to enjoy the park.

    The Situation

    The park is divided into three separately fenced and gated areas. The areas are double gated to prevent escapes. Ms. Zimmer personally interviews the members and qualifies the member dogs. There are enforceable park rules. Park membership can be purchased in four separate plans:

    • Rambunctious Rover – access seven days a week
    • Suave Sadie – access on Saturday and Sunday and major holidays
    • Fi-Fi – access Monday through Friday
    • Puppy Park – for puppies up to six months of age

    Ms Zimmer’s goals were:

    • Allow park access to members only
    • Control access to the three areas according to membership status
    • Enforce park rules

    And to accomplish these goals without having an on-site manager.

    The Keri Solution

    Three Keri Systems’ PXL-250 Tiger Controllers equipped with Satellite boards and MS-3000, Microstar readers were selected as the solution that best satisfied Ms. Zimmers’ goals. The Keri Doors software provides all the administrative features to allow Ms Zimmer to control the park from her home without an on-site manager.

    Access in and out of the park areas is controlled using the rugged Microstar reader. The readers are constructed of a high impact polycarbonate material encapsulated in solid epoxy. The readers will withstand extreme weather and temperature variations. Members are issued a proximity key-fob that when presented in close proximity to the reader will send a signal to unlock the gate.

    The fob is encoded with a unique number that cannot be deciphered. There are millions of numerical combinations so there is no fear of duplication. The fob is small, rugged and fits handily on a key chain. It is also warranted for life against defects and failure due to normal usage.

    The Doors software allows programming the key-fob to unlock specific gates at specific times. Therefore, members are granted access to only those areas and at those times defined in their membership agreement. If a member does not abide by the park rules or forfeits membership for any reason, the key-fob can be quickly and easily turned-off or deleted from the system with the click of a computer mouse. If a member upgrades their membership (from “Puppy” to “FiFi”, for example) the change can be made remotely with out having to physically change the fob.

    The entire system is connected to Ms. Zimmer’s home via a telephone modem. Members can be enrolled and deleted from the system at the home computer. All programming details such as time schedules; access authority and membership statuses are recorded in the software. At any time, Ms. Zimmer can track the park activity, add and eliminate members and command the locks of each gate. There is no need for an on-site manager.

    Results

    Ms. Zimmer is very pleased with the system. Administrative costs are minimized and park control is as good if not better than would be if an on-site administrator were employed. Ms. Zimmer’s idea seems to be catching on. Other private dog parks are popping up with the same administrative and control objectives in mind.

    ]]>
    1777
    Liberty Landing Marina https://kerisys.com/case-studies/liberty-landing/ Thu, 12 Nov 2020 09:46:45 +0000 https://kerisys.com/?post_type=case-study&p=1776 Liberty Landing Marina
    • 520 Slip Marina
    • Service & Support Facilities for Members
    • Two Public Restaurants

    Site Description

    The Liberty Landing Marina is a 520-slip marina located in Liberty State Park, Jersey City, New Jersey. A full service marina, the Liberty Landing is accessible to Manhattan, minutes from the Holland Tunnel.

    Established in 1997, the marina location offers a spectacular view of Manhattan, the Statue of Liberty, and Ellis Island. The boat slips are in a naturally protected, deep-water harbor that is a safe haven in storms.

    Although located in a historic state park, the marina has license to operate an exclusive, membership parking area for 600 cars. Other facilities include rest rooms, showers, laundry rooms, dock house, a large service center, fuel dock, and a dry storage that are not open to the public. Open to the public are a five star restaurant, The Liberty House, and the Lighthouse Bar and Grill for more casual dining.

    The Situation

    Because the marina is located within a State Park, certain facilities are open to the public. Maintaining security and exclusive use of marina facilities for members only proved to be sensitive issues, both on the State and marina membership sides. Protection of high value inventories, controlling access to the 520 slips, and maintenance of shower and restroom facilities had to be the prime objectives of a sound security system.

    It was also necessary to comply with State requirements for certain facilities such as marina restaurants and a major portion of the parking lot to be open to the public. How to keep strangers from wandering through the restricted areas of the marina was a major security objective. It was also important for marina administrators to record marina traffic and facility use for accounting purposes.

    The Keri Solution

    Marina security is enhanced by a 24-hour manned service consisting State Park Rangers, Jersey City Police, and a harbor patrol manned by Liberty Landing Marina security. Physical assets are protected with a conventional security system the heart of which is a card access control system. The Keri Systems’ PXL-250 card access was selected as the best choice for this application.

    Entrance to each marina dock, consisting of 14 to 18 slips, is channeled through a small dock house. A locked gate restricts access to the dock and boat slips. The gate is equipped with a Keri MS-3000 proximity access reader. A key tag issued to members, when passed within close proximity to the reader, will allow the member access to the boat slip. There are 17 docks with access control readers installed. The marina parking, laundry house, showers, and restrooms are also key tag required access.

    The MS-3000 reader was chosen for its rugged construction, small size and its total resistance to a saltwater environment. The reader, made of a durable polycarbon material, is practically imperious to vandal damage and will withstand any weather conditions. There are no reader moving parts, no slots to clean or be clogged, and the reader does not require periodic calibration. Because the key tag and reader do not require contact, there is no wear because of usage. Maintenance is required for esthetic purposes only.

    The key tag is also durable. Small in size it fits handily on any key chain. Encoded in the key tag is a unique security code that is impossible to decipher. When the key tag is passed within close proximity to the reader, the code is read and sent to the PXL-250 controller. The controller then makes a decision to allow or deny access to the tagholder. Both the key tag and the reader are warranted for life against damage due to normal usage.

    The controller is mounted within the dock house and is connected to a communication network that connects each controller to the central computer. The communication wires are waterproof and can be as long as 10,000 feet. All decisions to unlock or lock the dock gate are made at the controller. The computer is used only to program and to collect activity data. The design advantage of this communication approach is that if the computer fails, the access system continues to operate as though nothing has happened. In addition, each controller is an independent computer. Failure of one controller has no affect on the operation of other controllers within the network—a tremendous service advantage.

    Keri’s Doors software provides the programming features ideally suited for marina operations. Each marina member is assigned to an access group. An access group assigns the operation of a gate or group of gates to a specific time schedule. The member’s key tag is programmed to operate within a specific access group. The embers will then have access to only those areas and times defined within the access group. If a tag is lost it can be quickly turned off or deleted from the system in a matter of seconds with the click of the computer mouse.

    Each access event, the opening and closing of a gate, the use of the parking lot, the use of the shower and restroom facility, is recorded and stored within the controller. The controller memory will store over 3,600 events. When the controller event memory reaches a preprogrammed level of capacity, the controller will automatically send the event data to the computer. The data are stored in the computer and can be presented in a custom report form for future reference. If a situation occurs that requires investigation, the use of each controlled area can be thoroughly examined by the system administrator.

    Accounting of facility use is also recorded. Funded services such as slip rental payments and parking fees can be monitored and controlled. A disgruntled employee or a member failing to comply with marina regulations or failing to make rental payments can be quickly deleted from the system and a complete activity record is available for future reference.

    Results

    The marina administrators are very happy with the system. There are more than 2,500 members using the access system of 20 controlled gates and doors. Even though the original Keri installation contractor retired and left the marina administrators with service questions, Keri was instrumental in finding another qualified dealer to complete the project. Because Keri does not have facilities to directly install and service access control systems, it is important for Keri to maintain and support good local dealers. Keri maintains close contact with more than 2,000 domestic dealers/contractors.

    ]]>
    1776
    American Backhaulers https://kerisys.com/case-studies/american-back-haulers/ Thu, 12 Nov 2020 09:45:49 +0000 https://kerisys.com/?post_type=case-study&p=1775 American Backhaulers
    • Fortune 500 Company
    • Global provider of transportation services
    • 146 offices in 40 states, Canada, Mexico, Europe, South America, and Asia

    Site Description

    American Backhaulers, located in Chicago, Illinois, was established in 1982. The company developed a very successful business uniting producers and resellers by providing efficient transportation and logistic services.

