Dedicated Vs Converged Access Control Networks Statistics 2020

By Brian Rhodes, Published Sep 10, 2020, 09:25am EDT (Info+)

Access control is a crucial system where the network used can impact life safety. So given the importance, which type of network is more commonly used: dedicated or converged/shared networks?

IPVM Image

In this report, we examine the responses of 150+ Integrators to:

In the past year, what percentange of your access control installs are on a converged vs a dedicated network? Why?

Results *********

**** *********** ******* **** ******* **** converged/shared *** *********/********** ******** *** ****** control, *** *** ****** **** **** depends ** *** ***, **** **% reporting **** '*****' ********:

IPVM Image

***** ******** ****** '*********' ******** ** 38%, ***** *** ************** ** *** **% ********** ** 2018*******. ** ***** *****, ***** ***** 'dedicated' ******** *** ****** ********* *** 20% ** *****.

'*****' ********** **** ****** ******** ** 2018

*********** ******* ********** '*********' **** ******* in ****** *****, **** **** ****** a **** ***** ********** ***** ** customer **********, ********** **** ***** *** customer ** ***** ********** ** ****:

** ******* *** ****** ** ******** IT ****** *** **** *** ** separate ******** **** ******:

Customer ********** ******

*** ****** *******, **** *********** **** that ******** ********** ** *** ******* factor ** ***** ********* ** ********* networks.

***** **** ****** ******* ** * relatively *****-******/*** ********* ***********, *********** *********** to ******/********* ******** ** **** **** of * ******* ******** ** ***** surveillance.

  • "*** *** ********* ****** ******* *******. Client ********** *** ******** *********** ** the ****** ***."
  • "**% ********* *** ** *** ********** needing ** ****** ** *** ***** local *******."
  • "**** *** ** * ********* ******* because *** *****'* ** ********** ***** things **** ***."
  • "********* ** ********* ******* *** ******* request"
  • "****, ** *** ***, ** *** system *********** *** ** * ********* network ******* *** ******** **** *** want *** ***** ******* ** ******** a ******** ******* ** ******* *** security *******."
  • "**% *********, **% ********* ****** **********"
  • "*** ********* - ** ****** ********"
  • "** / ** **** ******** **********"
  • "**%, ** ****** ** ******* ********* where ********. **** ** ********* **** requested ** *** ******"
  • "***% ** *** ******* **** ****** for ********* ****** *******. * ******* the ****** ** ******** *******"
  • "***** *** ****** ** ******* ***** on *** ******* ** *** (**** for * ***** ******) ******** ** the ****** ** ***** ******* ** the *******. ** **** ** ********* do *** **** ** ******** *** resources ** *** ** *** ****** an ********** ****."

********* *** ***: ***** ********, **** of ***************

*** ** *** **** ******** ********* 'pros' *** *********/*****-***** ******** ** *** security ******** *** ********** *************** ****** during *********.

********** *** ****** *******, ******** ***** who/what *** ****** ** *** ******* and *** ** ******* ******** *** fix ******* ******** *** ****** ****** to ******* ***** ********/********* ********:

  • "**% ** * ********* *******. ****** systems **** ** ** ** ***** own ******** ******. ** ******* **** security ******** ****** ** ******** **** the ******** *******/***** ********."
  • "**% ** *** ********* ******* ** they **** ****** ***** ** ********* that **** ******** ***** *** ** network ******** **** ** **** ****** managed *** ****** ****** **** ***** a *********** ****** ***********. (****** *** as ****-*********)"
  • "****** * ****** ******* ***** ** difficult *** ** ** ** ***************."
  • "***** **% ** * ********* *******. We ******** ******* **** ** *** customers ** ** ***** ****** *** risk ** ** ********* ***** *** cause *********** ** **** ******* ***** other ******* *** ** ****** *** risk ** ******* ********* ***** ****** control ****** **** ***** ********* ******* as **** ****** **** ** ***** of *** ** ******/******* ** * network ***** **** **** ***** ******."
  • "*** % *********. ******** *******."
  • "****** ********** ******* **** ********* ********."
  • "**% *********. ******** **** ********."
  • "*** ** **** *** ** * dedicated *******. ** ****** * ****** or ******* ** *** ***-**** *** not ********* ***. ******** ********* ******* and ***** ******* *** **** **** your ****** ******* *********, ** ** turn ***** ***."
  • "**% ** ********* *** ********."
  • "**% ********* ****** ******* ***** *************** easier."
  • "**% (*********). ******** ********** ******* *** to ******** ********."
  • "** ** ********* **** *** ***** are ****** ********* ********"

********* *** ***: ***** ******** ** Departments **** *******

*** *********/****** ********, *********** **** **** their ***-***** ** *********** ******** **** to ****** ***** ******* *** ********* of *** ******** ** ****** ******* networks:

  • "**% *** ** * ****** ********* network, *** ** **** ***** ******* & ***** ** ********** ****-***** & MS *******"
  • "****** *** ** *** ******** *** on ********* ********. ********* **** ***** networks **** *** ********* *** ******** measures ** ***** ** ****** ****** control. * **** **** **** ** departments **** ** ******** *******, ** they ***** ********** ** **********."
  • "**% ********* *** ** *** ********** needing ** ****** ** *** ***** local *******."
  • "** ***** ** *********** *** *** excited ***** ******* ******* ** ******* so ** ******* * ******* *** hand ** *** *** *********** **** the ********* *******. **** *** **** we *** ******* **** ** ** use *** ********* ******* ** ********* access ******* ******* ****** *** ** we ** *** ***** *** ******* we **** ** ********** ****** ******."
  • "**** ********* **** ********* ** **** who **** *** ** ********* ******* traffic ** *** **** ***** ***********, and **** *** *********** **** ****."
  • "**%. ***** ********* *** ********* ********* already **** * *****-******* ******* ******* many ***** ** *** *******. ******** is **** ******* ***** ** *** wall."
  • "** *** ******** * *** ********* that **** ** ** ** * converged ******* *** ** ********** ** taking **** *********."
  • "***% ****** ********* ** *** ******** are ******* ** *** *******."
  • "**%. *** **** ********* **** ** people **** **** **** ********* **** converged ********."
  • "**% *** ** *** **** *******. we ****** **** ***** ******** ***** forward **** ****** **** *** ** maint."
  • "**% ** * ****** *******. **** now, ********* ***'* **** ** *** for * ******** ******** *******, ******* it's ******* **** *** ** *** network ***********, *** *** ** ********** personnel ***** ***** **** *** ******* than ** ***********."

***** **** *** *********

******** **** ***** * ******* *** selling ******, **** *********** **** **** ***** a ********* ******* **** ****** ** using ******** ************** **** ** ******* budgeted *** *** ********* ****** **** buying ***:

  • "**%/**% ***** *** ********** *** ************ factors, **** ****** *** ********* ********."
  • "**** ** *** ************* ** *** want ** ***** *** ***** ******* for * ******** ****** ******* *******. "
  • "**% ********* - ***** *** ****** of ******* ***** ** *** ******* is *** (**** *** * ***** system) ******** ** *** ****** ** other ******* ** *** *******. ** most ** ********* ** *** **** to ******** *** ********* ** *** up *** ****** ** ********** ****."
  • "*** ****** ******* ******* ** ******* use ******** ** ******** ******* ** building * ********* *** ** ***** is ** ***** *****-****. "
  • "****, ** *** ***, ** *** system *********** *** ** * ********* network ******* *** ******** **** *** want *** ***** ******* ** ******** a ******** ******* ** ******* *** security *******."
  • "*:* - **** *** ********* ** not **** *** ********* ********* ** manage *** ******** *******."
  • "**%. ****** **** ********* ********** ********* networks ** ******* ***** ******** ** manage."
  • "***% ** *** ******** *** ** client ******** ** * ******** ****. this ***** ** ****** *** ******* IT *****."
  • "**% ********* ***** ** ******** **** investment"

***** ***** ******

***** ******* ****** ** * ****** network ** ** ****** *** ****, doing ** ***** ***** *********** *** system ** ***** * ****. ******** 'converged' ********* **** ******* ********* ***** become ******** ** ***** ******** ******* in ******* ******** ********:

  • "*** **** *** **** **** ********* networks ** **** ** *** ********* network **** ***** *** ******* *** greater ************ *** ******** ****** ********* mobile ******* **** ******* ********."
  • "** *** *** ********* ***** ****** control ******* ** ********, **** ****."
  • "* ***** *** **% ** ******* are ********* ** ****'* ********. **** of *** ********* *** ***** *** segment *** **** ** ***** ******* mainly *** ** ******** ********."
  • "***% ********* ** ** ** *** VLAN *** *** ******** *******. ****** to ******."
  • "**% ** *** ***** *** ********* have ********* ****** ******* *****. ** are * ******* ********** *** ***** ourselves ** ****** * ****** ******* infrastructure ** ***** *** ******* ****."
  • "********* *** ****** ******* ****** ** on *** *** **** *** *** more ********** **** ****."
  • "***% ** *** ******** *** ** client ******** ** * ******** ****. this ***** ** ****** *** ******* IT *****."
  • "* ***** *** **** ** *** customers **** ****** **** ***** *** us ** *** *** ********* **. So **% * ***** *** *** on ***** ** ********* ********."
  • "** ****** ******* **** ******* * dedicated ** ** * ****** ****, the ******* *** ** *** ********* client ********, *** ** ***** **** to **** * **** **** **** client ******* ** *** ****** ******* VM ."
  • "** ****** *** ********* ** *** security ** * ******** **** *** security"
  • "**** ***** ******** **** ****** ******* but **** ******** ****."
  • "****** ** *** ****** ********* ****** the ** *** *** ** ** a ******** ****."
  • "****** ********* ******* **** * ****** network ** ** ***** **** *** cameras *** ****** *******."
  • "**% ** * ********* *******. ********'* IT *********** *** **** ********* ** physically ***** *** ********. **** ***** believe ** *****."

*** **** ** ******** ********** *** and *************, *** ******** *** ***** ************ ********.

Comments (0)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts reporting, tutorials and software funded by subscriber's payments enabling us to offer the most independent, accurate and in-depth information.
Loading Related Reports