IT Brief Australia logo
Technology news for Australia's largest enterprises
Story image

Migrating to a modern access control solution

Thu 5 Nov 2015
FYI, this story is more than a year old

The security landscape continues to evolve in new and complex ways, an evolution that brings change on many levels. Rather than seeing this change as an interruption or distraction, a proactive approach and a solid plan can turn it into an opportunity for significant improvement.

While migrating from old to new systems is always a big undertaking, new technology in today’s physical access industry makes it relatively affordable and manageable.

Organisations have the opportunity to move from 20-year-old physical access control systems (PACS) to significantly more secure, contactless technology, while paving the way for future mobile platforms that further improve security and convenience. 

Making the right decisions today will also ensure that a company’s access control solution can be used for far more than just opening doors.

Modern systems will support a wide range of high-value applications, ranging from cashless vending, time and attendance and secure print management, to secure network logon. The access control solution will act as part of a fully interoperable, multi-layered security solution across systems, hardware and building topography.

There are many compelling reasons to take the leap. These include upgrading from the inadequate security of magstripe and proximity cards, as well as enhancing user convenience with a platform that supports multiple applications on smart cards or mobile phones.

ROI will be realised through improved security operations and more efficient workflows, or through reduced insurance premiums due to better risk management. 

Legacy security solutions often use proprietary technology that is static, which makes them easy targets for attack, and precludes their evolution beyond current abilities and security levels. Instead, organisations should pursue solutions that are dynamic and adaptable to the changing needs of their environment and the best practices in the relevant industry.

Interoperability is one of the first considerations for a major access control solution upgrade.

Building an architecture that supports change requires careful attention to the connections between various components of the architecture. As components evolve and add new equipment and systems, security, administration and facility managers need to understand all of the communication dependencies of their architecture, and how the latest standards might be applied. 

Additionally, interoperability should deliver economic benefits. An important litmus test for interoperability is the cost associated with switching out the various components of the architecture. Stepping through the 'what if' scenarios of component replacement is a useful exercise to understand dependencies and links, and all of the material and labour costs associated with moving on from an existing device or platform.

In the end, interoperability has been achieved when a facility can easily and inexpensively expand and upgrade their systems to meet changing needs and take advantage of new technologies.

The latest solutions ensure that security is independent of hardware and media, making it much easier for facilities to evolve their infrastructure to support tomorrow’s needs. Modern solutions also enable smart cards to be portable to smartphones so that a facility will have the option to use smart cards, mobile devices, or both within their PACS.

There are many possible entry points from which to begin a migration process. Mergers often involve rebranding or combining disparate systems, technologies and processes. As the cost of new technology is generally competitive with that of the legacy system, this would be a perfect time to migrate to a more secure, sophisticated and capable system.

Facility consolidation or moving to new locations often means that new credentials will have to be issued. This offers a good opportunity to standardise all technology onto one system.

Since new technology offers the ability to issue or change credentials remotely, it’s now possible to integrate access control into one system that is centrally managed. Standardising all employees on one system can increase security and improve resource management. 

Organisations that want to add new applications such as time and attendance, secure print management, biometrics, cashless vending, and medical records management functions will need to issue some type of associated card to users.

They can use this as an opportunity to migrate to a contactless smart card that combines access control with these extra functions, enabling employees to carry a single card for many purposes.  Administration of these functions is centralised into one efficient and cost-effective system. 

Migrating to a new system can dramatically improve security for a facility, which may help with insurance requirements or improve risk-management costs by reducing liabilities.

An organisation may also be required to increase security as the result of new legislation or regulatory requirements. In some cases where very high security is required, a facility may even need to add an additional, high-tech authentication factor such as biometrics to their upgraded solution.

The reality is that sometimes it takes an unexpected event or security breach to move an organisation to make the investment in a new access control system. Ideally, a facility should migrate before there is a problem, especially when the current system uses legacy technology that is known to be easily cloned.

Today’s access control platforms allow a secure, phased migration from old to new systems.  Depending on the size of the population, it can take several days or several weeks to migrate. If necessary, a parallel system can be in place for months.

The important thing is to ensure interoperability with legacy and future systems.  This also requires that the access control platform includes multi-technology cards and readers that can be used to bridge the gap between just about any legacy system and today’s secure contactless technology.  

One approach for getting started is to simply use multi-technology cards within the one system. A single smart card can securely house up to four different access control technologies, including Weigand, magstripe, low frequency, high frequency, or a contact chip. 

This approach works well if an organisation only wants to upgrade security for a specific department or group of professionals. The new cards can contain both technologies so employees can enter any location regardless of whether it has an old or new reader. 

Another way to handle migration is to install readers that use a combination of old, low frequency and new, high frequency technologies, including 125 kHz HID Prox or magstripe, as well as the latest RFID technology. These multi-technology readers increase flexibility, enabling the facility to develop a migration plan that serves its unique requirements.

Then, rather than switching out all of the cards at once, high frequency cards can be issued to new employees and as replacements with existing employees. This will offset the cost of swapping out all of the cards at once. The organisation can then replace all of its low frequency cards with high frequency cards after a transition period, and by then the cost impact will be lower because many of the employees will have the new cards already. 

Ultimately, migrating to a new access control system should be seen as an opportunity rather than an interruption. With the right approach and a bit of planning, organisations can dramatically improve their security while making life easier and more convenient for employees.

By Steve Katanas, HID Global director of sales for Australia and New Zealand

Related stories
Top stories
Story image
Recruitment
Thales on recruitment hunt for next disruptive innovations
"Recruiting new talent is part of Thales's belief in the power of innovation and technological progress to build a safer, greener and more inclusive world."
Story image
Cybersecurity
Palo Alto Networks' cloud security platform receives IRAP assessment
"We provide help protect all forms of compute, cloud native services and access to data within public and private sectors."
Story image
Apple
Jamf introduces new content filtering solution for education providers
Jamf has announced the launch of Jamf Safe Internet, a new offering that looks to deliver a safe online experience to students while offering better management options for admins.
Story image
Infrastructure
Video: 10 Minute IT Jams - An update from Paessler
Sebastian Krüger joins us today to discuss how unified infrastructure monitoring enables MSPs to seamlessly deliver services to their clients.
Story image
Compliance
SentinelOne integrates with Torq to empower security teams
"With Torq, security teams can extend the power of SentinelOne to systems across the organisation to benefit from a proactive security posture.”
Story image
Dicker Data
EXCLUSIVE: Why women in IT makes good business sense - Dicker Data
The Federal government wants to bolster female participation in the tech industry to at least 40% by 2030. Here's how one homegrown Australian company has already reached that goal.
Story image
Management
MYOB snaps up Sydney-based management software specialists
MYOB has announced the acquisition of Sydney-based business management software and support specialists, GT Business Solutions.
Story image
Digital Fingerprint
Decline in counterfeit cherries after digital fingerprinting
Reid Fruits says there’s been a dramatic decline in counterfeit products for its cherries over the past three export seasons to Asia because of digital fingerprinting.
Story image
Data Protection
Five signs your business is ready to move to the cloud
Many organisations are thinking about moving to the cloud. But what are the signs you are ready, and what are the reasons to move?
Digital Transformation
Discover the 5 signs your business is ready for a cloud-based ERP. Is your business being left behind as more of your competitors switch to the cloud?
Link image
Story image
API
Industry-first comprehensive risk-based API security enhances protection
Application Programming Interfaces (APIs) have become a crucial part of operating web and mobile application businesses and are causing significant economic growth in the digital sector.
Story image
Solutions
Progress launches latest version of network visibility solution
In Flowmon 12 network solution, Progress has expanded its support for public cloud provider flow log monitoring and launched new features.
Story image
Artificial Intelligence
Siemens expands NVIDIA partnership for industrial metaverse
Siemens is expanding its partnership with NVIDIA to enable the industrial metaverse and increase the use of AI-driven digital twin technology.
Story image
Cybersecurity
Without trust, your security team is dead in the water
The rise of cyberattacks has increased the need for sound security that works across any type of business, but with any change, buy-in is essential. Airwallex explains why.
Project management
Discover the 4 crucial factors for choosing the right job-costing solution. Is your team struggling to cost jobs and keep projects running on budget?
Link image
Story image
Wiise
Four things wholesale distributors need to consider for FY2023
In a post-pandemic world, there are many things for a distribution business to juggle. ERP solutions company Wiise narrows down what companies should focus on.
Story image
IDTechEx
The next stage for 5G in thermal materials - IDTechEx
IDTechEx says higher frequency deployments, such as mmWave devices and very different station types such as small cells, present their own technological evolution and, with it, thermal challenges. 
PwC
PwC's Consulting Business and PwC's Indigenous Consulting are proud to play an important role in helping Australian Indigenous Mentoring Experience build IMAGI-NATION, a free online university for marginalised communities around the world.
Link image
Story image
Development
Intel Labs unveils integrated photonics research advancement
"This new research demonstrates that its possible to achieve well-matched output power with uniform and densely spaced wavelengths."
Story image
Accounting
Four factors to consider when choosing the right job accounting solution
Progressive job-based businesses can achieve success by strengthening their ability to quantify every cost attributable to the delivery of an outcome for a customer.
Story image
Artificial Intelligence
Accenture shares the benefits of supply chain visibility
It's clear that gaining better visibility into the supply chain will help organisations avoid excess costs, inefficiencies, and complexity to ultimately improve their bottom line.
Story image
Ransomware
Businesses unprepared to defend against ransomware attacks
Ransomware attacks continue to impact organisations worldwide with high costs, but businesses are still largely unprepared.
Story image
Documentation
Adobe study finds lack of digital trust and utilisation in Australian Government agencies
New research commissioned by Adobe has revealed a significant lack of digital trust within Australian Government departments, along with the continued underutilisation of key digital processes.
Story image
Enterprise Resource Planning / ERP
Five ways your ERP is letting you down and why its time for a change
Wiise explains while moving to a new system may seem daunting, the truth is that legacy systems could be holding your business back.
Story image
Artificial Intelligence
Vectra AI named as AWS security competency partner
Threat detection and response company Vectra AI has announced that it has become an Amazon Web Services Security Competency Partner.
Story image
State Library of Victoria
State Library of Victoria entrusts Oracle support and security to Rimini Street
“Our finance team are very happy with the support and security that Rimini Street provides, which keeps our assets and our customers secure."
Story image
Macquarie Data Centres
Macquarie deal to pioneer CO2-cutting data centre tech in Australia
Macquarie Data Centres has signed a multi-year deal with ResetData, an Australian first provider using Submer data centre technology. 
Story image
Airwallex
How Airwallex helps businesses achieve globalisation success
As markets continue to shift, businesses need to be able to provide the same quality of service for customers regardless of where they are located around the world.
Story image
Samsung
Monitors are an excellent incentive for getting employees back
The pandemic has taught us that hybrid working is a lot easier than we would’ve thought, so how can the office be made to feel as comfortable as home? The answer could be staring you in the face right now.
Story image
Voice recognition
Renesas and Cyberon expand services with voice recognition
“We are honoured to collaborate with Renesas to simplify the development of embedded voice recognition functions."
Story image
Microsoft
SAS wins Microsoft ISV 2022 Partner of the Year award
"We formed the SAS and Microsoft strategic partnership with a shared goal of making it easier for customers to drive better decisions in the cloud."
Story image
Metaverse
How the metaverse will change the future of the supply chain
The metaverse is set to significantly change the way we live and work, so what problems can it solve in supply chain management?
Story image
Malware
Colt launches new SASE Gateway solution with Versa
Colt Technology Services’ customers now have access to an integrated full SASE solution that brings together SD WAN and SSE features.
Supply chain
Discover the 4 critical priorities for wholesale distribution businesses in FY23. Are you worried about how supply chain issues may affect your business in 2023?
Link image
Story image
Identity and Access Management
Ping Identity named a Leader in Access Management
Ping Identity has been named a leader in the 2022 KuppingerCole Leadership Compass report for Access Management. 
Story image
Cybersecurity
Delinea’s Joseph Carson recognised with OnCon Icon Award
Delinea chief security scientist and advisory CISO Joseph Carson has been recognised as a Top 50 Information Security Professional in the 2022 OnCon Icon Awards.
Story image
Cybersecurity
Tech and data’s role in the changing face of compliance
Accenture's study found that 93% of respondents agree or strongly agree new technologies such as AI and cloud make compliance easier.
Story image
Telstra
Ericsson and Ciena, Telstra enhance service capacity for Telstra's optical network
Ericsson, Telstra, and Ciena have announced new enhancements to Telstra's Next Generation Optical Network, which will increase the service capacity of Telstra's optical network to 400 GE (Gigabit per Second Ethernet).
Story image
Payroll
How New South Wales state departments achieved cloud migration success
State departments in New South Wales are heading to the cloud to achieve better workflow solutions, and one company is paving the way for their success.
Story image
Remote Working
RDP attacks on the rise, Kaspersky experts offer advice
"Given that remote work is here to stay, we urge companies to seriously look into securing their remote and hybrid workforce to protect their data."
Productivity
Discover the 5 ways your ERP may be letting you down. Is your current system outdated, difficult to manage, and costing you a fortune?
Link image
Story image
Artificial Intelligence
Juniper study reveals top AI trends in APAC region
Juniper's research shows an increase in enterprise artificial intelligence adoption over the last 12 months is yielding tangible benefits to organisations.
Story image
Artificial Intelligence
Dynatrace extends automatic release validation capabilities
Dynatrace has extended its platform release validation capabilities to improve user experience at every stage of the software development lifecycle.
PwC
WSLHD and PwC’s Consulting Business came together to solve through the challenges of COVID-19. A model of care was developed to the NSW Health Agency for Clinical Innovation guidelines with new technology platforms and an entirely new workforce.
Link image