    In 1999 the C.H.Robinson World Wide, Inc., a fortune 500 company with gross revenues of approximately $3.1 billion, acquired American Backhaulers. The company is a global provider of transportation services with a network of 146 offices in 40 states, Canada, Mexico, Europe, South America and Asia.

    The Situation

    The Chicago branch of C.H. Robinson, formerly American Backhaulers Company, is a busy operation located in a very rough section of Chicago. Safety of employees was the company’s primary motive for purchasing a security system. Access to the building and parking lot had to be secured with a controlled locking system. The system had to make it difficult for anyone other than a C.H. Robinson employee to enter the building and parking lot. The likelihood of vandalism and the effects of Chicago weather required a rugged and weather resistant system.

    The company uses many computers and expensive traffic tracking and control equipment. It was necessary to restrict access to this high-tech equipment and to record use, improving accountability. In addition, the desire was to find a system that required very little time to set-up and manage.

    The Keri Solution

    Keri’s proximity access control system was selected for this application. Seven PXL-250 Tiger Controllers are used to manage twelve interior doors, a rear entry exterior door, and a motorized gate leading to the parking lot. The electronic locks on the interior doors are controlled by twelve MS-5000 MiniStar proximity readers. The MiniStar reader is a thin-line reader, rugged in construction that is approximately the size of a standard single-gang switch plate. The reader is warranted for life against defects in material and workmanship.

    The back door and parking gate are equipped with MS-4000, ShootingStar vandal resistant readers. This reader is housed in a sealed, stainless steal enclosure. The reader aperture is protected with Fiber Tex (UL 752 Listed material) that consists of layers of fiberglass material imbedded with special polymers. The material is specified to withstand the impact of a nine-millimeter bullet fired at point blank range.

    The proximity card used is the Multi-Technology, MT-10XP card. The MT-10X card is an ISO standard card with the size and thickness of a standard credit card, which can have a bar code label attached. The card is read by the proximity reader as well as the bar code reader. In addition, the card is imprinted with employee photo and ID information.

    The ShootingStar reader is mounted using security bolts, or it can be mounted using tapped holes machined into the back surface of the reader. It measures 13.4cm x5.1cm1.9cm and will fit on a standard door mullion. It is warranted for five years against defects in materials and workmanship.

    Keri’s Doors software provides all the programming tools needed to establish the system’s operating parameters. The use of descriptive Icons and comprehensive help menus results in an uncomplicated software package that enables administrators to easily customize the operating program. Custom time schedules can be applied to each door, use privileges can be assigned on an individual basis, and operation of door locks to a specific time schedule can be programmed to operate automatically minimizing administrative costs.

    Once programmed, the computer is not needed to run the system. The intelligence to make decisions is distributed to each door’s Tiger controller. If the computer fails, the system continues to run as though nothing has happened. If a Tiger controller fails, the balance of doors within the system continues to run as programmed. Should a problem occur, down time is minimized because the problem can be quickly and easily resolved. Maintenance costs are kept at an absolute minimum.

    Along with command intelligence, each controller maintains an activity record in a local memory file. Events are stored on a first in, first out basis. When the file is full, the oldest event is over-written, or the controller can be programmed to automatically upload the event data to the computer where the information can be stored on the hard disk. If a situation occurs that warrants investigation, the past event activity of each door can be collected and presented in a custom report. Thus, the system is also a good accountability tool for tracking use of the high value inventory.

    Results

    The access system has been running since 1998 without problems. Company officials are impressed with the system operation and are recommending it to other C. H. Robinson Worldwide branches. The system is easy to understand, and requires very little attention.

    “It works great.”

    – Scott Bidochka, Facilities Manager

    ]]>
    1775
    Public Health Facility https://kerisys.com/case-studies/public-health-facility/ Thu, 12 Nov 2020 09:44:51 +0000 https://kerisys.com/?post_type=case-study&p=1774 Public Health Center

    • Public Facility
    • 5 stories
    • 194,000 square feet

    Site Description

    This public health center is a five story, 194,000 square foot facility housing a 32,000 square foot forensic lab, bio-medical facilities, police evidence storage, a public hospital, and the City Morgue.

    The Situation

    A large public hospital on the East Coast heavily involved with law enforcement will remain anonymous within this article for the purpose of security.

    The hospital houses a criminal evidence storage facility representing a huge security risk. Because of this risk, high-risk countermeasures were considered as necessary in the design of the security system. Key to the security system was the need to control, record and limit activity to sensitive areas to those persons with the proper authority.

    The Keri Solution

    Keri Systems’ access control system was chosen because of its flexibility and expandability. A Keri access control system can consist of up to 256 controlled doors running on one local network. Up to 255 sites of Keri local networks of 256 doors can be controlled by a single software package. One operator can control up to 65,000 doors. The network’s expandability in one- door increments means additions are always easy and inexpensive.

    Proximity readers were chosen to control electric door locks for more than 60 doors. The proximity readers are the most user friendly and by far the most vandal resistant of all reader designs. In hospitals, security readers are often damaged because of impact of gurneys and other heavy equipment. Because of its design, the Keri reader is practically indestructible.

    The Keri MS-7000 Super Star medium range reader was the reader of choice because of its extended read range and because it is an excellent compromise between cost and read range. A standard credit card size proximity card can be read up to 14 inches away from the reader. The cards can be read without having to be removed from pockets or wallets. Hospital workers who may have their hands full with items are offered more convenience and ease of usage than they would experience with typical short read range readers.

    Another important consideration when using this reader in a hospital is sanitary or hygienic conditions. In many areas doors are automatically opened when a door switch is depressed. Because no contact is made between the reader and card, or hand and reader, contamination and the spread of bacteria is minimized when operating automatic doors. It also should be noted that because there is no contact between reader and card wear is not a function of usage. So, the maintenance requirement is extremely low as compared to other reader technologies and mechanical switches.

    The Keri proximity card can be obtained as a photo ID badge as well as the proximity reading card. Therefore, hospital workers need only carry one badge for ID and access security. The employee photo on the card and the historical record of employee activity makes this hospital’s access system a very powerful security package.

    System operational control is maintained from three separate divisions within the facility. Each division handles their own access requirements from PC workstations that are all tied into one common database. Communication with the Keri network can be connected via existing LAN or WAN interface for a cost-effective solution to long range communication. Adding remote sites to the access system with central control maintained at one central administration and recording center is easily accommodated.

    As a requirement within most hospitals, restricting access to specific areas on a per employee or visitor basis is vital. Keri Systems’ ability to combine different time parameters with individual doors provides a very flexible time scheduling feature—the scheduling of times in which a card can be used at a specific door—a must benefit when dealing with three different shifts of employees.

    As this hospital is an evidence and forensics laboratory, an accurate record of employee access activity (audit trail) is critical. The Keri Doors software stores historical events collected from the various door controllers. To ensure that the event data are not lost, the door controllers will automatically send the event information to the central file when the memory of the controller is near capacity. Flexible reporting schemes allow the administrator to choose events based on a number of criteria to quickly find the needed information.

    The Doors software package is one of the few programs that provides a “Route Trace” report allowing the hospital administrator to trace a historical path of an employee—especially useful for tracking individuals entering highly sensitive areas. The software’s attendance reporting provides the hospital a detailed record of all cardholders access activity.

    Results

    The State (where this hospital is located) has set incredibly high security standards for its legal/medical infrastructure. With regard to the access control system, in addition to restricting access to critical areas, access activity and other reports may be called into evidence should an incident occur. The Keri access system has a solid performance record with hospital officials and will be expanded in the future.

