Pitfalls to avoid when migrating to an enterprise solution

Access & Identity Management Handbook 2014 Access Control & Identity Management

An enterprise system can mean different things to different people. In this instance we are defining an enterprise system as maintaining central control over an entire access control system, while each local facility maintains independent control of its individual operations.

Its power gives system administrators at the main facility the ability to configure and monitor all locations from that single site. It also allows them to simultaneously monitor alarms from multiple facilities from one convenient workstation. Whether your organisation consists of a few facilities that are locally dispersed or many that span the globe, an enterprise solution scales as your company grows.

The main factor to keep in mind when you begin to plan the migration to an enterprise access control solution is preparation. You need to know what resources are available to you, who the key players are to help you in this process, and how to develop a solid plan to get the system up and running successfully.

When migrating to an enterprise system, you will want to avoid the following pitfalls:

1. Failure to define the ‘operational paradigm’.

2. Failure to define performance and scalability expectations.

3. Poor coordination between multiple vendors.

4. Moving data without a plan.

5. Poor preparation for the unknown.

1. Failure to define the ‘operational paradigm’

Define the operational paradigm for:

* Administrative processes.

* Reporting.

* Monitoring and control experience (graphical expectations).

There are some critical questions that you will want to answer as you begin a migration to an enterprise access control system. Are you able to improve the administrative and monitoring workflow? Will this process improve the overall operation? How will you be able to leverage the new technology? Ultimately, this is the perfect time to define existing pain points up front and not wait until the end of the project. Take a close look at your existing model or old technology. What reports can you take advantage of? What should be updated? With the migration to an enterprise system you will have an increased amount of alarm monitoring capabilities and you should incorporate them into your workflow. You will want to utilise existing habits and leverage new features. It has been our experience that the migration process offers the owner an opportunity to review and ultimately clean up their existing database which has been subjected to years of management by different people.

It is also key to streamline reporting before you begin this type of project. Your business has information everywhere – information about people, policies, ideas, and money. That kind of information is what drives a business’ success – or its downfall if not harvested, organised, and managed properly. How much data will you need to retain? What was your previous journal management process? Will you need to move previous journals for future reporting? All of these reporting questions are important to answer before migrating to an enterprise system. Advanced reporting solutions such as Software House’s Business Intelligence Reporting Suite (BIRS) are designed to harvest and organise your business information properly.

2. Failure to define performance and scalability expectations

Every system has a limit. Understanding the volume of activity that you are planning to put through your enterprise will allow for proper definition of the overall system architecture. One of the key elements of this analysis is the understanding of input activity such as Door State Monitor or Request to Exit traffic. Software House’s Smart Services can assist in obtaining this data from existing systems as you move to an enterprise solution.

3. Poor coordination between multiple vendors

An enterprise system incorporates collaboration from multiple departments. The system runs across many facilities and requires coordination from multiple vendors. It is crucial to clearly communicate with all vendors, departments, and any other external groups that may be involved in the migration process. One should expect to have the key integrator(s), IT, and Software House Smart Services involved in the migration process.

The integrators will be called in to install all of your various applications including fire, security, CCTV, intrusion, visitor management and any others that you would like to include in your overall system. It is also important to incorporate version control and user experience to ensure that the integrations run smoothly.

Your IT team will help you move to a virtual environment. They are the experts who fully understand the IT environment and what needs to be monitored during the migration.

Software House’s Smart Services team will work with you to perform the pre-migration audit. They will audit all of your existing systems to assess rogue inputs and outputs or any other errors in the system. They will help identify potential problems within your existing database that could be taking up additional space. They will also identify hidden information that is not logged to the journal.

For example, a past user may have configured a point to not record to the journal because it was creating excessive traffic, making it easier to shut off rather than solving the core issue. Or an input point was removed from the database but not from the controller. The pre-migration audit will help identify: broken hardware, credentials that may not need to be moved from one system to another and un-trusted points (service related reports). If a point has not gone active in the past two years, is it really reliable? During the audit, Smart Services professionals will discover all of these errors in the existing system and help you solve them before the migration.

4. Moving data without a plan

Migrating from your existing access control system to an enterprise solution requires a solid plan. You will need to form a team. Who is going to set this up? Who will maintain the enterprise system and data once it is running? Your team should include individuals from human resources, security operations, IT, and server management. It is very important that you, or someone you designate, carefully coordinate between all of these people.

Once you have identified the team you will need to assign task owners. This should be clearly documented in a master schedule, which also defines the deliverables for each individual team member. These deliverables will include import and export requirements, report requirements and owners of the data. This will also allow you to determine any issues that may have arose from the imported training information. These issues may be stored in a separate location until identified and an import solution is put in place to properly handle the update of personnel and credentials.

5. Poor preparation for the unknown

Poor preparation for the unknown is the final pitfall to avoid when implementing an enterprise level access control system. By fully understanding your complete system and everything surrounding it, you will better be able to visualise the potential risk factors. Be aware of firewalls, virus protection, malware, backups, high availability, data sources, desktop policies, upgrade policies, and more. The pre-audit of all hardware components will help you determine a part of this as well. You should have your plan in place and know what details you want to include ahead of time. These steps will help you prepare for potential issues and maximise the success of your migration.

For more information contact Tyco Security Products, +27 (0)82 566 5274,  [email protected] www.tycosecurityproducts.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Visitor management views
Entry Pro ATG Digital Technews Publishing SMART Security Solutions Access Control & Identity Management Residential Estate (Industry)
Visitor management is always changing, taking technology and legislation into account. SMART Security Solutions examines the latest trends with input from ATG Digital and Entry Pro.

Read more...
Securing your estate beyond the gate
ATG Digital Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
Protecting gated communities and lifestyle estates requires a modern, intelligent approach. A truly intelligent system protects both physical and digital perimeters, it must be a fully integrated ecosystem.

Read more...
Reliability, innovation and flexibility
Entry Pro Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Through constant innovation and advancement in technology and systems, Entry Pro strives to provide its clients with not only the most suitable, but also the most advanced solution.

Read more...
Smarter security with automated visitor management
LD Africa Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Automated visitor management solutions, like LD Access, are transforming this process by reducing human workload, while enhancing security and efficiency.

Read more...
Paxton enhances installer loyalty programme
Paxton Access Control & Identity Management News & Events
Paxton has made it easier for security installers to benefit from its popular loyalty programme, Paxton Rewards, with points now added automatically when purchasing through approved distribution partners.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Rethinking access control in high-risk logistics environments
ATG Digital Access Control & Identity Management Transport (Industry) Logistics (Industry) Facilities & Building Management
South Africa’s logistics sector is under constant pressure, not only from external threats like hijackings and cargo theft, but also from internal vulnerabilities, operational blind spots, and limited support.

Read more...
Nice unveils MyNice Smartgo
News & Events Access Control & Identity Management
Nice SA has announced the release of MyNice Smartgo, a compact access automation solution, designed specifically for the South African market, combining an easy-to-install device with a user-friendly smartphone application.friendly smartphone application.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.