ACaaS should be on your radar

SMART Access & Identity 2023 Access Control & Identity Management, IT infrastructure


David Arrikum.

With the rapid increase in construction of data centres, economies of scale dictate that hosted services will become cheaper as time progresses. Why does an end-user still need to build a data centre to manage their security systems? Has an end-user ever been advised on the total cost of ownership of their system? Moving towards a hosted environment allows end-users to do what they do best by focusing on their business operation and the improvement thereof, while reducing the total cost of ownership.

Reduction of total cost of ownership

Straight off the bat, with a hosted environment an end-user has less capital expenditure due to less hardware on site. Less hardware on site results in lower power/electricity consumption, less cooling power to keep head-end devices at the optimal temperature, less back-up power required, no specific ICT skillset required to manage head-end infrastructure and no replacement of head-end equipment every 3 to 5 years. Less equipment on site also means that maintenance is drastically reduced. End-users now move away from CAPEX and to and OPEX model.

Moving your systems to a hosted environment gives you far greater flexibility and scalability as an end-user, allowing you far more control over your own environment. You have the ability to make decisions about your system that directly influence your business ‘on the fly’. If you are not happy, simply revert to your previous configuration. Add users, remove users, update permissions, configure access groups, remotely manage both users and door access - all with far greater ease; all you need is power and Internet.

We live in a world where things are simultaneously real and unreal. Take social media platforms for example. They are not ‘real’ places so to speak, yet the social and financial effects are very real. The security industry in South Africa needs to change its perception that if something like a server cannot be seen or touched, then it is not as real or as safe as an on-premises server is, and therefor is of no benefit for the business.

While the cloud may seem a very imaginary place, the benefits for business are very real and can be achieved far more quickly, and with greater ease, when compared to that of a traditional on-premise solution. Access Control-as-a-Service (ACaaS) should therefore be on the radar of every company looking to control costs in tough economic times.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

A smart start for South African cities
Integrated Solutions IT infrastructure
Cameras and sensors can kick off smart city strategies in cities around South Africa, leading to not only improved security and safety, but also better service delivery in areas like electricity and water provisioning.

Read more...
You cannot bribe a computer
Access Control & Identity Management Security Services & Risk Management
Corruption is a cancer that destroys the prospects and stability of countries and businesses. It widens wealth gaps and punishes the poor. It costs countries many billions in lost revenue.

Read more...
Blurring the lines between data management and cybersecurity
Cyber Security IT infrastructure
In the past, data management and cybersecurity would fall under separate domains, but with more organisations making the shift to the cloud, data management and data protection have merged, essentially blurring the lines between the two.

Read more...
Heightening physical security at military base
Turnstar Systems Access Control & Identity Management Government and Parastatal (Industry) Products
Turnstar Systems recently installed two 3-metre Velocity Raptor traffic spikes at the South African National Defence Force (SANDF) Randfontein military base on Gauteng’s West Rand.

Read more...
Zero Trust to dominate 2023
Cyber Security Access Control & Identity Management
Traditional ways of safeguarding data are no longer sufficient in 2023. Zero Trust has emerged as a more proactive way for businesses to keep their systems, data, and networks protected against compromise.

Read more...
Turnstar opens an office in the UK
Turnstar Systems News Access Control & Identity Management
Turnstar Systems recently established an office in the Greater Manchester borough in the North East of England, as part of the company’s ongoing expansion strategy.

Read more...
Enkulu Technologies to distribute Brazil’s Control iD
News Access Control & Identity Management Products
Enkulu Technologies has been appointed as the first South African distributor of Control iD products; a Brazilian company offering a T&A range of solutions based on its range of biometric products.

Read more...
HID Technology Seminar
Technews Publishing HID Global News Access Control & Identity Management Products
HID Global’s technology seminar introduced partners and distributors to the company’s new Signo range of readers and highlighted the benefits and global growth of mobile access credentials.

Read more...
Celebrating a successful year
Gallagher Technews Publishing News Access Control & Identity Management Products
Gallagher Security hosted an end-of year event at the Steyn City Equestrian Centre in which it thanked its partners for another successful year and provided a glimpse into what the company will be releasing in 2023.

Read more...
Innovation and service, 37 years and counting
Technews Publishing Impro Technologies Access Control & Identity Management Integrated Solutions
Innovation, simplicity and trust underpin the nearly 40 years of success of local access control brand, Impro Technologies, which is still run as an independent entity despite being acquired by ASSA ABLOY in 2016.

Read more...