Hidden Access Cost: The Database

By: Brian Rhodes, Published on Mar 04, 2013

All decisions have a price, but some cost more than others. Choosing which type of database for your access control system can impact cost greatly, but many do not understand the full impact of their choice. In this note, we examine database selection, and how a fundamental up front decision can impact the system for years afterward.

Which Version?

Most access control systems are available in at least two versions:

  • Cheap: An option using a free or inexpensive database format (SQL Server Express, Microsoft Access, or DB2)
  • Costly: An options (typical offered as 'Enterprise' or "Multi-site') that integrates with a full-burdened instance of SQL.

Pricing between versions can vary by thousands of dollars, but understanding which type is best is more than just a question of cost. In the section below, we review the key considerations that must be weighed

  • Number of Cardholders: The cheaper options often have an upper limit to the number of cardholders they can contain. While this threshold may not be a constraint for small or medium sized systems, it may not be sufficient for multi-site distributed systems.
  • Integration With Other Systems: Because the card holder information often covers every member in an organization, the data is valuable to other applications. A variety of human resources or payroll platforms may need in integrate with the database, but the cheapest database may be proprietary and not allow for outside integration.
  • Dependencies: In other cases, a particular version may require additional database servers or software for use. The less expensive options typically can be installed and configured on a single workstation, but a full version of SQL is very seldom installed as a stand-alone machine. In addition, the maintenance and configuration burden of more complex databases could be markedly different than low-cost offerings.
  • Management Features: Less expensive options do not often include advanced features like backup utilities, failover management, report writers, or corruption recovery utilities.

Deciding which option is best also requires a full look at computing environment behind the access control system. Even when the need for more powerful features requires advanced database options, the end-user must understand additional skill sets needed to keep the system operational.

Using Full SQL

The largest 'hidden cost' of many access systems comes from requiring a full SQL database version, designated as Standard version or higher. In all, expect an additional $4000 to $8000 even before considering the cost of labor to administrate and maintain it.

Typically, unless a user already employs an IT staff including a System Administrator, the decision to use Standard SQL can be expensive. The skills required to manipulate data tables and maintain the database are beyond casual users. Incorporating a full version of a SQL database solely for the use of the access control system is not common, and the additional labor costs of using SQL can venture into tens of thousands of dollars per year.

Free Options

The 'cheaper' options are built using standalone examples of MySQLSQL Express, Microsoft Access, DB2, or custom proprietary databases. While advanced features are limited and data stability is susceptible to individual implementations, these platforms are developed with the 'casual' user in mind.

Basic Reporting Only

One of the biggest gaps between the two options comes in the flexibility of developing custom reports. When a free or proprietary database is used, the selection of reports referencing the data is limited to a stock group. When full SQL is used, a report writing program like Crystal Reports or SQL Reporting Services Report Builder can be leveraged to develop non-standard queries.

Practical Examples

The examples below do not consider the cost of the extra server and software licensing for full versions of SQL if needed:

  • DSX: Two versions of software are available, the Access-based WinDSX or WinDSX SQL version. Pricing differs between the two options by ~$1000 USD.
  • Lenel: OnGuard can be configured either as a standalone "SQL Express" version, or as part of a "SQL Standard" install. While pricing is the same for the base software, the upgrade process from Express to Standard is involved and  will require an experienced database administrator to successfully configure.
  • KeyScan: System VII offers two options , a free SQL Express version and an upgrade to Standard SQL. The cost between the two options is ~$1500, with the SQL version offering twice the card holder capacity of the free version.

1 report cite this report:

Access Control Server Guide on Sep 09, 2014
Electronic access control systems need to be managed. The 'server' though can range across: Panel based / 'serverless' systems Combo...
Comments : PRO Members only. Login. or Join.

Related Reports on Access Control

Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Dumber Techs, Bad Box Movers, Says Australian Distributor on Jun 10, 2019
Techs today are "dumber" than they used to be, despite better education and training and that makes a typical day "frustrating" for one...
OSDP Access Control Guide on Jun 04, 2019
Access control readers and controllers need to communicate. While Wiegand has been the de facto standard for decades, OSDP aims to solve major...
Vidsys New President Interviewed on May 31, 2019
A decade ago, PSIM was hot with projections then of a billion dollar market by now. This has not come close to happening. However, Vidsys, one of...
Access Control Job Walk Guide on May 22, 2019
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
Facial Recognition Systems Fail Simple Liveness Detection Test on May 17, 2019
Facial recognition is being widely promoted as a solution to physical access control but we were able to simply spoof 3 systems because they had no...
Maglock Selection Guide on May 16, 2019
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...
Milestone XProtect 2019 R1 Tested on May 15, 2019
For the past few years, Milestone has released quarterly software updates XProtect VMS platform. What is new and how much impact do the updates...
Access Control Request to Exit (RTE) Tutorial on May 13, 2019
For access controlled doors, especially those with maglocks, 'Request to Exit', or 'RTE' devices are required to override electrified locks to...
Mining Company Security Manager Interview on May 10, 2019
First Quantum Minerals Limited (FQML) is a global enterprise with offices on 4 continents and operations in 7 countries with exploratory operations...

Most Recent Industry Reports

Sighthound Transforms Into Enterprise AI Provider on Jun 14, 2019
Sighthound is now rapidly expanding its R&D team, building an enterprise AI service. This may come as a surprise given their origins 6 years...
ADT Eliminating Acquired Brands, Unifying Under 'Commercial' Brand on Jun 14, 2019
ADT is eliminating the brands of the many integrators it has acquired over the past few years, including Red Hawk, Aronson Security Group (ASG),...
NSA Director Keynoting Dahua and Hikvision Sponsored Cybersecurity Conference on Jun 13, 2019
The technical director for the NSA’s Cybersecurity Threat Operations Center will be keynoting a physical security cybersecurity conference that is...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Embattled $400 Million China Funded Philippines Surveillance System Proceeds on Jun 13, 2019
An embattled 12,000 camera surveillance system project that will cost ~$400 million will proceed.  The project contract was awarded, had its...
False Verkada 'Unrivaled' Low Light Performance Claim Removed on Jun 12, 2019
Verkada falsely claimed that it delivered 'UNRIVALED LOW LIGHT PERFORMANCE' until IPVM questioned. In fact, Verkada's low light performance is...
Manufacturer Favorability Guide 2019 on Jun 12, 2019
The 259 page PDF guide may be downloaded inside by all IPVM members. It includes our manufacturer favorability rankings and individual...
Camera Course Summer 2019 - Register Now on Jun 12, 2019
Register for the Summer 2019 Camera Course.  This is the only independent surveillance camera course, based on in-depth product and technology...
Favorite Wireless Manufacturers 2019 on Jun 12, 2019
Many wireless options exist for video surveillance but how are integrator's overall favorites? 170 integrators answered the question: What is...
Carnegie Mellon AI Startup Zensors Profile on Jun 11, 2019
Zensors is a startup formed by Carnegie Mellon graduates from a Carnegie Mellon research project, offering customized models per camera that they...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact