Dedicated Vs Converged Access Control Networks (Statistics)

Author: Sean Patton, Published on Apr 20, 2018

Running one's access control system on a converged network, with one's computers and phones, can save money. On the other hand, hand, doing so can present a security risk as well as increase troubleshooting challenges.

On the video side, more than 2/3rd of systems use dedicated networks but how about for access control?

In this report, we examine the responses of 150+ Integrators to:

In the past year, what percentange of your access control installs are on a converged vs a dedicated network? Why?

******* ***'* ****** ******* ****** ** * ********* *******, **** one's ********* *** ******, *** **** *****. ** *** ***** hand, ****, ***** ** *** ******* * ******** **** ** well ** ******** *************** **********.

** ******** ****, **** **** */*** ** ******* *** ********* *********** *** ***** *** ****** *******?

** **** ******, ** ******* *** ********* ** ***+ *********** to:

** *** **** ****, **** *********** ** **** ****** ******* installs *** ** * ********* ** * ********* *******? ***?

[***************]

Split *******

* ******* *** ******* ********* ** ********* ******** ********, **** the ********* ***** ** ********* ****** ** ***** *** ** both:

***** *** ******** *** *** ******* *****, ******* *********** ***** it ** ****** **** ********* ****** ******* ** ********* ********.

Driven ** ******** **********

****** ******* ******** ******* **** ***** ********* **** ** ****** systems *** **** **** ****** ** * *******. **** *********** stated **** ******** ** *** ******** **** ******** ******* ********* or *********:

  • "****** **%, ********* **% *** **% ** ********* **** ***** IT ******* *** ******* ***** **** ** ******* ** ******* by ******** ** ******** **********"
  • "******** ***** **%. ** ****** ** **** *** ******** ******* alone ** **** ** **** ********** ******* *** ****** ** it. *** **** ****** **'** **** ** * ********* ******* is ** *** ******** ******* **"
  • "**/** **** ** ******* *** *** ********** ** ** ********* closed-loop ******. **** ** ******* *** ********** ****** *** ******** its ******* ** *** ******** ********."
  • "**/**. ******** *** ****** ******** *******".
  • "**% ********* *** ***** **** *** ** *** *** ****. Usually *** ********** ** *** ********** *** ****"
  • "***** **** *** ****. ** ****** ********* ******** ******** ********, but *** ******* ** *** ** ******** ** *** ******."
  • "***% ********* *** ** ********* ****** ******* ****. *** ****** requirements. "
  • "****** ** *** ******* ***'* **** ** **** **** **** only ** ********* ****/******* *** ******."
  • "****** *********. ** ********* ******* ****** ** *** *********** ********. It ** ****** *** *** ******** ******* ** ** *********"
  • "**/** - ** ******** ** ******"
  • "********* ** ********’* **********, ******** **** *** **** "
  • "**** *********, *** ***** ** *** **** ** ******** *******"
  • "** ******* ** *** ********* *******. ****** ** *** ********* requirements "
  • "**/** ********* ** *** ***** ** *** ** *****"

****** *** ***** **********, ***** ***** *** * ***** *** larger ******* ** ** ********* *** ******* **** *********, ****** control ********* *** *** **** * ******* ****** ****** ****.

Cost ********* *** *********

*** ****** ** ****** ******** ** ******* ****** ************* **** **** *** *** ******* ******* **** ***********. ** this ****** *********** ***** ***** **** ** ***** * ****** when *********** ********* ** ********* ******** *** ****** *******:

  • "**% *** **%. *** ******** *** ********** *** ********* ******** to ******** ***** ********** **** ******* *** *********** *****."
  • "***% ************ **** ****** ********* *******, ** ****** ** ***** to ******** ******** ******* *** *** ****** ******* *****."
  • "**% ** *** ******** *** ** * ********* ******** ***. Only **** ****** ****** ** **** ***** ** ** ******* on ******** ******* **************"
  • "***% *********. ****** ***** ** ******** * ****** *** * couple ** **** ***********"
  • "* ** **** *** ***** ******** **** ** ****** *** idea ** * ********* ******** ******* *** *****'* **** *** sure ***** ******** *** ***** *****. "
  • "**% *********. ** **** ******* *** **** *** **** ** the ******** *** ******* *** **** ** *** ********** ******** will **** **** *** ******** *******."
  • "***** **-**. *** ********* ** ****** ** **** ** ********* the ***** ** *** ******** ******* *** ** ** **** more ****-********* ** *** **** ** ******* ** *****."
  • "**% *********. ***** *** ******* ** **** *** ********* ********, access ******* *** ** ****** ********* ***** ** ***'* ***** the ********* **** *** * ********* *******"
  • "**% ****** *********. *** ** ************** ** *****, *** ** added ** ***** ** ******* ******** *** ** *** ** maintained **** **** ***********. "
  • "***% ********* *** *** ******* ** * ******** **** ** isolate. ** ******* ***** *** ****** ********* ** ******* ** together ***** ****."

Security ******** ***** *********

* **** **** *** ******* ******** ******, ************* ***** *** a ****** ******* *** ***********. ********* ******** **** ***** ** a *** ** *********** ******** *** ****:

  • "****** *** *** ******** *** ** ********* ******* *** ***** security."
  • "***% *********. *** ********* **** **** *** ********* ******** ** segregate *** ***** ******** ******** ******* ** ********* ********. *** feeling ** **** ** ********* ****** **** **** *** *******."
  • "** ***** *** ********* ** *** ********, *** ** *** very ***** ***** *****. ** ******* *** ********* ***** ***** security *** *** ***** ********** **** ******* ********."
  • "** ***** ***** ****** *** ******* ********* ******* ************** *** security *******... ***** *** ********* ****-******* ***** ***** ********* ******** are ***********, ******* ****** ** *******, ***** *********** *** ********* company ******* ****** *********** ** ********* *** ******."
  • "**% ********* ******* *** ******** (**** *** ****** *******). **** customers ******* **** * ********* ******** ******* ***** ** **** secure."
  • "**% *** ** * ********* *******. *** **** ******** ** the *** ** **** ** **** ** ***** ** *** want ** ** ***** *******."
  • "* ********* ******* ** ****** **** *** *** ******* ******** sites **** ******* **** ***********."
  • "**% *********. **'** ****** **** ******* *** ********."
  • "***% ********* *** ******** ********"
  • "*** ********* *******. *** **** ****** *******."

Avoids ****** ******** **** *********

******** ********* *** ********* **** ** *********** *** *****, *** at * **** ***** **** **** *** ***** ********. *********** stated **** ********* ******** **** ***** *** ******* ******:

  • "** ****** ***** *** *** ********* ********. * ***'* **** dealing **** ** *********** ... ** *** ** ***** ****** pointing ** ******** *** ***. ** ** **** * ******* we **** *** *** ******* *** ** *** *****. "
  • "*% *********. **% *********. ****** ******** **** ** **** ** interference ** ***** ******* ** * ********* ******. "
  • "*********. ** ****** **** ** *********** ******* *** *********** *** performance **************. "
  • "** *** ** **** ********** ********-******* ** * ********* ******* to ***** ** ** **** ****** *** ******* *** **** without *** ******** ** ***** ******** ** ********* "
  • "***% ****** ******* ****. **** ** **** ** ** * stand-alone ******, ***** ********** ****** *** ***** *** *** **** from ******* **** ***** **** *******'*. "
  • "***% *** ******* ** ** *** ******* **********"
  • "**% *********. ** ****** ** **** ** * ******** ******* to ***** ********* *** ******** *** *********** *** *******."
  • "* ****** ** * ********* *** **** *******. *** ******* that *** *****'* ** ****** ******** ******* ** *** ***** network."

Comments (5)

* **** ********* ***** *** ** * ****** ******** ** lean ******* ******** ******* ********* **** ** ***** ** ****** control, ******* ****** ******* *** **** ** "**** *************" ** technically ****** ** ************ *******, ** ********* *** ** ****** a ******. *** * ******* ****** ** * ******* ******. I ******* *** ***** ******* ****** *** ***** ***** ** many ***** ******* ******** ***. **** *** ******* ***** **** to ** ***** **** ***** *******.

****, ***** ******* *************** ********* *****'* *** ** **** ** a ******* ** *** ****** ******* ***********, **** ***** ***** (**********: *** ****.,******** ***** ****,***** **** ******* **** ***********). *** ******* ******* *** ***** ***** ***** ********* ** a *******, *** ***** ** **** *** ******* ******** ***** Link, ***** ** *******-***** - ***** *********** ***** ******* *** of ********.

*** ** *** ****** *** ******** *. *********** ******. ******** wants ********, *** *** ** * **** ** ***********. * think ********* ******** *** * ***** ******* ** **** **** access *******. *** **** ** ** **** ** ****** ** easily ******** **** ****** *** ********* *** ******** ****** **** thought **** ***.

******* ******* * ********* ******* *** **** **** ** ** with ********* **** ******** **** **** *********. **** **** *** camera ******, *** ***'* **** **** ************. ** ************ **** be ***********, ** ****** ******** * ******* ** ****.

* ***'* ***** *'** **** **** **** ****** ** * standalone *******. ****** **** ******** ** *** ******* ** *******. Just ****** **** ****** *** ******* * *******. ** ** already *****, **** *** ** *** ****** ** *** ** the **'*, *** **** ***** ******* *** *** ****** *****.

* ***** ****** *** **** * *** ** ****** ********. A *** ****** ****** *** **'* **** ** **** ***'* problem ** **. *** ******* ******* *** ******* *** ****** ports **** ** ***** ********. **** * ***** ******* ***** card ****** *** *** ** ** ******** ********* ****** *******, their ** *** * ******** ** ***** *** ******** **** things ******'* *******. **** * ******* ***** ******, **** ******* to ******. **** *** *** ************** ******* ** *** ******, telnet ** *** ****. ** ** *****, **** ** *** right, ** ** *****'*, **** ** *** *****. * ***** out ** **, ** *** * ******* ** ***** ***.

* ****** ***** ** * ***** ***** **** ** ** wrong, ** ********* ******* *** ***** ****. **** ** ****** would ***** ***** **** *** ********* *****, *** *** ******* always ********* *** *****.

** * *** * ****** *** ********* **** ********....

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Ambitious Mobile Access Startup: Openpath on May 24, 2018
This team sold their last startup for hundreds of millions of dollars, now they have started Openpath to become a rare access control small...
Exacq Improving Technical Support, Responding To Integrator Complaints on May 21, 2018
Exacq had been a long-term favorite of integrators, but since their 2014 Tyco acquisition, Exacq has fallen in IPVM integrator studies (though...
Best Manufacturer Technical Support 2018 on May 21, 2018
While 5 manufacturers made the worst technical support 2018 list, only 3 stood out as providing the best technical support to 190+ integrators in...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
Worst Manufacturer Technical Support 2018 on May 16, 2018
5 manufacturers stood out as providing the worst technical support to 190+ integrators in new IPVM results. These integrators answered: In the...
Top Benefits Of Attending Trade Shows (Statistics) on May 15, 2018
150 integrators told IPVM: What are the top benefits of going to trade shows? The clear top 2 responses in order: (1) Networking (2) New...
Access Visitor Management Systems Guide on May 11, 2018
"Who are you, and why are you here?" Facilities that implement Visitor Management Systems hope they never need to ask that question to anyone,...
S2 Access Control / 'Unified Security Management' Profile on May 08, 2018
In our 13th access control company profile, we examine S2 Security's Netbox platform: Unified Security Management Platform positioning Core...
Integrator Technician Field Software Usage (Statistics) on May 07, 2018
Maintaining accurate notes and documentation from field technicans is a difficult and important task for a security integrator operation. Keeping...

Most Recent Industry Reports

VMS Server Sizing on May 25, 2018
Specifying the right sized PC/server for VMS software is one of the most important yet difficult decisions in IP video surveillance. In the past...
China: Foreign Video Surveillance Is Security Risk on May 25, 2018
The Chinese government has long acknowledged that foreign video surveillance is a 'risk to national security' and has increasingly and almost...
US House Passes Bill Banning Gov Use of Dahua and Hikvision on May 24, 2018
Today, the US House of Representatives passed H.R. 5515, a bill that includes a ban on the US government's use of Dahua and Hikvision. This follows...
Hanwha Wisenet X Analytics and VMD Test on May 24, 2018
Continuing our updated testing of camera analytics, we tested Hanwha's Wisenet X analytics for over two weeks in multiple scenes, indoors and out,...
Ambitious Mobile Access Startup: Openpath on May 24, 2018
This team sold their last startup for hundreds of millions of dollars, now they have started Openpath to become a rare access control small...
Amazon's "Dangerous New Face Recognition Technology" Says ACLU on May 23, 2018
The ACLU has caused a stir, with a new report Amazon Teams Up With Law Enforcement to Deploy Dangerous New Face Recognition Technology,...
Software Only VMS vs NVR Appliances on May 23, 2018
Should you buy your own PC/server and load VMS software on it or get a turnkey appliance (both hardware and software, e.g., NVR, Hybrid DVR) from a...
Buy Arecont: Top Bid $10 Million Cash on May 22, 2018
Last year, Arecont had a deal for a purchase price of $170 million (see Failed Arecont China Acquisition). This year, Arecont has a deal for a...
Installing Box Cameras Indoors Tutorial on May 22, 2018
This tutorial starts our physical installation for video surveillance series, starting with Box Cameras, one of the oldest and most basic types....
The Hikvision Smart Classroom Behavior Management System on May 22, 2018
Hikvision's rapidly growing offering of analytics, which we most recently examined with Hikvision's ethnic minority analytics, is now going into...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact