How to Take Legacy Access Control to Best-in-Breed Heights
There is no doubt that the landscape for professional security systems continues to change rather rapidly. The proliferation of networked systems has driven demand for new systems that are more highly integrated and scalable with the potential to deliver new levels of performance and functionality to further improve overall situational awareness and security.
These new features have helped set pretty lofty objectives and expectations for new systems, but they are all achievable as best-in-breed technology companies are demonstrating with innovative new solutions. Yet there are a few important considerations one cannot overlook as systems integrators and end users seek out the latest and greatest solutions.
Perhaps the most daunting reality to address is that technology innovations are not always the most accommodating. There are literally tens of thousands of professional video and access control systems installed across the country that still do a respectable job of protecting people, property and assets. Nonetheless, they are sure to have significant drawbacks when compared to the level of security system solutions available today.
As much as security management personnel want to deploy all these new gizmos, the deployment of new hardware and software solutions often requires that old systems are ripped and replaced. Even with signs of widespread economic recovery, that simply is not a viable alternative for most facilities.
Knowing When to Rip ‘N’ Replace or Upgrade
For the purposes of this discussion, let’s focus on access control technology. When a sales team and reseller partners engage with customers interested in upgrading their access control system, the first thing to do is to conduct a thorough site survey to evaluate what they currently have in place. This helps all involved to understand the basic architecture of the existing system and to determine how much of the system’s legacy cabling and equipment can be used with new software.
The process starts by examining the existing access control software to see if it provides the ability to export data so that you don’t need to rebuild all of the programming and enrollment elements from scratch. You also need to chart out the equipment topography to see exactly how the hardware is laid out across the entire system to determine how the system communicates with the control software.
Of course, the easy approach is to rip out everything and install a completely new system. Unfortunately this is also the most expensive approach, and often an unnecessary one at that. A big issue for integrators and end users is that several access control manufacturers have abandoned the ability to accommodate legacy controllers and wiring with their new software. Some of the newer software packages are not even compatible with their own legacy hardware.
Security Is Our Business, Too
For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add sales to your bottom line.
A free subscription to the #1 resource for the residential and commercial security industry will prove to be invaluable. Subscribe today!
Recommended For You
Cloud security can present a paradox: companies love the flexibility and versatility of cloud security management, but are unsure if the cloud itself is secure enough to house their vitally important systems.
From processing power to lens selection to proper positioning, here are 13 tips to help shed light on proper installation of cameras in low-light conditions.