Hosted and managed access control

October 2014 Access Control & Identity Management

The business world has been inundated with news about cloud computing and software as a service. In keeping with the advance of technology, the security industry is also incorporating aspects of cloud computing into its arsenal of services.

In the access and identity market, a trend to hosted and managed access control has developed, with service providers offering various solutions to take the requirement for the management and maintenance of access solutions away from customers, leaving them with only the benefits of the service.

Unfortunately, many of these services rely on Internet connections and therefore are not always popular in South Africa with its expensive and unreliable connectivity. Nevertheless, some service providers have adapted and still manage to offer managed or hosted services, delivering an access or T&A service to clients for a monthly fee, sometimes even incorporating the cost of the hardware and its maintenance into the cost.

Barry East, Impro Technologies.
Barry East, Impro Technologies.

When looking at access as a service, clients who want to have the service, but not the hassle that goes with it are often faced with the choice of a managed or hosted service. Hi-Tech Security Solutions asked Ernest Mallett from Tyco Security Products and Barry East from Impro Technologies to explain the difference and benefits of each.

Ernest Mallett, Tyco Security.
Ernest Mallett, Tyco Security.

Starting off, we asked what the difference is between a hosted service and a managed service. Mallett explains that the main difference between the two is in the management of the software. “With hosted access control, the management service provider (MSP), who is typically a dealer or integrator, provides the initial set-up and server hosting only. In managed access control, the MSP not only installs and hosts the instance of the software, but also manages and performs changes and updates to the customer’s system.”

With hosted access control, the MSP hosts the database, server applications and hardware infrastructure, and provides the initial set-up of the account and components. Customers access the software through a browser and/or mobile device to maintain and monitor their access control system, with the ability to manage such variables as adding an access card for a new employee or deleting a cardholder who has left the company. The MSP hosts the software for a monthly fee.

In a managed access control scenario, the MSP still hosts the software as in the hosted access scenario, but in addition, also manages any additional changes or updates for the system. With a managed access control system, the host, in this case the dealer or integrator adds and deletes cards for the client and so forth.

East expands, noting that a hosted solution refers to the fact that there is no requirement for server infrastructure at the local deployment point for the access control solution. “In other words, the site is still managed and administrated by the client, but the physical hardware that runs the service side of the application is hosted in the cloud. A managed access control service, in some instances can follow a cloud-based server deployment, but the administration of the system is managed by an offsite third party on behalf of the end users.”

Realistic for South Africa

In both of these scenarios, there is an element of offsite hosting, which requires some form of connectivity. As noted in the Access and Identity Management Round Table, printed earlier in this issue, these services are not generally popular in South Africa, but may be of value in smaller businesses.

Mallett confirms that this is not a huge business in South Africa at the moment. However, he notes there has been interest from some Tyco partners in deploying armed reaction and video monitoring, as well as hosted access control. “Property developers with multi-tenant environments also have started to see the value and have shown interest in hosted and managed access control.”

Coming at it from a different angle, East says these types of systems are being deployed all over South Africa, especially in the time and attendance market, but less in the larger enterprise market. “At this stage, most of the clients prefer to have localised control of their access control infrastructure, but globally it does seem to be a trend and I suspect as Internet connectivity and the like increase in South Africa, so adoption of cloud based computing will expand accordingly.”

What are the benefits?

The decision to move to a hosted solution is not unlike the decision by many companies to seek a third party to run their IT. As staffing shrinks and people are pulled in more directions, Mallett says questions are bound to arise: “Do we have the resources to stay on top of everything that is required to manage the security system, not only generating new cards and photo IDs or putting additional doors and elevators on line, but also backing up data, upgrading software and maintaining the equipment?”

Some data suggests that around 90% of companies are negligent when it comes to staying on top of systems updates and backups, which means a potential loss of important data and costly service calls when the computer housing their access control software fails and significant data is lost. A hosted solution allows staff to focus on the daily operation of the system while the rest is taken care of.

East says the main driver behind cloud-based computing is that the customer does not have to worry about continual physical server hardware and operating systems upgrades. “So the maintenance of the entire IT infrastructure is handled by a third party with a guaranteed high availability or 99.9% uptime. In the case of the Internet going down, certainly as far as Impro systems are concerned, all of our hardware operates with 100% intelligence and there is no need for service-side interaction in order for the site to continue to function fully. It would simply buffer transactions that occurred on the site and as soon as the service side application was back online, the transactions would migrate to the hosted solution.”

Mobility also plays a productivity role in these scenarios, according to Mallet. “Mobile applications allow users to remotely manage a multitude of everyday tasks, and security and access control is no exception. Similar to the Web portal, the advent of the smart phone and tablet, the creation of applications for these devices that link with the access control system has allowed administrators to execute tasks remotely that used to be handled in front of a computer screen. Everything from report generation to updating and managing ID cards to viewing event history can now be handled on a mobile device.”

