Dedicated Vs Converged Access Control Networks (Statistics)

Author: Sean Patton, Published on Apr 20, 2018

Running one's access control system on a converged network, with one's computers and phones, can save money. On the other hand, hand, doing so can present a security risk as well as increase troubleshooting challenges.

On the video side, more than 2/3rd of systems use dedicated networks but how about for access control?

In this report, we examine the responses of 150+ Integrators to:

In the past year, what percentange of your access control installs are on a converged vs a dedicated network? Why?

******* ***'* ****** ******* ****** ** * ********* *******, **** one's ********* *** ******, *** **** *****. ** *** ***** hand, ****, ***** ** *** ******* * ******** **** ** well ** ******** *************** **********.

** ******** ****, **** **** */*** ** ******* *** ********* *********** *** ***** *** ****** *******?

** **** ******, ** ******* *** ********* ** ***+ *********** to:

** *** **** ****, **** *********** ** **** ****** ******* installs *** ** * ********* ** * ********* *******? ***?

[***************]

Split *******

* ******* *** ******* ********* ** ********* ******** ********, **** the ********* ***** ** ********* ****** ** ***** *** ** both:

***** *** ******** *** *** ******* *****, ******* *********** ***** it ** ****** **** ********* ****** ******* ** ********* ********.

Driven ** ******** **********

****** ******* ******** ******* **** ***** ********* **** ** ****** systems *** **** **** ****** ** * *******. **** *********** stated **** ******** ** *** ******** **** ******** ******* ********* or *********:

  • "****** **%, ********* **% *** **% ** ********* **** ***** IT ******* *** ******* ***** **** ** ******* ** ******* by ******** ** ******** **********"
  • "******** ***** **%. ** ****** ** **** *** ******** ******* alone ** **** ** **** ********** ******* *** ****** ** it. *** **** ****** **'** **** ** * ********* ******* is ** *** ******** ******* **"
  • "**/** **** ** ******* *** *** ********** ** ** ********* closed-loop ******. **** ** ******* *** ********** ****** *** ******** its ******* ** *** ******** ********."
  • "**/**. ******** *** ****** ******** *******".
  • "**% ********* *** ***** **** *** ** *** *** ****. Usually *** ********** ** *** ********** *** ****"
  • "***** **** *** ****. ** ****** ********* ******** ******** ********, but *** ******* ** *** ** ******** ** *** ******."
  • "***% ********* *** ** ********* ****** ******* ****. *** ****** requirements. "
  • "****** ** *** ******* ***'* **** ** **** **** **** only ** ********* ****/******* *** ******."
  • "****** *********. ** ********* ******* ****** ** *** *********** ********. It ** ****** *** *** ******** ******* ** ** *********"
  • "**/** - ** ******** ** ******"
  • "********* ** ********’* **********, ******** **** *** **** "
  • "**** *********, *** ***** ** *** **** ** ******** *******"
  • "** ******* ** *** ********* *******. ****** ** *** ********* requirements "
  • "**/** ********* ** *** ***** ** *** ** *****"

****** *** ***** **********, ***** ***** *** * ***** *** larger ******* ** ** ********* *** ******* **** *********, ****** control ********* *** *** **** * ******* ****** ****** ****.

Cost ********* *** *********

*** ****** ** ****** ******** ** ******* ****** ************* **** **** *** *** ******* ******* **** ***********. ** this ****** *********** ***** ***** **** ** ***** * ****** when *********** ********* ** ********* ******** *** ****** *******:

  • "**% *** **%. *** ******** *** ********** *** ********* ******** to ******** ***** ********** **** ******* *** *********** *****."
  • "***% ************ **** ****** ********* *******, ** ****** ** ***** to ******** ******** ******* *** *** ****** ******* *****."
  • "**% ** *** ******** *** ** * ********* ******** ***. Only **** ****** ****** ** **** ***** ** ** ******* on ******** ******* **************"
  • "***% *********. ****** ***** ** ******** * ****** *** * couple ** **** ***********"
  • "* ** **** *** ***** ******** **** ** ****** *** idea ** * ********* ******** ******* *** *****'* **** *** sure ***** ******** *** ***** *****. "
  • "**% *********. ** **** ******* *** **** *** **** ** the ******** *** ******* *** **** ** *** ********** ******** will **** **** *** ******** *******."
  • "***** **-**. *** ********* ** ****** ** **** ** ********* the ***** ** *** ******** ******* *** ** ** **** more ****-********* ** *** **** ** ******* ** *****."
  • "**% *********. ***** *** ******* ** **** *** ********* ********, access ******* *** ** ****** ********* ***** ** ***'* ***** the ********* **** *** * ********* *******"
  • "**% ****** *********. *** ** ************** ** *****, *** ** added ** ***** ** ******* ******** *** ** *** ** maintained **** **** ***********. "
  • "***% ********* *** *** ******* ** * ******** **** ** isolate. ** ******* ***** *** ****** ********* ** ******* ** together ***** ****."

Security ******** ***** *********

* **** **** *** ******* ******** ******, ************* ***** *** a ****** ******* *** ***********. ********* ******** **** ***** ** a *** ** *********** ******** *** ****:

  • "****** *** *** ******** *** ** ********* ******* *** ***** security."
  • "***% *********. *** ********* **** **** *** ********* ******** ** segregate *** ***** ******** ******** ******* ** ********* ********. *** feeling ** **** ** ********* ****** **** **** *** *******."
  • "** ***** *** ********* ** *** ********, *** ** *** very ***** ***** *****. ** ******* *** ********* ***** ***** security *** *** ***** ********** **** ******* ********."
  • "** ***** ***** ****** *** ******* ********* ******* ************** *** security *******... ***** *** ********* ****-******* ***** ***** ********* ******** are ***********, ******* ****** ** *******, ***** *********** *** ********* company ******* ****** *********** ** ********* *** ******."
  • "**% ********* ******* *** ******** (**** *** ****** *******). **** customers ******* **** * ********* ******** ******* ***** ** **** secure."
  • "**% *** ** * ********* *******. *** **** ******** ** the *** ** **** ** **** ** ***** ** *** want ** ** ***** *******."
  • "* ********* ******* ** ****** **** *** *** ******* ******** sites **** ******* **** ***********."
  • "**% *********. **'** ****** **** ******* *** ********."
  • "***% ********* *** ******** ********"
  • "*** ********* *******. *** **** ****** *******."

Avoids ****** ******** **** *********

******** ********* *** ********* **** ** *********** *** *****, *** at * **** ***** **** **** *** ***** ********. *********** stated **** ********* ******** **** ***** *** ******* ******:

  • "** ****** ***** *** *** ********* ********. * ***'* **** dealing **** ** *********** ... ** *** ** ***** ****** pointing ** ******** *** ***. ** ** **** * ******* we **** *** *** ******* *** ** *** *****. "
  • "*% *********. **% *********. ****** ******** **** ** **** ** interference ** ***** ******* ** * ********* ******. "
  • "*********. ** ****** **** ** *********** ******* *** *********** *** performance **************. "
  • "** *** ** **** ********** ********-******* ** * ********* ******* to ***** ** ** **** ****** *** ******* *** **** without *** ******** ** ***** ******** ** ********* "
  • "***% ****** ******* ****. **** ** **** ** ** * stand-alone ******, ***** ********** ****** *** ***** *** *** **** from ******* **** ***** **** *******'*. "
  • "***% *** ******* ** ** *** ******* **********"
  • "**% *********. ** ****** ** **** ** * ******** ******* to ***** ********* *** ******** *** *********** *** *******."
  • "* ****** ** * ********* *** **** *******. *** ******* that *** *****'* ** ****** ******** ******* ** *** ***** network."

Comments (5)

* **** ********* ***** *** ** * ****** ******** ** lean ******* ******** ******* ********* **** ** ***** ** ****** control, ******* ****** ******* *** **** ** "**** *************" ** technically ****** ** ************ *******, ** ********* *** ** ****** a ******. *** * ******* ****** ** * ******* ******. I ******* *** ***** ******* ****** *** ***** ***** ** many ***** ******* ******** ***. **** *** ******* ***** **** to ** ***** **** ***** *******.

****, ***** ******* *************** ********* *****'* *** ** **** ** a ******* ** *** ****** ******* ***********, **** ***** ***** (**********: *** ****.,******** ***** ****,***** **** ******* **** ***********). *** ******* ******* *** ***** ***** ***** ********* ** a *******, *** ***** ** **** *** ******* ******** ***** Link, ***** ** *******-***** - ***** *********** ***** ******* *** of ********.

*** ** *** ****** *** ******** *. *********** ******. ******** wants ********, *** *** ** * **** ** ***********. * think ********* ******** *** * ***** ******* ** **** **** access *******. *** **** ** ** **** ** ****** ** easily ******** **** ****** *** ********* *** ******** ****** **** thought **** ***.

******* ******* * ********* ******* *** **** **** ** ** with ********* **** ******** **** **** *********. **** **** *** camera ******, *** ***'* **** **** ************. ** ************ **** be ***********, ** ****** ******** * ******* ** ****.

* ***'* ***** *'** **** **** **** ****** ** * standalone *******. ****** **** ******** ** *** ******* ** *******. Just ****** **** ****** *** ******* * *******. ** ** already *****, **** *** ** *** ****** ** *** ** the **'*, *** **** ***** ******* *** *** ****** *****.

* ***** ****** *** **** * *** ** ****** ********. A *** ****** ****** *** **'* **** ** **** ***'* problem ** **. *** ******* ******* *** ******* *** ****** ports **** ** ***** ********. **** * ***** ******* ***** card ****** *** *** ** ** ******** ********* ****** *******, their ** *** * ******** ** ***** *** ******** **** things ******'* *******. **** * ******* ***** ******, **** ******* to ******. **** *** *** ************** ******* ** *** ******, telnet ** *** ****. ** ** *****, **** ** *** right, ** ** *****'*, **** ** *** *****. * ***** out ** **, ** *** * ******* ** ***** ***.

* ****** ***** ** * ***** ***** **** ** ** wrong, ** ********* ******* *** ***** ****. **** ** ****** would ***** ***** **** *** ********* *****, *** *** ******* always ********* *** *****.

** * *** * ****** *** ********* **** ********....

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

HID Favorability Results 2019 on Feb 21, 2019
HID favorability results were strong, in the 2019 IPVM integrator study of 200+ integrators, with a net +62% and low negativity as the table below...
BluB0x Company Profile on Feb 20, 2019
BluB0x has doubled in revenue every year since its founding in 2013, according to CEO Patrick Barry. We originally reported on them in 2015. At the...
Ubiquiti Favorability Results 2019 on Feb 18, 2019
Ubiquiti has quietly grown into a $1+ billion annual revenue company, with offerings across wireless, wireline network and video surveillance (see...
Uniview / UNV Favorability Results 2019 on Feb 12, 2019
Uniview / UNV, the self-proclaimed #3 China manufacturer, while starting late, has been working to make inroads internationally. In IPVM's 2019...
Nortek Mobile Access Reader BluePass Examined on Feb 12, 2019
Nortek's Linear access control division claims to make mobile credentials "more secure and easier to use than ever before" with their BluePass...
Barnes Buchanan 2019: Despite 'Strange Narrative' Great Time To Be In Security on Feb 11, 2019
A "strange narrative" is being spun, said Michael Barnes at the 2019 Barnes Buchanan Conference. However, despite that narrative, it is a "great...
FLIR Favorability Results 2019 on Feb 08, 2019
FLIR has had a challenging past few years including FLIR Security business struggling, FLIR restructuring their security division and FLIR selling...
Sony Favorability Results 2019 on Feb 06, 2019
Sony Favorability amongst integrators improved moderately compared to their 2017 favorability results, with a modest net positive...
HID Launches Origo To Fix Mobile Credential Problems on Feb 05, 2019
HID is releasing Origo, an overhaul of its mobile credential platform, this time drastically restructuring the way it is priced and packaged. HID's...
Hanwha Techwin Favorability Results 2019 on Jan 31, 2019
Hanwha Techwin's favorability results surged, in IPVM's 2019 study, going from barely neutral in 2016 to strongly net positive, as the results...

Most Recent Industry Reports

Outdoor Camera Mounting Hardware Guide on Feb 21, 2019
Mounting cameras outdoors can be challenging, requiring understanding different types of equipment and methods. In this guide, we teach this...
HID Favorability Results 2019 on Feb 21, 2019
HID favorability results were strong, in the 2019 IPVM integrator study of 200+ integrators, with a net +62% and low negativity as the table below...
First US State, Vermont, Bans Dahua and Hikvision on Feb 21, 2019
The first US state, Vermont, has issued a ban on a number of Chinese and Russian manufacturers including the world's 2 largest video surveillance...
ADI 'SAVE BIG' On FLIR And Hikvision Examined on Feb 20, 2019
One is a major US defense supplier. The other is owned by the Chinese government. But you can "SAVE BIG" on both at ADI. In this note, we...
BluB0x Company Profile on Feb 20, 2019
BluB0x has doubled in revenue every year since its founding in 2013, according to CEO Patrick Barry. We originally reported on them in 2015. At the...
Security Installation Tools Guide - 22 Tools Listed on Feb 19, 2019
In this guide, we cover 22 tools that security installers frequently use. This is one part of our upcoming Video Surveillance...
Sales Cuts At Rasilient on Feb 19, 2019
Over the past 2 years, video surveillance storage specialist Rasilient has expanded its workforce significantly, aiming to build its own branded...
Exacq Raises VMS Software Pricing Twice in Less Than a Year on Feb 18, 2019
Most VMSes regularly release new features, but rarely increase their prices. For the 3rd time in 4 years, and 2nd time in 8 months, since being...
Axis IR Multi Imager Camera Tested (P3717-PLE) on Feb 18, 2019
Axis has released their first IR multi imager, the P3717-PLE, a repositionable model listing 360° IR illumination and flexible positioning,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact