Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Customer Data Gets Card Check

June 5, 2006


InteliTech Systems Integration brought expertise and technology to the new Coast Bank facility.

For many enterprises today, access controls are more critical to protect customer and corporate information as compared to facilities and property. There are logical security answers, of course, to guard customer data. But there also are essential physical security strategies.

One example: Coast Bank of Florida. When it moved the operations center, an important aim was to ensure tighter security controls to protect customers against identity theft and ensure compliance with the federal Gramm-Leach-Bliley Act (GLBA) to prevent the disclosure of clients’ personal information.

Instead of using a cumbersome key-based system, the bank hired InteliTech Systems Integration (ISI) of Largo, Fla., to select an updated solution. ISI chose to install Kantech-branded access control software, proximity card readers and controllers from Tyco Fire & Security of San Diego.

“The products offer enhanced security and are easily scalable. We can handle two doors or thousands of doors without changing the software by simply updating the firmware directly,” said Ron Norton of InteliTech Systems Integration. “(Such) solutions offer our customers powerful technology at a cost-efficient price point. It’s a great value, combining security and building automation,” added Norton.

Security system criteria

Coast Bank provides corporate and personal banking services to individuals and small- to mid-sized businesses throughout the Tampa Bay area. Like all financial institutions, the bank is required to protect the security and confidentiality of customers’ personal information as part of a Congressional mandate known as GLBA. They take this duty very seriously. “We have a responsibility to protect our customers’ information,” said Larry Witt, vice president of IT at Coast Bank. “For example, in our deposit services area, employees could easily have confidential information on their desks, so we need to prevent unauthorized personnel from accessing those areas.”

The bank occupies three floors in a six-story building. Since only employees of the bank would be using the card access system, it was important that the security system be wired separately from the building’s alarm system for the safety of all of the building’s tenants. It also needed an integrator with experience working with fire marshals and elevator vendors to ensure smooth installation in the facility’s elevators.

The access control technology, including proximity card readers, covers the elevators to protect the floors of Coast Bank’s headquarters.

Secure card readers

ISI installed more than 20 Kantech proximity card readers at the entry points of sensitive areas as well as readers at all perimeter doors, including two elevator cabs. The company selected proximity because it finds they are user-friendlier than swipe card systems, which can be inconvenient for users whose cards may eventually become demagnetized.

The cabling installation was not as straightforward as the access control solution. “Multi-floor cabling is always a challenge,” explained Norton. “In addition, because the project occurred after the building was constructed, it was important that we handle the installation with as little disruption to bank employees and tenants as possible.”

ISI took the project one step further, installing the entire access control system through structured cabling within one rack.

They installed the controllers in large cabinets with distributed power supplies and backup equipment for ease of maintenance. The entire system runs on a generator circuit for greater reliability and security. All the equipment is within a small footprint in the IT room. “The installation was a very pleasant experience, “Witt said. “ISI performed the work during office hours with no impact on our employees. We dealt with many vendors in our operations center build-out. ISI was the most accommodating.”

Approximately 60 bank employees and 50 building tenants have been issued proximity cards. The cards are used to gain entry to public doors after hours, and to access secure areas.

The new access control system's gear sits in the bank’s server room and provides better coverage to protect customer data throughout the headquarters facility.

Central access control

Security officials centrally manage all of the door readers using Kantech EntraPass Corporate Edition software and badging solution. In the previous building, the bank would have to change door locks if an employee was terminated and didn’t return their key. Today, if an employee leaves the company or loses his or her badge, the IT staff can instantly deactivate the proximity card to prevent any potential unauthorized access. With software in place, the bank can also conduct advanced monitoring with real-time access to information about the status of each door.

“The software uses an intuitive, common Windows format so there’s little training needed,” Norton said. Witt agreed: “It’s extremely flexible and user-friendly. If there’s an incident reported we can easily see who opened a door and at what time to ensure managers and building tenants know who has accessed the facility after hours.”

“We’re very pleased with the reliability and flexibility of the access control system,” Witt said. “We’re better able to protect confidential information from falling into the wrong hands.” Bank officials are now considering integrating time and attendance tracking into the access software as well. v

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

Phone with message icon

The Post-Breach Narrative: Winning Back Trust After the Headlines Fade

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Hospital Check In -- Guns and Bombs More Frequent, Training Gets More Detailed

    See More
  • SEC0719-Edu-Feat-slide1_900px

    Convenience Store Wawa Hit With Massive Data Breach; Leaked Customer Data Goes Back Eight Months

    See More
  • Hotel

    Chinese City Pilots Facial Recognition for ID Card Check

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing