Replacing / Switching Access Control Systems Guide

By: Brian Rhodes, Published on Jun 28, 2018

Ripping out and replacing access control systems is hard for important reasons.

Because users typically hold on to access control systems for as long as possible, often decades, switching them can be tricky and prone to mistakes.

However, in this post, we address the important factors driving changes and key issues to handle. These include:

  • The Four Drivers Leading To Change
  • The Complexity of Migrations and Updates
  • Why Changes Are Costly
  • Drop-In Hardware Replacement Is Not Typical
  • Cutover Planning Is Crucial

******* *** *** ********* access ******* ******* ** **** for ********* *******.

******* ***** ********* **** on ** ****** ******* systems *** ** **** as ********, ***** *******, ********* them *** ** ****** and ***** ** ********.

*******, ** **** ****, we ******* *** ********* factors ******* ******* *** key ****** ** ******. These *******:

  • *** **** ******* ******* To ******
  • *** ********** ** ********** and *******
  • *** ******* *** ******
  • ****-** ******** *********** ** Not *******
  • ******* ******** ** *******

[***************]

Sticking **** ***** *******

*** ** *** **** common ******* *** ****** control ******-***** *** ******** is ****** ***** ** no ******** ****** ** change.

**** *** ******** ***** magazine ****** ***** ** an *******:

*** *** **** ****, the **** ******** ** an ****** ******* ****** are ******* ********* **** the **** ** *******. As **** ** ******* unlock *** **** ** required, *** **** ** the ****** *** **** satisfied.

******, ********** **** *** video ************ ******** **** releases ****** **********, *******, and ****** ********** ******* on * ******* *****, the ****** ******* ******** seemingly ****** ************ ***** at * *****'* ****.

*** **** ******** ***********, funding ** ***** *** money ** ****** ***** without *****. **** *** relative ****** ****** *** stable *********** ** **** access ******* *******, ******* is ******** ** **** pressing ***** ** **** to ***** ******* ******.

Limited ****** **** ************

**** **** *** ******** improvements ** '***** **' access *******, **** ** the ******** ***** **** using ************* ************** ** ***-***** manageability. ** **** *****, those ******* *** ** compelling ****** *** ********** ** **** **, but ******** *** ***** is *** ***** ****** to ****** **********'***********' ********* ** ****** based ****** **** *** already **** ***** **** proprietary ******* *** ***** controller ******.

*** *** ****** ** that **** **-***** ******* often ** *** ***** enough ********** *** ********** to ******* ******** *******. The ***** *** *** industry ** *********** '******* the *********' ** ****** control ** ******** [**** no ****** *********], *** existing ****** **********, *****.

** **** *** *** do ****** ****** ******* occur? *** *** **********, these ******* **** **** sources *** ********** ** analog ***** ************ ******* of ***** ****:

Driver #*: **** ** *******/ ****** ******

**** ******* ****** ** a *********** ** *********. Some ************* *** **** with *** ************ ** '*** ** Life' *********, ***** **** ******* will ******* * ****** for ******* *** ****** components *** ******** **** 'backward *************' ** ****, the **** ** * legacy ****** ******* ********* as **** ******. ******* it ** ******* ***** parts ****** ********* ** procure, ** **** ********* support ***** ****** ** more ******* *********, *** users **** ****** ******* or ** ******* ** an ********* ****** ** upgrade.

Driver #*: *** *********

***** ****** ******* ******* predate ***/** ********, *** the *********** **** ** integrate **** ***** ******* systems ** ****** **** remotely ****** **** *******. The *********** ** *********** access *** ********** ******** by ** ******** ********* server *** **** **** an ********** *********** ******** to *** ********* ** IP ***** *******, *** this ******** *** **** much ****** ** *** serialized *** ****-***** ***** of ******** ****** *******.

Driver #*: *** ***** **********

** *** **** ****, the ************* ** ***** surveillance's *********** **** ****** control ****** * ****** combination. ***** ********* ** achieve **** ****** **** systems, ***** *** ** Video ******* '***-**-***' ************ with **** ******* ****** platforms. *** *********** ******* of ******** ******* **** doors ******** *** ******* of **** *******, ******** verification ** ****** *** cardholder *********** * *************** task.

Driver #*: ******* ***********

** * ****** ******, overarching *********** ** *********** force ******. ** ***** of ****** ********* ********-***-* ** *************** **** **** **** ****** ******* With **** $** *** 125kHz **** ******, **** *** ***** find **** *** ******* cannot ******* ****** ********** encoding. ************, ******** ******** factors **** ******* ** acquisition *** ***** ******, as ******* *** **************** between ********* ********* ** almost ********** ** ** non-existent.

Why ******* *** ******

*******, *** ******** ********** to ****** ** *** function, *** ****. *** users ********* ***** **** thousands ** ******* ** control **** ****, ** considering ** ****** ******* escalates ** *****. ** addition ** *** **** cost ** ******** *** labor, ****** ***** ***** creep **:

  • ************ ****** *****: *********** ******* *** ********** of ******* ** **** work ******** ** ******** with ******.  ******* ******* ** video, **************** ******** *** standards **** ***** ******* * *** C ** ********, *** ***** major ********* **** ** replaced ********** ** **** are ******* ** ***.
  • '*** ** *******': *** ****** ** ** interoperability ******* ** ******** even * ***** **** of ****** *********** ******** all ** *** ******. If * **** ********** is ****** ***, **** potentially ******* *** ********* of * ******* *****. If********** ****** ******** ********* readers, ***** ******* **** be ********* ** *** controllers, *** ** **. A *** ****** ********* can ***** ******** ******* to *** ****** ******.
  • **** **********: ** **** *****, any ******* ** ** opening ***** ********** **** existing ******** *********. ********* on *** *** ** an *******, *** ***** of *** **** ** configuration ** ******** **** be ******* ** **** current *****. **** **** employ **** **** ** 'grandfathering' ***** ***-********* ******** can ** ************* **** as-is, ***** ***** ***** force * ******. ** soon ** *********** ******* are *******, ****** ********** changes **** **** ****.

Migration ********** *******

** **** *****, *** process ****** ** ****** access *** ** ******* so **** *** ****** of ******** ****** ************** and ********* *** ** pulled **** *** *** system.

*******, *** ***** ****** to **** **** *** can ** *******, *** often ******* ******* **** systems ************ *** * period ** **** ***** the **** ** ********.

**** ********* ******** *** be ************* *******. *** example,******** *****'* ******* *** upgrading *-**** ***/**** ** C-Cure ************ **** **** **** different *****, ******* ******** utilities, *** ***** **** not ****** ** *** data ***** ********* *** use ** *** *** version.

******, ** *** *-**** example, *** ********* **** every system ******* ** *********, some **** **** ** manually ********* ** ******* manually **** * *** system, ********* * ****** significant **** *** ***** effort *** ********.

**** ****** ******* ***** migration ********* *** **** upgrade ********** ********, *** these ******* *** ********* customized *** ****** ********, with ***** ****** **********.

Drop-In ******** ************ ********

******* ************ **** ** often ********* *** * rewiring **** ******* ****** to * *** ******. In **** *****, * system *** ******* ******** hardware ************ **** ******* versions ** ***** *********** hardware.

***** ******** ******** ** not ********* *********, ******* products ******* ******* ********'* takeover ******* *******-**************** ************.

Cutover ******** ** *******

****** ******** ** ** upgrade ** ********* ** avoid **********. ****** ***** surveillance, ***** ******** ******* result ** ** ******, updating ****** ******* *** mean *** ******** ** entire ***** *** ** jeopardy.

***** * ****** **** may ''*******" ** ** entirely *** ****** ** once, *** ******** ** uncommon *** *****, *****-**** systems. **** ********, *** critical ***** ****** ** consider ***:

************ ** *****:******* *** ****** ** have '***********' **********, ***** activities ***** ** **** due ** ************* ********. Informing ***** ** *** change, *** *** ********** planning **** ******* **** the *********** ** ********** keys, ** ********** ** guards, **** ******* ****** recovery **** * ****** system *******.

********** *********: *** ******** ** users *** *** ******** system **** ** ***** to *** *** ******. While '******** *******' *** be *********, **** ********* do *** ******* **** data *********, ********** *** custom ****** ** *** database.   ** **** *****, generic ********* *** ** a **** *** ** handling ***** ******* ** data.

***** ******** ********** ********* falls ******* *** ***** of **** ******** ********* and **********, ******* ****** be ***** **** ******** the **** ********.

