Dedicated Vs Converged Access Control Networks (Statistics)

By: Sean Patton, Published on Apr 20, 2018

Running one's access control system on a converged network, with one's computers and phones, can save money. On the other hand, hand, doing so can present a security risk as well as increase troubleshooting challenges.

On the video side, more than 2/3rd of systems use dedicated networks but how about for access control? 

In this report, we examine the responses of 150+ Integrators to:

In the past year, what percentange of your access control installs are on a converged vs a dedicated network? Why?

******* ***'* ****** ******* system ** * ********* network, **** ***'* ********* and ******, *** **** money. ** *** ***** hand, ****, ***** ** can ******* * ******** risk ** **** ** increase *************** **********.

** ******** ****, **** **** 2/3rd ** ******* *** dedicated *********** *** ***** *** ****** control? 

** **** ******, ** examine *** ********* ** 150+ *********** **:

** *** **** ****, what *********** ** **** access ******* ******** *** on * ********* ** a ********* *******? ***?

[***************]

Split *******

* ******* *** ******* Dedicated ** ********* ******** occurred, **** *** ********* fifth ** ********* ****** an ***** *** ** both:

***** *** ******** *** not ******* *****, ******* integrators ***** ** ** common **** ********* ****** control ** ********* ********.

Driven ** ******** **********

****** ******* ******** ******* much ***** ********* **** IP ****** ******* *** have **** ****** ** a *******. **** *********** stated **** ******** ** the ******** **** ******** between ********* ** *********:

  • "****** **%, ********* **% the **% ** ********* **** their ** ******* *** network ***** **** ** project ** ******* ** security ** ******** **********"
  • "******** ***** **%. ** prefer ** **** *** security ******* ***** ** that ** **** ********** control *** ****** ** it. *** **** ****** we'll **** ** * corporate ******* ** ** the ******** ******* **"
  • "**/** **** ** ******* for *** ********** ** is ********* ******-**** ******. When ** ******* *** industrial ****** *** ******** its ******* ** *** existing ********."
  • "**/**. ******** *** ****** solution *******".
  • "**% ********* *** ***** with *** ** *** own ****. ******* *** preference ** *** ********** end ****"
  • "***** **** *** ****. We ****** ********* ******** security ********, *** *** depends ** *** ** deciders ** *** ******."
  • "***% ********* *** ** dedicated ****** ******* ****. Per ****** ************. "
  • "****** ** *** ******* 500's **** ** **** with **** **** ** dedicated ****/******* *** ******."
  • "****** *********. ** ********* primary ****** ** *** corrections ********. ** ** common *** *** ******** network ** ** *********"
  • "**/** - ** ******** by ******"
  • "********* ** ********’* **********, probably **** *** **** "
  • "**** *********, *** ***** do *** **** ** converge *******"
  • "** ******* ** *** customers *******. ****** ** the ********* ************ "
  • "**/** ********* ** *** specs ** *** ** group"

****** *** ***** **********, ***** ***** was * ***** *** larger ******* ** ** converged *** ******* **** *********, access ******* ********* *** not **** * ******* across ****** ****.

Cost Reduction *** *********

*** ****** ** ****** ******** ** ******* access ************* **** **** *** the ******* ******* **** Integrators. ** **** ****** Integrators ***** ***** **** as ***** * ****** when *********** ********* ** Converged ******** *** ****** control:

  • "**% *** **%. *** installs *** ********** *** converged ******** ** ******** costs ********** **** ******* and *********** *****."
  • "***% ************ **** ****** corporate *******, ** ****** is ***** ** ******** separate ******* *** *** access ******* *****."
  • "**% ** *** ******** sit ** * ********* security ***. **** **** client ****** ** **** money ** ** ******* on ******** ******* **************"
  • "***% *********. ****** ***** to ******** * ****** for * ****** ** Door ***********"
  • "* ** **** *** large ******** **** ** liking *** **** ** a ********* ******** ******* but *****'* **** *** sure ***** ******** *** extra *****. "
  • "**% *********. ** **** explain *** **** *** cons ** *** ******** and ******* *** **** of *** ********** ******** will **** **** *** security *******."
  • "***** **-**. *** ********* of ****** ** **** it ********* *** ***** of *** ******** ******* and ** ** **** more ****-********* ** *** what ** ******* ** place."
  • "**% *********. ***** *** cameras ** **** *** dedicated ********, ****** ******* has ** ****** ********* needs ** ***'* ***** the ********* **** *** a ********* *******"
  • "**% ****** *********. *** IT ************** ** *****, can ** ***** ** under ** ******* ******** and ** *** ** maintained **** **** ***********. "
  • "***% ********* *** *** operate ** * ******** vlan ** *******. ** support ***** *** ****** resources ** ******* ** together ***** ****."

Security ******** ***** *********

* **** **** *** network ******** ******, ************* risks *** * ****** concern *** ***********. ********* networks **** ***** ** a *** ** *********** decrease *** ****:

  • "****** *** *** ******** are ** ********* ******* for ***** ********."
  • "***% *********. *** ********* have **** *** ********* decision ** ********* *** their ******** ******** ******* on ********* ********. *** feeling ** **** ** minimizes ****** **** **** the *******."
  • "** ***** *** ********* on *** ********, *** at *** **** ***** setup *****. ** ******* the ********* ***** ***** security *** *** ***** associated **** ******* ********."
  • "** ***** ***** ****** and ******* ********* ******* infrastructure *** ******** *******... There *** ********* ****-******* cases ***** ********* ******** are ***********, ******* ****** or *******, ***** *********** and ********* ******* ******* assets *********** ** ********* for ******."
  • "**% ********* ******* *** security (**** *** ****** control). **** ********* ******* that * ********* ******** network ***** ** **** secure."
  • "**% *** ** * dedicated *******. *** **** security ** *** *** as **** ** **** IT ***** ** *** want ** ** ***** network."
  • "* ********* ******* ** really **** *** *** highest ******** ***** **** require **** ***********."
  • "**% *********. **'** ****** more ******* *** ********."
  • "***% ********* *** ******** purposes"
  • "*** ********* *******. *** more ****** *******."

Avoids ****** ******** **** *********

******** ********* *** ********* with ** *********** *** noted, *** ** * much ***** **** **** for ***** ********. *********** stated **** ********* ******** made ***** *** ******* easier:

  • "** ****** ***** *** own ********* ********. * don't **** ******* **** IT *********** ... ** get ** ***** ****** pointing ** ******** *** own. ** ** **** a ******* ** **** its *** ******* *** no *** *****. "
  • "*% *********. **% *********. Higher ******** **** ** risk ** ************ ** other ******* ** * dedicated ******. "
  • "*********. ** ****** **** an *********** ******* *** reliability *** *********** **************. "
  • "** *** ** **** everything ********-******* ** * dedicated ******* ** ***** us ** **** ****** and ******* *** **** without *** ******** ** using ******** ** ********* "
  • "***% ****** ******* ****. Like ** **** ** as * *****-***** ******, keeps ********** ****** *** keeps *** *** **** from ******* **** ***** they *******'*. "
  • "***% *** ******* ** we *** ******* **********"
  • "**% *********. ** ****** to **** ** * separate ******* ** ***** conflicts *** ******** *** maintenance *** *******."
  • "* ****** ** * Dedicated *** **** *******. Why ******* **** *** there's ** ****** ******** between ** *** ***** network."

Comments (5)

I feel sometimes there may be a little tendency to lean towards security through obscurity when it comes to access control, meaning access devices are seen as "less sophisticated" or technically robust as surveillance cameras, so therefore not as strong a threat. But a network device is a network device. I believe the newer Mercury boards are linux based as many older devices probably are. Care and caution still need to be taken with these devices.

Yeah, while network vulnerabilities certainly haven't had as high of a profile as the camera systems compromised, they still exist (MicroTrend: HID vuln., Software House vuln, gSOAP vuln effects Axis controllers). You mention Mercury and other Linux based platforms as a concern, but there is also the Genetec Synergis Cloud Link, which is Windows-based - which potentially opens another set of concerns.

Let us not forget the security v. convenience debate.  Everyone wants security, but not at a loss of convenience.  I think converged networks are a prime example of that with access control.  The need to be able to access it easily whenever they desire far outweighs the security desire they thought they had.

Cameras getting a dedicated network has much more to do with bandwidth than security with many customers.  They want the camera access, but don't slow down productivity.  If productivity will be jeopardized, we better dedicate a network to that.

 

I don't think I've ever done card access on a standalone network. Always been attached to the clients IT network. Just always been easier and cheaper I suppose. IT is already there, they set up the server on one of the VM's, and vlan their network for the access panel.

I never really ran into a lot of finger pointing. A few simple checks and it's easy to tell who's problem it is. The biggest problem was getting the proper ports open on their firewall. When I first started doing card access for one of my previous employers larger clients, their IT had a tendency to blame our hardware when things wouldn't connect. Once I learned about telnet, that started to change. Turn off the communications manager on the server, telnet on the port. If it works, then IT was right, if it doesn't, then IT was wrong. 9 times out of 10, it was a problem on their end.

I always found if I could prove them to be wrong, IT generally stopped the blame game. They of course would never admit they did something wrong, but the problem always magically got fixed.

If I had a dollar for everytime that occurred....

Read this IPVM report for free.

This article is part of IPVM's 6,432 reports, 865 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Converged vs Dedicated Networks For Surveillance Tutorial on Feb 12, 2020
Use the existing network or deploy a new one? This is a critical choice in...
Use Access Control Logs To Constrain Coronavirus on Apr 09, 2020
Access control users have included capabilities that are not commonly used...
Help Security End Users Facing Coronavirus Improve Remote Access on Mar 24, 2020
Many end-users and integrators are struggling with the impact of coronavirus...
Remote Network Access for Video Surveillance Guide on Jul 27, 2020
Remotely accessing surveillance systems is key in 2020, with more and more...
Video Surveillance History on May 06, 2020
The video surveillance market has changed significantly since 2000, going...
Cisco Meraki Unlocks IP Cameras With RTSP Tested on Jul 06, 2020
Meraki opened up its cameras to 3rd party NVRs/VMSes by offering RTSP...
Video Surveillance Architecture 101 on Feb 18, 2020
Video surveillance can be designed and deployed in a number of ways. This 101...
Avigilon ACC Cloud Tested on Jul 08, 2020
Avigilon merged Blue and ACC, adding VSaaS features to its on-premise VMS,...
Hazardous & Explosion Proof Access Control Tutorial on Feb 27, 2020
Controlling access to hazardous environments requires equipment meeting...
YOLOv5 Released Amidst Controversy on Jul 27, 2020
YOLO has gained significant attention within video surveillance for its...
Avigilon Open Analytics Tested on Apr 16, 2020
After years of effectively closed analytics, Avigilon decided in late 2018 to...
VSaaS 101 on Mar 25, 2020
Video Surveillance as a Service (VSaaS) is the common industry term for cloud...
FLIR A Series Temperature Screening Cameras Tested on Jun 04, 2020
FLIR is one of the biggest names in thermal and one of the most conservative....
Density Presents Occupancy Monitoring For Coronavirus Protection on May 22, 2020
Density presented its cloud-based occupancy sensor to deal with Coronavirus...
Injes Tiny Temperature Terminal Tested on Jul 17, 2020
While temperature terminals have trended bigger, the Injes DFace801 is...

Recent Reports

SIA Coaches Sellers on NDAA 889B Blacklist Workarounds on Aug 05, 2020
Last month SIA demanded that NDAA 899B "must be delayed". Now that they have...
ADI Returns To Growth, Back To 'Pre-COVID Levels' on Aug 05, 2020
While ADI was hit hard in April, with revenue declining 21%, the company's...
Exposing Fever Tablet Suppliers and 40+ Relabelers on Aug 05, 2020
IPVM has found 40+ USA and EU companies relabeling fever tablets designed,...
Indian Government Restricts PRC Manufacturers From Public Projects on Aug 04, 2020
In a move that mirrors the U.S. government’s ban on Dahua and Hikvision...
Directory of 200 "Fever" Camera Suppliers on Aug 04, 2020
This directory provides a list of "Fever" scanning thermal camera providers...
Face Masks Increase Face Recognition Errors Says NIST on Aug 04, 2020
COVID-19 has led to widespread facemask use, which as IPVM testing has shown...
Dahua Loses Australian Medical Device Approval on Aug 04, 2020
Dahua has cancelled its medical device registration after "discussions" with...
Google Invests in ADT, ADT Stock Soars on Aug 03, 2020
Google has announced a $450 million investment in the Florida-based security...
US Startup Fever Inspect Examined on Aug 03, 2020
Undoubtedly late to fever cameras, this US company, Fever Inspect, led by a...
Motorola Solutions Acquires Pelco on Aug 03, 2020
Motorola Solutions has acquired Pelco, pledging to bring blue back and make...
False: Verkada: "If You Want To Remote View Your Cameras You Need To Punch Holes In Your Firewall" on Jul 31, 2020
Verkada falsely declared to “3,000+ customers”, “300 school districts”, and...
US GSA Explains NDAA 889 Part B Blacklisting on Jul 31, 2020
With the 'Blacklist Clause' going into effect August 13 that bans the US...
Access Control Online Show July 2020 - On-Demand Recording of 45+ Manufacturers Presentations on Jul 30, 2020
The show featured 48 Access Control presentations, all now recorded and...
Face Detection Shootout - Dahua, Hanwha, Hikvision, Uniview, Vivotek on Jul 30, 2020
Face detection analytics are available from a number of manufactures...
Sunell is The First China Manufacturer to Market NDAA Compliance on Jul 30, 2020
Most China manufacturers are going to be impacted by the NDAA 'Blacklist...