Dedicated Vs Converged Access Control Networks (Statistics)

By Sean Patton, Published on Apr 20, 2018

Running one's access control system on a converged network, with one's computers and phones, can save money. On the other hand, hand, doing so can present a security risk as well as increase troubleshooting challenges.

On the video side, more than 2/3rd of systems use dedicated networks but how about for access control?

In this report, we examine the responses of 150+ Integrators to:

In the past year, what percentange of your access control installs are on a converged vs a dedicated network? Why?

Split *******

* ******* *** ******* Dedicated ** ********* ******** occurred, **** *** ********* fifth ** ********* ****** an ***** *** ** both:

IPVM Image

***** *** ******** *** not ******* *****, ******* integrators ***** ** ** common **** ********* ****** control ** ********* ********.

Driven ** ******** **********

****** ******* ******** ******* much ***** ********* **** IP ****** ******* *** have **** ****** ** a *******. **** *********** stated **** ******** ** the ******** **** ******** between ********* ** *********:

  • "****** **%, ********* **% the **% ** ********* have ***** ** ******* all ******* ***** **** of ******* ** ******* by ******** ** ******** management"
  • "******** ***** **%. ** prefer ** **** *** security ******* ***** ** that ** **** ********** control *** ****** ** it. *** **** ****** we'll **** ** * corporate ******* ** ** the ******** ******* **"
  • "**/** **** ** ******* for *** ********** ** is ********* ******-**** ******. When ** ******* *** industrial ****** *** ******** its ******* ** *** existing ********."
  • "**/**. ******** *** ****** solution *******".
  • "**% ********* *** ***** with *** ** *** own ****. ******* *** preference ** *** ********** end ****"
  • "***** **** *** ****. We ****** ********* ******** security ********, *** *** depends ** *** ** deciders ** *** ******."
  • "***% ********* *** ** dedicated ****** ******* ****. Per ****** ************. "
  • "****** ** *** ******* 500's **** ** **** with **** **** ** dedicated ****/******* *** ******."
  • "****** *********. ** ********* primary ****** ** *** corrections ********. ** ** common *** *** ******** network ** ** *********"
  • "**/** - ** ******** by ******"
  • "********* ** ********’* **********, probably **** *** **** "
  • "**** *********, *** ***** do *** **** ** converge *******"
  • "** ******* ** *** customers *******. ****** ** the ********* ************ "
  • "**/** ********* ** *** specs ** *** ** group"

****** *** ***** **********, where ***** *** * trend *** ****** ******* to ** ********* *** smaller **** *********, ****** control ********* *** *** show * ******* ****** system ****.

Cost ********* *** *********

*** ****** ** ****** ******** ** ******* access ************* **** **** *** the ******* ******* **** Integrators. ** **** ****** Integrators ***** ***** **** as ***** * ****** when *********** ********* ** Converged ******** *** ****** control:

  • "**% *** **%. *** installs *** ********** *** converged ******** ** ******** costs ********** **** ******* and *********** *****."
  • "***% ************ **** ****** corporate *******, ** ****** is ***** ** ******** separate ******* *** *** access ******* *****."
  • "**% ** *** ******** sit ** * ********* security ***. **** **** client ****** ** **** money ** ** ******* on ******** ******* **************"
  • "***% *********. ****** ***** to ******** * ****** for * ****** ** Door ***********"
  • "* ** **** *** large ******** **** ** liking *** **** ** a ********* ******** ******* but *****'* **** *** sure ***** ******** *** extra *****. "
  • "**% *********. ** **** explain *** **** *** cons ** *** ******** and ******* *** **** of *** ********** ******** will **** **** *** security *******."
  • "***** **-**. *** ********* of ****** ** **** it ********* *** ***** of *** ******** ******* and ** ** **** more ****-********* ** *** what ** ******* ** place."
  • "**% *********. ***** *** cameras ** **** *** dedicated ********, ****** ******* has ** ****** ********* needs ** ***'* ***** the ********* **** *** a ********* *******"
  • "**% ****** *********. *** IT ************** ** *****, can ** ***** ** under ** ******* ******** and ** *** ** maintained **** **** ***********. "
  • "***% ********* *** *** operate ** * ******** vlan ** *******. ** support ***** *** ****** resources ** ******* ** together ***** ****."