Are small businesses the best clients?

As noted above, it seems that these solutions are optimal for smaller businesses that don’t want the responsibility or don’t have the skills for managing their own infrastructure.

“If training or hiring human resources to manage an access control system is prohibitively expensive, or if the appropriate personnel aren’t available to manage operations, a managed solution is a good option,” notes Mallett. “It places installation, maintenance and the more complex operational responsibilities upon the integrator/dealer. The user does not have to provide advanced training for its staff. Companies that may not be sure of their future locations or infrastructure can also benefit from a managed solution, as the solution can move with the company, regardless of the company’s location or specific personnel.”

The major benefits behind a hosted solution, according to East, is the fact that the ongoing cost to maintain a high availability IT infrastructure is now no longer borne by the customer. “A simple monthly rental ensures that all the service specifications and operating systems are maintained and the latest security patches etc. are automatically updated.

“So the main reason why people go for a hosted solution as has been seen in products such as Office 365, is because the cost of the IT infrastructure is no longer a capex cost borne by the customer.”

And while smaller companies are the best target for these types of services (but by no means the only targets), Mallett says there is additional interest arising from larger companies with multi-site locations or branches. Instead of having a separate access system at every branch, a managed system can ease the complexity and ensure standard access across all the locations.

Products on offer

Both Tyco and Impro are active in this market. Kantech, part of Tyco Security Products, offers the hattrix security services solution with three tiers of service: a hosted option, a fully managed solution or a hybrid of the two. This translates into significant advantages in flexibility and scalability, and reduces the infrastructure and training costs compared with other more traditional systems.

“With our hattrix solution, the data resides in secure, cloud-based servers, capacity is no longer an issue and scalability is achieved much more easily,” explains Mallett. “We don’t have to have the debate about servers and storage, as it is trumped by the fact that a system can now grow from 10 doors to 100 doors to 1000 or more and it doesn’t take a room full of hardware on site to achieve this.”

From Impro’s perspective, East says the company’s Access Portal range offers a managed solution. “We have not yet made the hosted solution commercially available in South Africa, however it is in our roadmap for the early part of 2015 to start deployment of a hosted Portal solution into a South African environment.”

For more information, go to: www.tycosecurityproducts.com, www.impro.net


Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managing staff effectively
September 2019, dormakaba South Africa, iPulse Systems , Integrated Solutions, Access Control & Identity Management
Workforce management solutions allow organisations to track the relationship between productivity and the cost of employment, incorporating issues such as health and safety, T&A, rostering and more.

Read more...
Hennie Lategan joins Centurion as head of exports
September 2019, Centurion Systems , News, Access Control & Identity Management
Centurion Systems has announced the appointment of Hennie Lategan as the head of the company’s exports department.

Read more...
New AlproMAX7 secures maximum rating
September 2019 , Access Control & Identity Management, Products
Alpro has launched a new range of ultra-secure mechanical mortice deadlocks, the AlproMAX7 which comply with BS EN 12209.

Read more...
ViRDI UBio Tab 5
September 2019 , Access Control & Identity Management, Products
ViRDI Distribution SA (ViRDI Africa) has announced the release of its long-awaited UBio Tablet to the South African market.

Read more...
Visitor access control at Ruimsig Country Club
September 2019, Elvey Security Technologies , Access Control & Identity Management, Products
Cost-effective access control solution that would control the ingress and egress of people, without hindering the traffic throughput of members.

Read more...
Estate-focused visitor management solution
September 2019, Vox Telecom , Access Control & Identity Management, Residential Estate (Industry)
Vox has expanded its cloud-based visitor management solution to cater specifically for the needs of small multi-dwelling unit estates and large residential estates.

Read more...
Biometrics control airport railroad
September 2019, Suprema , Access Control & Identity Management
63 km railroad to Incheon Airport is centrally controlled and secured by Suprema biometric hardware and software.

Read more...
Dual energy X-ray inspection system
September 2019, Regal Distributors SA , Products, Access Control & Identity Management
The ZKX6550 X-ray inspection system increases the operator's ability to identify potential threats; the device is designed to scan briefcases, carry-on baggage, small cargo parcels.

Read more...
ZKTeco parking barrier
September 2019, Regal Distributors SA , Products, Access Control & Identity Management
The PB3000 parking barrier is an ideal automatic car park barrier for parking lot and security control; it can easily integrate with revenue collection and access control systems.

Read more...
ZKTeco automatic bollard
September 2019, Regal Distributors SA , Products, Access Control & Identity Management
The high-quality automatic bollard is used to protect security areas from vehicle intrusion; in case of power failure, the bollard can be lowered manually.

Read more...