Page 84 - Security Today, September 2017
P. 84

Go to sp.hotims.com and enter 74 for product information.
in his phone or any web-enabled device. For example, he can discover all available wireless devices, do a test to make sure a door is within range, and even click “relay” to see physical action at the door and monitor dB gain.
Once hardware is in place, a 100 percent cloud solution should re- quire zero onsite configuration. Again, the app provides all the tools necessary. The integrator sets up initial users and their administra- tive permissions, and once they accept the invitation, they can add, change and delete access rights, even from a mobile device. It’s truly plug-and-play. It’s equally easy to upload large employee databases, create groups, time zones, create partitions, and use the rules engine to make the system do whatever is desired.
Now, to the topic of integration flexibility. The delineation be- tween physical security solutions, network security, cybersecurity, and solutions like building management and life safety systems, con- tinues to blur as the IoT (Internet of Things) encompasses more and more devices. Integration is easier, and can deliver more capabilities, when systems are designed to communicate with each other, and cloud-based solutions are predisposed for this type of functionality. Hosted access control solutions can more easily integrate with a wide range of platforms, and can even seamlessly integrate with stand- alone solutions.
For an IT manager looking to streamline operations and consoli- date solutions, cloud-based platforms make that task infinitely easier. Look for cloud-based access control to integrate with lock systems, video surveillance, HR and payroll systems, visitor management, bill- ing systems and much more.
Paths to Migration
For large companies looking to upgrade their physical security infra- structure, the sunk costs of hardware already installed might make the proposition of “going cloud” seem prohibitive. Cloud solutions often offer compatibility with all your existing hardware, and do not require an all-or-nothing investment. Initially, only controllers need to be swapped out, and these can be connected via existing cabling. These then get connected to a “cloud node” facilitating the physical connection to the hosted platform.
Once this has occurred, the customer can run the new controllers indefinitely. As all software is automatically updated, the hardware never becomes obsolete and the system never goes out of date. If, at some point in the future, there is a desire to further upgrade the sys- tem’s hardware, or to add additional doors using wireless connectiv- ity, both legacy and new components can operate through centralized management, with seamless interoperability.
The Bottom Line
As mentioned at the beginning of this article, the financial benefits of cloud solutions are well known; it’s one of the primary reasons that the industry-leading business solutions are now hosted.
Access control is no different. Compared to stand-alone solu- tions, it is significantly less expensive to install, operate and maintain. However, for the enterprise customer, price is not enough. When it comes to access control, decision makers must feel fully confident that any quest to save dollars on a cloud solution doesn’t compromise their corporate security, diminish their functionality or limit their fu- ture options for expansion and integrations.
The new generation of cloud-based access control should go far beyond putting these concerns to rest. In fact,
look to cloud-based access control to redefine the
category, establishing a higher level of expected
features and performance, as required by even the most demanding, enterprise customers.
Jeffery Perri is president and co-founder of ProdataKey.
0917 | SECURITY TODAY
ACCESS CONTROL


































































































   82   83   84   85   86