SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Cardiff YMCA Housing Association benefits from Paxton Access solution

Contact company
Contact Paxton Access Limited
icon Add as a preferred source Download PDF version

 Cardiff YMCA Housing Association
The Cardiff YMCA Housing Association 
Cardiff YMCA has installed the Paxton Access Net2 network access control system and this currently covers almost forty doors throughout the building. In addition to the main external doors, the system also covers emergency exits, corridors, management offices and is now being tested on individual rooms. Andrew Jenkins, Cardiff YMCA's General Manager, explains the rationale behind the system: "Our primary motivation is security. We have a large number of people on site and a regular turnover of residents and this means that we need to restrict and monitor access in and out of the building for the benefit of all users, residents and staff."

"Like many organisations our access control installation began on a very small scale, but this has grown steadily as we have come to realise the full potential of the system. All the external entrances and many of the corridor doors are controlled by the system, including the fire exits that we hope are never required. In the event of a fire alarm the fi re doors will automatically unlock to allow speedy evacuation of the building. Ceramic locks on fire doors can get broken quite easily and so access control on these is very convenient".

The Cardiff YMCA Housing Association is a charitable Housing Association and a Registered Social Landlord registered with the Welsh Assembly Government. It directly manages board and lodge hostels in the Roath area of Cardiff providing temporary accommodation for homeless men and women of all ages and backgrounds. The Association also provides support to all residents in their search for permanent accommodation, as well as additional support for a range of other identified needs including employment. Cardiff YMCA HA is an autonomous housing association run by a volunteer board of management and is affiliated to YMCA Wales.

The main hostel of the Cardiff YMCA Housing Association comprises 76 bedrooms, along with management offices and a community centre that includes a theatre and gym. In addition to residents and visitors on site, there are approximately sixty staff employed including cleaners, caterers, twelve support workers (who assess the needs of residents and monitor their progress), 24-hour security and reception staff and a small management team. The hostel is designed to meet the needs of short-term residents who normally stay for a maximum of six months.

"The Net2 software is extremely flexible and gives us the ability to limit an individual's access both within the building -for instance to particular floors - and according to the time of day. This is hugely beneficial when you employ as many shiftbased staff as we do. It is essential, of course, to control access to the management offices where all the finance, staff and residents' records are kept. No-one can access these offices unless accompanied by an authorised user."

One of the challenges for any hostel is key management either, because residents forget to return their keys on leaving or because keys become lost or mislaid. With four or five keys requiring replacement each week the cost is significant both in terms of locksmith charges and management time. In contrast, any Net2 fob may be instantly barred from the system, preventing their use on any of the doors.

 Although not designed as a clocking-in system, Paxton Access Net2's software can create a report that shows, by user, which doors were swiped and when. Andrew Jenkins believes that Net2 should be viewed primarily as a security and management tool, rather than as a cost saving technology

Although not yet entirely convinced about extending Paxton Access Net2 to cover the whole hostel, Andrew Jenkins does recognise the time and cost saving potential of the system for both maintenance and management staff. "This has encouraged Cardiff YMCA to trial access control on individual rooms," says Andrew Jenkins. "It is much easier, quicker and cheaper to enrol and issue a fob than it is to replace a key as it can be undertaken conveniently from a desk and doesn't require the time of a maintenance person to go and get a key cut."

"This has led us to trial the system on fourteen individual rooms on the third floor. This is our incentive floor in the hostel where rooms are allocated as a reward for an individual's progress towards employment. A room on the third floor means the resident has a fridge, an extra meal and a better view from the window. It also means the resident has a ‘front door,' as the corridor on that floor is controlled by the Net2 system. We would never give people a corridor key because of the frequency with which the keys would go astray. But the ease of barring the fobs removes this problem and residents appreciate the status that they represent."

Throughout the day and night security staff are expected to tour the entire building once an hour as part of their duties. Although not designed as a clocking-in system, Net2's software can create a report that shows, by user, which doors were swiped and when. There are two wings on the building and four floors. There is a central staircase which is used for normal access. At the end of each wing on every level there is a fire door which allows access to the fire escape stairwells. The security guards begin their tour on the 4th floor of the building. Using the fire escape stairs, they enter the stairwell by using their fob to unlock the door. At each level, they enter the floor by presenting their fob to the reader on the inside of the door. The relevant floor is checked, and then the guard re-enters the stairwell by presenting his fob to the reader on the egress side of the door. "By requiring security staff to swipe at each fire exit door it is possible to check - by creating a report - that these tour duties are being carried out correctly," explains Andrew Jenkins. "This function is very useful and enormously helpful in establishing staff accountability and encouraging everyone to adopt the same routine."

 The Net2 software is extremely flexible
The Paxton Net2 has time and cost saving potential of the system for both maintenance and management staff
In conclusion, Andrew Jenkins believes that Net2 should be viewed primarily as a security and management tool, rather than as a cost saving technology: "Restricting access according to need eliminates temptation. And although lost fobs are valuable there is an inbuilt security element whenever access is controlled via the system. Compared with a key it is much more difficult to access a building using a lost or stolen fob, as we bar the fobs from the system as soon as we are aware of the loss or theft. For instance, as all the management offices are accessed using a fob it wouldn't be easy for a disgruntled member of staff to return to the building even if they had walked off with some of the hostel's remaining keys. We are extremely pleased with the system and the Security Installation company that installed it were very helpful and knowledgeable."

Future possible enhancements to the system include integrating the hostel's CCTV cameras with the access control system so that it is possible to see who is trying to access a particular building or area. Upgrading the system so that it can be accessed remotely via the Internet is also a possibility. This would prove very valuable should an incident occur when the hostel's senior management were off site. Extending the system to incorporate the ground floor rooms that offer disabled access is also likely.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • IP video surveillance
  • Casino security
  • Public sector security
  • Electronic door locks
  • Electronic access control
  • Video surveillance
  • Related links
  • Paxton Access Access control controllers
  • Paxton Access Audio, video or keypad entry
  • Paxton Access Access control software
  • Paxton Access Access control systems & kits
  • Paxton Access Mechanical digital locks
  • Paxton Access Access control readers
  • Paxton Access Access control cards/ tags/ fobs
  • Related categories
  • Access control controllers
  • Access control systems & kits
  • Audio, video or keypad entry
  • Mechanical digital locks
  • Access control software
  • Access control readers
  • Access control cards/ tags/ fobs
Related white papers
One system, one card

One system, one card

Download
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Modernizing access control

Modernizing access control

Download
Related articles
TDSi by Hirsch: Reinventing UK access control

TDSi by Hirsch: Reinventing UK access control

HiveWatch boosts board with James Segil appointment

HiveWatch boosts board with James Segil appointment

Securitas Technology acquires Sonitrol Ft. Lauderdale

Securitas Technology acquires Sonitrol Ft. Lauderdale

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Case studies
About this page

"Cardiff YMCA Housing Association benefits from Paxton Access solution" is one of 9201 in-depth security application and installation case studies featured in this section. Visit regularly for the latest updates on use cases, installations and deployments of security products from Paxton Access Limited.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec