This page contains a Flash digital edition of a book.
IP SECURITY & ACCESS CONTROL


Migrating from a legacy to an open architecture IP system Saving money at the door By Francois Brouillet, Access Control Product Line Manager, Genetec


Access control is the most primary security initiative implemented by building owners and facilities managers. Even before lighting and video surveillance, securing the entries and exits of a building is the vital first step in protecting people and assets within an organisation. Security directors know that one


unlocked door can spell disaster, making their business susceptible to theft, vandalism, espionage, or even random acts of violence. While there are many ways to


Francois Brouillet explains the benefits of advanced IP systems…


secure points of entry, more customers are discovering that the tactics and technologies they implemented years, or even decades ago, are obsolete, and can no longer meet modern access control needs. For instance, locks and keys, which are the most traditional and simplistic forms of access control, are very difficult to manage and replace. When a key goes missing, the entire locking mechanism needs to be swapped out, and new keys re-issued. Older electronic access control


systems once solved this dilemma. But


today, the limitations of serial-connected access control devices and systems are falling short of expectations as well. Not only are the older electronic access control systems limited in terms of functionality, but often they are based on a closed-architecture model. If the product is nearing end of life, no longer supported by the vendor, or does not meet the growing demands of the client, decision makers might feel forced to either bear the brunt of the system’s drawbacks, or dig deep into their pockets to ‘rip-and-replace’ the entire system.


IP access control Fortunately, advancements in IP security technology and the advent of Power over Ethernet (PoE) in recent years are giving these customers other options. By turning to newer networked door control, customers can better manage their physical access points, leverage the existing corporate network and cut wiring costs. With IP access control, replacing


lost key cards becomes a simple matter of deactivating the badge and re- issuing a new one. It represents almost instantaneous protection from that key card ending up in the wrong hands - and there is no hardware replacement necessary. Having devices connected to the


network while being managed from a feature-rich front end also provides security directors with better control over their operations. A few examples include having the ability to remotely unlock and lock doors, locking down zones or the entire building with a single mouse click, and pulling up daily reports to see who has been accessing what areas. Newer network-connected devices


also provide so much more intelligence at the edge. When there is device failure in a serial-connected system, vulnerability ensues. With IP access control, even when there is a server failure, some devices are capable of managing access rules and credentials directly at the door, keeping access to the building secure at all times. While functionality might be a driving


factor, customers are also looking at IP access control as a more cost-effective and better long-term strategy. Yet it is very important to understand that choosing an IP access control system does not necessarily ensure software and hardware interoperability from various vendors. Some IP access control systems are


still engineered as proprietary solutions, meaning the vendor’s hardware and software are only able to communicate with one another. This imposes the same limitations as older serial-based systems. In order to avoid being locked into


a specific access control solution, and implement a truly flexible growth plan, customers should focus their attention on open-architecture IP access control systems and hardware. Choosing open IP access control


Manchester town hall feels the benefit... 34 NETCOMMS europe Volume IV Issue 3 2014


software that supports a variety of different access control vendors and their devices is imperative. This provides customers with the freedom to choose their hardware or easily swap out devices that no longer meet their requirements.


www.netcommseurope.com


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44