    Equipment Used

    • 30 PXL-250 Controllers
    • 30 SB-293 Satellite Boards
    • 60 MS-7000 SuperStar Proximity Readers
    • DoorsTM Access Control System Software with Badging Option
    ]]>
    1774
    Capital Region Medical Center https://kerisys.com/case-studies/capital-region-medical-center/ Thu, 12 Nov 2020 09:44:04 +0000 https://kerisys.com/?post_type=case-study&p=1773 Capital Region Medical Center

    • Three Facililties
    • 100 Licensed Beds
    • Full-service Medical Center
    • 20-bed Skilled Nursing Unit
    • Extensive Clinic System
    • 14-bed Inpatient Rehabilitation Unit

    Site Description

    The Memorial Community Hospital and the Still Regional Medical Center merged in 1994 to become the Capital Region Medical Center. The two medical facilities comprise the largest hospital in Jefferson City, Missouri and surrounding area. As a member of the University of Missouri Health Science Center, the Capital Region Medical Center maintains a 100 licensed bed hospital with a 20-bed Skilled Nursing Unit and a 14-bed Inpatient Rehabilitation Unit. In addition to a full service medical center, Capital Region maintains an extensive clinic system. It is a premier integrated healthcare facility dedicated to providing high quality, cost effective healthcare for the surrounding community.

    The Situation

    The Center officials decided to upgrade the security system in three, high security buildings located in Jefferson City. The buildings had an installed access control system consisting of keypads and cipher locks. It was found that key codes and PIN numbers could not be controlled to ensure security. What was needed was:

    • A system that required specific identification of users gaining access to high security areas
    • The security of all three facilities had to be controlled from one central computer
    • Activity records had to be maintainable
    • The system had to accommodate an existing bar code data record system

    The Keri Solution

    To meet the variety of security requirements, the Keri access control system using PXL-250P and PXL-250W Tiger Controllers was installed in each of the three high security buildings. MS-3000 mullion mount proximity card readers were installed to control access into high security areas. This reader was designed to operate in the most hazardous areas. It is very thin and fits neatly on a standard door mullion. It will typically read a proximity card passed within a few inches of the reader surface. There are no slots to clean or be clogged and no requirement for periodic maintenance or calibration. The MS-3000 is connected to the PXL-250P Tiger Controller.

    Bar code readers are installed on the main employee entrances for time and attendance purposes. The bar code tag is printed to accommodate enrollment into the hospital’s personnel files as well as provide access to low level security areas. The reader is connected to the PXL-250W Tiger Controller.

    The proximity card used is the Multi-Technology, MT-10XP card. The MT-10X card is an ISO standard card with the size and thickness of a standard credit card, which can have a bar code label attached. The card is read by the proximity reader as well as the bar code reader. In addition, the card is imprinted with employee photo and ID information.

    The three buildings are connected via a local are network (LAN). Each building’s access system is connected to the LAN. Administration of the system such as enrolling and deleting users, changing time schedules, collecting activity data, creating use reports, etc., is accomplished at the central office computer.

    The system is driven by Keri’s Doors software. Through use of descriptive icons and comprehensive help screens, programming is ‘user friendly’. Authorized system administrators can create and program time schedules to apply to doors and users. Levels of access privileges can be assigned to individuals on a need basis. Automatic unlocking and locking of doors to a specific time schedule that considers holidays and employee vacations can be implemented without weakening the system security.

    All access activity is recorded and stored. If a security problem occurs, the data can be collected and arranged into a custom report. Activity data includes employee identification, time of the event, door, building, whether or not access was granted or denied and all alarm functions, i.e., doors forced or doors propped open.

    The Doors software also integrates a badging system for creating employee ID badges, driving a dye-sublimation printer for photo printing. The printing is directly to the MT-10XP card making the card a proximity key as well as an employee badge.

    Once programmed, the data is distributed to each door for automatic operation of the system. Each door controller is a mini-computer that is self-reliant. If the PC fails, the system continues to run as though nothing has happened. If a door controller fails, the balance of system operation is not affected. Should a problem occur, corrective action is quickly determined, minimizing operational costs.

    Results

    Hospital officials are satisfied with the system performance and plan future expansion. They are considering upgrades to include integrated CCTV and multi-level alarm management and monitoring from a central security station.

    ]]>
    1773