  • ****** **********: ****** ********** *** migration, ****** * ****** for ******** ** ********** occurs.
  • **** **** * ****: ****** ********, *** importation ****** **** ***** from * **** ** the **** ********, *** the ******.
  • ****** ** *** '***** proprietary ******': ********* **** **** the **** ***** ****** helps ***** **********. *********, a **** ******** ****** be ******** **** * .CSV ** ***** ***** ASCII ********* ****.
  • ** *** **** *** Process: **** * ****-******** import ****** *** **** hours ** ********. *** sites **** ********* ** users, *** ******* *** require * *** ** more. ********** ********* ** a *** ** ********** the ******* *** ****** lead ** **********.
  • ********: ***** *** ****, the ******** **** ****** be **** ******* ** confirm ************ *** ********.

*** ******** ****** *** represent ******** ** ***** of ***** ** ********, and *** ****** ** contains *** ******** ********** to **** ********. ******* of *** *****, **** should ** ***** ** perform *** ******* ********* to ************'* ************.

*** ******** ** * Time: ******* ** '******** the ******' *** ******* on * *** ****** at *** *****, * phased ******** ** ***********. In **** ***, ** entire **** ** *****-**** facility ** *** ******** all ** **** ** hiccups ** ************* ** hardware *******. ********** *** cutover ******* ****** *** each ******** ** ** completely '****** **' *** made ***% ********** ****** the ****.

Comments (22)

* **** *** “******** trade ********” ******* ** 1970’s ****** ******* ***** is ******** ** ***** of ***** ****** ****** from *** ********* ***** adventure “***** ****”....***** * fictional ***** **** ** some ****. Space 1999

****'* * ****** ********** eye ***'** ******** *****.  Even *******, ** *** supposed ** ****** '****** tech' ***** ********* **+ years *****!

...*** ** **** ******** to ** ******* ****** space ** ****...

***,  **** **** **** we ***** **** * handheld ************* ******.

****-***** **** ** ******. The **** ******* *** I *** ******** * 56000 ********** ******** **** a **** *********** *****-***** access ******* ********.  *** hardware ********* *** ****.  We *** ** **** an *** ** ***** to *** *** ********** **** to **** *** ******** credentials **** "******** ******* not *** **** ** printed *******" **** ** the *** ******.  *** spreadsheet ** ******* *** about ** ******* ** data, *** **** ** IFs/THENs.  ***** ********** ********, we ***** ******'* ******** the ********** ** ***** photos **** ****** ******** so **** ****** ******** of * ****** *******.  Adding **** ** *** new ****** *** *******.  The **** ****** ****** above *** **** ** - ****, ****, ****!  After *** *** ****, we *** *** ******* on * ****** ***** in ***** * ***** with * ***** **** of *********** *** *********.

**** ***-***** **** ******* the ********* ******** *** executing *** ***** **** a ****** **** ** Aphantasia!

********** ** *** **** teacher, * *** **** learning ***** ***.

#******!

* ***** *****  ********** security *****/****** ** * driver. ******** ****** *** was **** **-** *** ago ** *** ** safe ***. * **** nothing ** ***% **** but *****, **** ***** can ** ****** **** your ****** **** * 20$ ***** **** ****... this ****** ** ************ to **** ************* ** least. 

****, *** ** ** seemed **** * ***** the ****-** ******** ************. I *** **** **** had **** ****** *** Casi *********** - * think *** ***** *** this ** ****** ** they ************ **** **** without *** ********** ****. And * ***** ******* should ** ***** ** Software ****-** ** ** is **** ** **** platforms, **** ** ***** are *** ** ***** anymore. ***** *** *** that ** *** ** old. 

******** ***** *** ** 9000 ******** ***  ** extremely **** ********* *******. Has *** *** ******** Software ***** ******** **** the *** ******* *********** boards? * ****** ** it ***** ** ****** to ***** **** **** scatch? 

*'** **** *** **** it ** ** ***** a ***** ******* ***** and ******* ** **** a ********* ******* ******** platform. ***** ****.

** * ******** ****, For ************* **** **** security ********* *'** **** in ***** **** *** 125 *** ****** *** have ***** **** **** on *** **** ** was. ****** ***** ******* available ****** ******* ***** that.

*** *** **** *** khz **** ***** **** you **** ** ***** being ****** **** * $30 ****** , **** older ***** ***** *** also ****** ****** ** you **** ** **** sure *** **** *** right ******.

****** **** **** ** realize ***** ** ** interesting ******** **** *** there **** ** **** for $** ***** ****** and ****** *** ****** on *** "******* *****" and *** ****** ** when * ********* ******* is ******** **** *** phone ***.

**** ***** *** ****** card ** ********* ******* redundant ****** *** **** secure ************** **** ****.

**** ***** *** ********* changes ** **** **** subtle , *** ** you **** ** ** secure *** **** *** time ** ******.

***** ******:

****** *** **** *******.  We ***** *** **** of '******* *******' *** mention ** *** '****** *******' **** ****** Control ******** ****.  **** **** ******:

****** ***** ****** ****** is ********** ** *** risk ** ******* ******* when ******** *** ********* in *** ******. *** card *********** **** ********* can **** ** **** to ****** ********* ****** of ***** ***** ** to ****** ***** ******* signals ** ******* ********* readers ********.

*** *** *******, *** ******, ************ ***** ***** 60 *******, *** ** done **** *** ******/********* side ** *** ****, and ** ************ ** the ****** *** ****** managers. *** ***** ***** shows *** ***** ******** are ********* *********:

******* ******** *** **** and *********** ** ***, with **** ********* ******* ~$** - $** online.

******* **** ** *** skimmers *** *****, **** can ** ********* ** readers, ****** **** *********, and ******* ******* **** than ** *** ** a ********* ** ***.

*** *** * **** article.

 

** **** ***** ** though **** * *** of ****** ***** ****** *********** **** only *** ******* **** though **** ** ** now **** **** ***********.

 

****** *** **** *** a ******?

** ******* *** ****** along **** *** *** layer *********** ** *********** with * *** ****** or **** *********** ****** control ******* ****** ***** to ** *********.

******* ****** ****: *** reader *** **** ******** or *** ***** *** with *** ******. *** smart ****** ******** *** port **** & *****. An ***** ** **** to *** ****** ******* system. ** *** ***** is *** ******* ** an ******** *** **** remains ********. * ****** rule ***** **** *** same ****** *** ******* access ***** ** ********** card **** ****** *** alarm. **** ***** ** any ***** **** ** a ******** **** ****** level.

** * ****** ** integrated ** ******* *** card ****** ****: **** reader ******/******* ****. ******* access, ***** ****** ***** on. ******** *****. ****** to ****** **** ******* by ** ********/** ******** card/mobile **********.

*** *** ***** ** more *****?

* ***** **** ** good *** ********** ********, however * ***** ****** see ******** ** *** door. ***.*** **** *** encryption ***** **** *** above *********** ** * intelligent *** ****** ****** slow **** ****.

** ** - * cents.

 

***** ** ** * bit *** **** ? I **** *** **** a **** **********/******** ** configure ********** ***** *** the *** **** ** a **** ****** ***** cost **** **** *** reader ** ******** ...

** **** ******* '*** norm' *** ** ****** readers *** ***** ******** security ******** **** *** HF ******* ** ****** the ************* ** *** wired ******* **** * think **** ***** ** enough. * **** *** Seos ******** *** ****** thought *** ****** ** that ** ** **** the *** ( ********* container ) ******** ** the ********** *** **** and ******* ** *****. This *** *** **** like * ****** **** the ********** ** *** controller. 

**** *** ***** ********* had ********* ************* ***** for *** *** **** were ***********. 

*** **** **** *** the ***** ***. *** you ***'* **** **** to ** **** ** savvy ** ***** * card. **** **** **** CVS ** **** ***** and ****'** ** ** for ***, *** *** don't **** **** ** identify ******** ** *** card ***'** *******. ***...

***. **** **** ***** on **** ******. *** iclass ** ******.

**** , *** ****** is ****** **** ** do ****.....

******?  ***** ****** *******?

****, *** ** ****** not ****.

* **** ****** *** be ****** *** ***** source *'** **** ** is *** ****** ** easy ** ****. *** you ***** ** *** resources?

** *** **** ** youtube ***** "**** *******" you **** *** * 2 ****** *****, ** least *** **** ********** the ***** *** ***** on ** ****...

****** ****** (**) *** been ****** *** ******* years, *** *** **** replaced ** *** **** SEOS.  ** ******* **** dynamic **: ************* ********* *** ****** Control *****

** *** *** *** iClass, ***'** *** ****** ******** *****... ***.  Give ** * *** more ****** *****.  :)

*******,

 

**** *** ****** *** make ** ***** , thanks *** ****.

 

***** **** ****** **** start ** ********** *** cloning **** (*** ***) ** the ***** ** ** easy.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Access Control Course Fall 2019 - Last Chance on Oct 17, 2019
Register Now - Fall 2019 Access Control Course. Thursday, October 17th is the last day to register. IPVM offers the most comprehensive access...
2020 Access Control Book Released on Dec 19, 2019
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing has been significantly...
Designing Access Control Guide on Jan 30, 2019
Designing an access control solution requires decisions on 8 fundamental questions. This in-depth guide helps you understand the options and...
HID Launches Origo To Fix Mobile Credential Problems on Feb 05, 2019
HID is releasing Origo, an overhaul of its mobile credential platform, this time drastically restructuring the way it is priced and packaged. HID's...
Startup GateKeeper Aims For Unified Physical / Logical Access Token on Apr 04, 2019
This startup's product claims to 'Kill the Password' you use to keep your computers safe. They have already released their Gatekeeper Halberd...
OSDP Access Control Guide on Jun 04, 2019
Access control readers and controllers need to communicate. While Wiegand has been the de facto standard for decades, OSDP aims to solve major...
Poor OSDP Usage Statistics 2019 on Jul 09, 2019
OSDP certainly offers advantages over decades-old Wiegand (see our OSDP Access Control Guide) but new IPVM statistics show that usage of OSDP, even...
Access Control Time & Attendance Guide on Sep 24, 2019
Access control systems can do more than lock doors. With little or no extra equipment, they can be used to track labor hours for employees...
Access Control Mustering Guide on Sep 30, 2019
In emergencies, determining where employees are located can be critical for knowing whether they are in danger. Access systems can be used for...
Directory of Access Reader Manufacturers on Nov 27, 2019
Credential Readers are one of the most visible and noticeable parts of access systems, but installers often stick with only the brand they always...

Most Recent Industry Reports

Milestone Launches Multiple Cloud Solutions on Feb 18, 2020
Milestone is going to the cloud, becoming one of the last prominent VMSes to do so. Milestone is clearly late but how competitive do these new...
Video Surveillance 101 Course - Last Chance Thursday on Feb 18, 2020
IPVM's first Video Surveillance 101 course starts this month, designed to help those new to the industry to quickly understand the most important...
Video Surveillance Architecture 101 on Feb 18, 2020
Video surveillance can be designed and deployed in a number of ways. This 101 examines the most common options and architectures used in...
UK Stands Behind Hikvision But Controversy Continues on Feb 18, 2020
Hikvision is exhibiting at a UK government conference for law enforcement, provoking controversy from the press, politicians, and activists due to...
IronYun AI Analytics Tested on Feb 17, 2020
Taiwan startup IronYun has raised tens of millions for its "mission to be the leading Artificial Intelligence, big data video software as a service...
Access Control ADA and Disability Laws Tutorial on Feb 17, 2020
Safe access control is paramount, especially for those with disabilities. Most countries have codes to mandate safe building access for those...
ISC West 2020 Removes China Pavilion, No Plans To Cancel Or Postpone on Feb 17, 2020
ISC West plans to go on next month, amidst concerns over coronavirus. However, the Asia / China Pavilion has been removed, show organizers...
Hanwha Wisenet X Plus PTRZ Tested on Feb 14, 2020
Hanwha has released their PTRZ camera, the Wisenet X Plus XNV-6081Z, claiming the "modular design allows for easy installation". We bought and...
PRC Warns Against China Video Surveillance Hacks, Hikvision Targeted on Feb 14, 2020
Hackers are targeting China video surveillance manufacturers and systems, according to the PRC's main cyber threat monitoring body. The hackers...
IPVM Conference 2020 on Feb 13, 2020
IPVM is excited to announce our 2020 conference. This is the first and only industry event that will be 100% sponsor-free. Like IPVM online, the...