Security ******** ***** *********

* **** **** *** network ******** ******, ************* risks *** * ****** concern *** ***********. ********* networks **** ***** ** a *** ** *********** decrease *** ****:

  • "****** *** *** ******** are ** ********* ******* for ***** ********."
  • "***% *********. *** ********* have **** *** ********* decision ** ********* *** their ******** ******** ******* on ********* ********. *** feeling ** **** ** minimizes ****** **** **** the *******."
  • "** ***** *** ********* on *** ********, *** at *** **** ***** setup *****. ** ******* the ********* ***** ***** security *** *** ***** associated **** ******* ********."
  • "** ***** ***** ****** and ******* ********* ******* infrastructure *** ******** *******... There *** ********* ****-******* cases ***** ********* ******** are ***********, ******* ****** or *******, ***** *********** and ********* ******* ******* assets *********** ** ********* for ******."
  • "**% ********* ******* *** security (**** *** ****** control). **** ********* ******* that * ********* ******** network ***** ** **** secure."
  • "**% *** ** * dedicated *******. *** **** security ** *** *** as **** ** **** IT ***** ** *** want ** ** ***** network."
  • "* ********* ******* ** really **** *** *** highest ******** ***** **** require **** ***********."
  • "**% *********. **'** ****** more ******* *** ********."
  • "***% ********* *** ******** purposes"
  • "*** ********* *******. *** more ****** *******."

Avoids ****** ******** **** *********

******** ********* *** ********* with ** *********** *** noted, *** ** * much ***** **** **** for ***** ********. *********** stated **** ********* ******** made ***** *** ******* easier:

  • "** ****** ***** *** own ********* ********. * don't **** ******* **** IT *********** ... ** get ** ***** ****** pointing ** ******** *** own. ** ** **** a ******* ** **** its *** ******* *** no *** *****. "
  • "*% *********. **% *********. Higher ******** **** ** risk ** ************ ** other ******* ** * dedicated ******. "
  • "*********. ** ****** **** an *********** ******* *** reliability *** *********** **************. "
  • "** *** ** **** everything ********-******* ** * dedicated ******* ** ***** us ** **** ****** and ******* *** **** without *** ******** ** using ******** ** ********* "
  • "***% ****** ******* ****. Like ** **** ** as * *****-***** ******, keeps ********** ****** *** keeps *** *** **** from ******* **** ***** they *******'*. "
  • "***% *** ******* ** we *** ******* **********"
  • "**% *********. ** ****** to **** ** * separate ******* ** ***** conflicts *** ******** *** maintenance *** *******."
  • "* ****** ** * Dedicated *** **** *******. Why ******* **** *** there's ** ****** ******** between ** *** ***** network."

Comments (5)

I feel sometimes there may be a little tendency to lean towards security through obscurity when it comes to access control, meaning access devices are seen as "less sophisticated" or technically robust as surveillance cameras, so therefore not as strong a threat. But a network device is a network device. I believe the newer Mercury boards are linux based as many older devices probably are. Care and caution still need to be taken with these devices.

Yeah, while network vulnerabilities certainly haven't had as high of a profile as the camera systems compromised, they still exist (MicroTrend: HID vuln., Software House vuln, gSOAP vuln effects Axis controllers). You mention Mercury and other Linux based platforms as a concern, but there is also the Genetec Synergis Cloud Link, which is Windows-based - which potentially opens another set of concerns.

Let us not forget the security v. convenience debate.  Everyone wants security, but not at a loss of convenience.  I think converged networks are a prime example of that with access control.  The need to be able to access it easily whenever they desire far outweighs the security desire they thought they had.

Cameras getting a dedicated network has much more to do with bandwidth than security with many customers.  They want the camera access, but don't slow down productivity.  If productivity will be jeopardized, we better dedicate a network to that.

 

I don't think I've ever done card access on a standalone network. Always been attached to the clients IT network. Just always been easier and cheaper I suppose. IT is already there, they set up the server on one of the VM's, and vlan their network for the access panel.

I never really ran into a lot of finger pointing. A few simple checks and it's easy to tell who's problem it is. The biggest problem was getting the proper ports open on their firewall. When I first started doing card access for one of my previous employers larger clients, their IT had a tendency to blame our hardware when things wouldn't connect. Once I learned about telnet, that started to change. Turn off the communications manager on the server, telnet on the port. If it works, then IT was right, if it doesn't, then IT was wrong. 9 times out of 10, it was a problem on their end.

I always found if I could prove them to be wrong, IT generally stopped the blame game. They of course would never admit they did something wrong, but the problem always magically got fixed.

If I had a dollar for everytime that occurred....

Read this IPVM report for free.

This article is part of IPVM's 6,599 reports, 889 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Dedicated Vs Converged Access Control Networks Statistics 2020 on Sep 10, 2020
Access control is a crucial system where the network used can impact life...
Dedicated Vs Converged IP Video Networks Statistics 2020 on Sep 10, 2020
Running one's video system on a converged network with other devices can save...
Access Control and Video Integration Statistics 2020 on Oct 08, 2020
Video Surveillance and Access Control are two of the most common security...
Remote Network Access for Video Surveillance Guide on Jul 27, 2020
Remotely accessing surveillance systems is key in 2020, with more and more...
Verkada Access Control Tested on Sep 09, 2020
Verkada raised $80 million earlier in 2020, expanding from video into access...
Door Fundamentals For Access Control Guide on Aug 24, 2020
Doors vary greatly in how difficult and costly it is to add electronic access...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Top Video Surveillance Service Call Problems 2020 on Oct 23, 2020
3 primary and 4 secondary issues stood out as causing the most problems when...
Mobile Access Control Usage Statistics 2020 on Sep 21, 2020
Most smartphones can be used as access control credentials, but how...
OnTech Smart Services Partners With Google and Amazon To Compete With Integrators on Sep 25, 2020
A pain point for many homeowners to use consumer security and surveillance is...
Favorite Access Control Credentials 2020 on Sep 15, 2020
Credential choice is more debated than ever, with hacking risk for 125kHz and...
Infinova, March Networks and Swann H1 2020 Financials Examined on Sep 02, 2020
While Dahua and Hikvision, helped by fever camera sales, are recovering from...
Access Control Levels and Schedules Tutorial on Sep 29, 2020
Configuring access levels and setting up schedules is central to maintaining...
YOLOv5 Released Amidst Controversy on Jul 27, 2020
YOLO has gained significant attention within video surveillance for its...
Cisco Meraki Unlocks IP Cameras With RTSP Tested on Jul 06, 2020
Meraki opened up its cameras to 3rd party NVRs/VMSes by offering RTSP...

Recent Reports

Bedside Cough and Sneeze Detector (Sound Intelligence and CLB) on Oct 28, 2020
Coronavirus has increased interest in detecting symptoms such as fever and...
Fever Tablet Thermal Sensors Examined (Melexis) on Oct 28, 2020
Fever tablet suppliers heavily rely on the accuracy and specs of...
Verkada Fires 3 on Oct 28, 2020
Verkada has fired three employees over an incident where female colleagues...
Recruiters Online Show LIVE Thursday! on Oct 27, 2020
IPVM's 7th online show resumes Thursday with 12 recruiters presenting...
Eagle Eye Networks Raises $40 Million on Oct 27, 2020
Eagle Eye has raised $40 million aiming to "reinvent video...
Hikvision Q3 2020 Global Revenue Rises, US Revenue Falls on Oct 27, 2020
While Hikvision's global revenue rises driven by domestic recovery, its US...
VICE Investigates Verkada's Harassing "RawVerkadawgz" on Oct 26, 2020
This month, IPVM investigated Verkada's sexism, discrimination, and cultural...
Six Flags' FDA Violating Outdoor Dahua Fever Cameras on Oct 26, 2020
As Six Flags scrambled to reopen parks amid plummeting revenues caused by the...
ISC Brasil Digital Experience 2020 Report on Oct 23, 2020
ISC Brasil 2020 rebranded itself to ISC Digital Experience and, like its...
Top Video Surveillance Service Call Problems 2020 on Oct 23, 2020
3 primary and 4 secondary issues stood out as causing the most problems when...
GDPR Impact On Temperature / Fever Screening Explained on Oct 22, 2020
What impact does GDPR have on temperature screening? Do you risk a GDPR fine...
Security And Safety Things (S&ST) Tested on Oct 22, 2020
S&ST, a Bosch spinout, is spending tens of millions of dollars aiming to...
Nokia Fever Screening Claims To "Advance Fight Against COVID-19" on Oct 22, 2020
First IBM, then briefly Clorox, and now Nokia becomes the latest Fortune 500...
Deceptive Meridian Temperature Tablets Endanger Public Safety on Oct 21, 2020
IPVM's testing of and investigation into Meridian Kiosk's temperature...
Honeywell 30 Series and Vivotek NVRs Tested on Oct 21, 2020
The NDAA ban has driven many users to look for low-cost NVRs not made by...