SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

Twin city Hardware upgrades its access control systems from Lock and key to Vanderbilts ACT365 solution

Twin city Hardware upgrades its access control systems from Lock and key to Vanderbilts ACT365 solution
Contact company
Contact Vanderbilt Industries
icon Add as a preferred source Download PDF version
Related Links
  • Vanderbilt to preview cloud-based access control and video management solution at ASIS 2017
  • Remote monitoring with Vanderbilt’s SPC Connect and ACT365
  • Vanderbilt’s SPC intrusion detection is a solution worth banking on

Twin City Hardware (TCH) has more than 130 years of experience providing opening and access solutions for commercial, architectural and residential construction projects throughout the United States. It began as an old-time hardware store in 1883, originally known as Twin City Hardware & Heating Co.

In 1954, it was bought by George Boomer, Sr., who transformed the business into an opening and access solutions hardware supplier for many commercial jobs around the Twin Cities, including the State Highway Building and the Minneapolis/St. Paul International Airport. Over the past half-century, TCH has continued along a robust growth path, and is now one of the premier commercial technology and service suppliers in the country.

Security enhancement projects

A once-trusted system, traditional lock-and-key technologies can be less secure than newer door solutions, especially in the instance that a key is lost

TCH, a Vanderbilt integrator partner, works closely with end user organisations on security enhancement projects. It focuses on providing access control solutions for a variety of customers - from small businesses with a handful of doors/readers, to enterprise organisations, including higher education and healthcare campuses.

The company’s New Hope, Minn., location has a large inventory and many staff who work varying shifts throughout the day. The facility was originally secured with mechanical hardware and keys. A once-trusted system, traditional lock-and-key technologies can be less secure than newer door solutions, especially in the instance that a key is lost or access to the facility needs to be restricted. “Key control is always the hardest part of access control,” said Dan Siroin, Integrated Access Systems Manager, TCH.

Strategic acquisition

TCH was unable to know who was entering and exiting the building at any given time, which led to security, building management and privacy concerns. The company decided to evaluate how it could best monitor access to and from the facility. “It's important in the instance of an alarm that we know who is present in the building,” he said. “With mechanical keys and locks, we didn't have critical information.”

TCH was introduced to the Vanderbilt ACT365 cloud-based access control and video management solution when the company introduced it to partners earlier this year. It's a system that added additional value to Vanderbilt's core technology offerings and came with its strategic acquisition of Access Control Technologies (ACT). TCH was interested in how the ACT365 solution could be a strong addition to its product and services suite, and decided to pilot ACT365 at one of its administrative offices.

Focused solution

Cloud-based systems are a unique niche fit for small- to medium-sized customers that have little to no network infrastructure

Working closely with Vanderbilt, TCH deployed a focused solution consisting of two readers and two cameras in the facility to test the product's capabilities. Administrators can provide pin codes, access fobs and cards to employees as credentials to access the facility. These credentials can be easily enabled or disabled remotely if required.

“Cloud-based systems are a unique niche fit for small- to medium-sized customers that have little to no network infrastructure or staff to incorporate a 'use anywhere' access control system,” Siroin said. “We believe that there is a great opportunity to deploy this to our customers, but we wanted to run the solution through our stringent testing process.”

Monitoring access privileges

The scalable ACT365 cloud-based solution is designed to allow users to control and administer access control capabilities from anywhere, at any time and on any device. Each access control unit consists of a single-door IP controller and connects to Web-based software hosted in Microsoft Azure. Users can leverage either a Web-based device or a mobile application to quickly update or remove user permissions, view cameras associated with an access control event or open a door. Overall, it allows for simplistic management of multiple sites and users from a unified, friendly interface, and delivers new levels of situational awareness for users monitoring access privileges.

“The mobile application provides the freedom to conduct most functions wherever you are,” Siroin said. “The system is very easy to use as well. Within a short period of time, I was able to manage access through both the mobile and Web portal with no training or support.”

Break glass activation

ACT365 produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation

The ACT365 solution allows TCH to access a regular audit trail of who is in the building by monitoring card reader activity. ACT365 produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation either locally or remotely, allowing users to be alerted in the event of an incident. This results in more control for security directors to address situations as they occur in real-time instead of retrospectively.

If an incident should arise in the TCH administrative offices, ACT365 links events at doors through video footage so officials can quickly identify and react efficiently and effectively, with all the necessary information.

Ability to monitor situations

In the event of a fire or other emergency, ACT365 automatically unlocks all doors, allowing employees and visitors to reach safety. Muster reporting using the ACT365 platform provides officials with a real-time list of everyone in the building, and if someone is missing, users can check cameras and get in contact with them to ensure they are safe. Live and recorded video can be viewed remotely and footage can be used in evidence.

We also now have the ability to monitor situations as they occur, which means our employees can feel safer

“The ACT365 solution is ideal for the kind of environment where high turnover is prevalent, as it eliminates the need to re-key doors based on employees coming and going regularly,” Siroin said. “We also now have the ability to monitor situations as they occur, which means our employees can feel safer knowing they'll be alerted immediately in the event of an emergency.”

Automatic upgrades to software

Using a cloud-based system allows TCH the simplicity of straightforward access management without the need to engage an internal network person or adding more pieces to an existing network. The cloud benefits businesses like TCH that have limited resources to focus on maintenance of in-house servers and hardware, shifting it to a managed solution that allows automatic upgrades to software.

“ACT365 is a simple and easy-to-use access control and video management system that will meet the needs of the small- to medium-sized business clientele that we serve,” Siroin said.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Remote security
  • Security cameras
  • Door access control
  • Integration software
  • Video Management System
  • Central Monitoring
  • Cloud security
  • Related links
  • ACT Audio, video or keypad entry
  • Related categories
  • Audio, video or keypad entry
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Industrial & Commercial
About this page

"TCH upgrades to Vanderbilts ACT365 solution" is one of 9201 in-depth security application and installation case studies featured in this section. Visit regularly for the latest updates on use cases, installations and deployments of security products from Vanderbilt Industries, TCH.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec