Hosted and managed access control

October 2014 Access Control & Identity Management

The business world has been inundated with news about cloud computing and software as a service. In keeping with the advance of technology, the security industry is also incorporating aspects of cloud computing into its arsenal of services.

In the access and identity market, a trend to hosted and managed access control has developed, with service providers offering various solutions to take the requirement for the management and maintenance of access solutions away from customers, leaving them with only the benefits of the service.

Unfortunately, many of these services rely on Internet connections and therefore are not always popular in South Africa with its expensive and unreliable connectivity. Nevertheless, some service providers have adapted and still manage to offer managed or hosted services, delivering an access or T&A service to clients for a monthly fee, sometimes even incorporating the cost of the hardware and its maintenance into the cost.

Barry East, Impro Technologies.
Barry East, Impro Technologies.

When looking at access as a service, clients who want to have the service, but not the hassle that goes with it are often faced with the choice of a managed or hosted service. Hi-Tech Security Solutions asked Ernest Mallett from Tyco Security Products and Barry East from Impro Technologies to explain the difference and benefits of each.

Ernest Mallett, Tyco Security.
Ernest Mallett, Tyco Security.

Starting off, we asked what the difference is between a hosted service and a managed service. Mallett explains that the main difference between the two is in the management of the software. “With hosted access control, the management service provider (MSP), who is typically a dealer or integrator, provides the initial set-up and server hosting only. In managed access control, the MSP not only installs and hosts the instance of the software, but also manages and performs changes and updates to the customer’s system.”

With hosted access control, the MSP hosts the database, server applications and hardware infrastructure, and provides the initial set-up of the account and components. Customers access the software through a browser and/or mobile device to maintain and monitor their access control system, with the ability to manage such variables as adding an access card for a new employee or deleting a cardholder who has left the company. The MSP hosts the software for a monthly fee.

In a managed access control scenario, the MSP still hosts the software as in the hosted access scenario, but in addition, also manages any additional changes or updates for the system. With a managed access control system, the host, in this case the dealer or integrator adds and deletes cards for the client and so forth.

East expands, noting that a hosted solution refers to the fact that there is no requirement for server infrastructure at the local deployment point for the access control solution. “In other words, the site is still managed and administrated by the client, but the physical hardware that runs the service side of the application is hosted in the cloud. A managed access control service, in some instances can follow a cloud-based server deployment, but the administration of the system is managed by an offsite third party on behalf of the end users.”

Realistic for South Africa

In both of these scenarios, there is an element of offsite hosting, which requires some form of connectivity. As noted in the Access and Identity Management Round Table, printed earlier in this issue, these services are not generally popular in South Africa, but may be of value in smaller businesses.

Mallett confirms that this is not a huge business in South Africa at the moment. However, he notes there has been interest from some Tyco partners in deploying armed reaction and video monitoring, as well as hosted access control. “Property developers with multi-tenant environments also have started to see the value and have shown interest in hosted and managed access control.”

Coming at it from a different angle, East says these types of systems are being deployed all over South Africa, especially in the time and attendance market, but less in the larger enterprise market. “At this stage, most of the clients prefer to have localised control of their access control infrastructure, but globally it does seem to be a trend and I suspect as Internet connectivity and the like increase in South Africa, so adoption of cloud based computing will expand accordingly.”

What are the benefits?

The decision to move to a hosted solution is not unlike the decision by many companies to seek a third party to run their IT. As staffing shrinks and people are pulled in more directions, Mallett says questions are bound to arise: “Do we have the resources to stay on top of everything that is required to manage the security system, not only generating new cards and photo IDs or putting additional doors and elevators on line, but also backing up data, upgrading software and maintaining the equipment?”

Some data suggests that around 90% of companies are negligent when it comes to staying on top of systems updates and backups, which means a potential loss of important data and costly service calls when the computer housing their access control software fails and significant data is lost. A hosted solution allows staff to focus on the daily operation of the system while the rest is taken care of.

East says the main driver behind cloud-based computing is that the customer does not have to worry about continual physical server hardware and operating systems upgrades. “So the maintenance of the entire IT infrastructure is handled by a third party with a guaranteed high availability or 99.9% uptime. In the case of the Internet going down, certainly as far as Impro systems are concerned, all of our hardware operates with 100% intelligence and there is no need for service-side interaction in order for the site to continue to function fully. It would simply buffer transactions that occurred on the site and as soon as the service side application was back online, the transactions would migrate to the hosted solution.”

Mobility also plays a productivity role in these scenarios, according to Mallet. “Mobile applications allow users to remotely manage a multitude of everyday tasks, and security and access control is no exception. Similar to the Web portal, the advent of the smart phone and tablet, the creation of applications for these devices that link with the access control system has allowed administrators to execute tasks remotely that used to be handled in front of a computer screen. Everything from report generation to updating and managing ID cards to viewing event history can now be handled on a mobile device.”

Are small businesses the best clients?

As noted above, it seems that these solutions are optimal for smaller businesses that don’t want the responsibility or don’t have the skills for managing their own infrastructure.

“If training or hiring human resources to manage an access control system is prohibitively expensive, or if the appropriate personnel aren’t available to manage operations, a managed solution is a good option,” notes Mallett. “It places installation, maintenance and the more complex operational responsibilities upon the integrator/dealer. The user does not have to provide advanced training for its staff. Companies that may not be sure of their future locations or infrastructure can also benefit from a managed solution, as the solution can move with the company, regardless of the company’s location or specific personnel.”

The major benefits behind a hosted solution, according to East, is the fact that the ongoing cost to maintain a high availability IT infrastructure is now no longer borne by the customer. “A simple monthly rental ensures that all the service specifications and operating systems are maintained and the latest security patches etc. are automatically updated.

“So the main reason why people go for a hosted solution as has been seen in products such as Office 365, is because the cost of the IT infrastructure is no longer a capex cost borne by the customer.”

And while smaller companies are the best target for these types of services (but by no means the only targets), Mallett says there is additional interest arising from larger companies with multi-site locations or branches. Instead of having a separate access system at every branch, a managed system can ease the complexity and ensure standard access across all the locations.

Products on offer

Both Tyco and Impro are active in this market. Kantech, part of Tyco Security Products, offers the hattrix security services solution with three tiers of service: a hosted option, a fully managed solution or a hybrid of the two. This translates into significant advantages in flexibility and scalability, and reduces the infrastructure and training costs compared with other more traditional systems.

“With our hattrix solution, the data resides in secure, cloud-based servers, capacity is no longer an issue and scalability is achieved much more easily,” explains Mallett. “We don’t have to have the debate about servers and storage, as it is trumped by the fact that a system can now grow from 10 doors to 100 doors to 1000 or more and it doesn’t take a room full of hardware on site to achieve this.”

From Impro’s perspective, East says the company’s Access Portal range offers a managed solution. “We have not yet made the hosted solution commercially available in South Africa, however it is in our roadmap for the early part of 2015 to start deployment of a hosted Portal solution into a South African environment.”

For more information, go to: www.tycosecurityproducts.com, www.impro.net


Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The benefits of electronic visitor management
August 2019, Powell Tronics , Access Control & Identity Management, Residential Estate (Industry)
Access control is a critical aspect of estate security as it represents the controls put in place to restrict entry (and possibly exit) along the outer boundary of the location.

Read more...
Addressing risks by means of access control layout and design
August 2019 , Access Control & Identity Management, Security Services & Risk Management
In order to develop a suitable, practical and appropriate security system for any organisation, it is essential to first develop a master security and life safety plan strategy.

Read more...
Secure hands-free access
August 2019, Suprema , Access Control & Identity Management, Residential Estate (Industry)
Suprema’s facial biometric terminals bring no-touch access into secure residential estates, high-rise apartments and luxury homes providing fast, easy and intuitive user authentication with the added benefit of hygiene.

Read more...
MorphoAccess Sigma Extreme
August 2019, IDEMIA , Products, Access Control & Identity Management
MorphoAccess Sigma Extreme from IDEMIA is a touchscreen device with multiple recognition device interfaces (NFC chip reader, PIN and BioPIN codes, contactless card readers).

Read more...
Outdoor access terminals
August 2019, Suprema , Access Control & Identity Management, Residential Estate (Industry), Products
Rugged, dust- and weather-proof access control solutions that provide exceptional durability in extreme conditions is a strong requirement for many residential estates.

Read more...
MorphoWave Compact
August 2019, IDEMIA , Products, Access Control & Identity Management
The MorphoWave Compact captures and matches four fingerprints on either the right or left hand in any direction. It is robust to environmental factors such as extreme light or dust.

Read more...
MorphoAccess Sigma Lite
August 2019, IDEMIA , Products, Access Control & Identity Management
IDEMIA’s MorphoAccess Sigma Lite and Lite + are fingerprint access control terminals, offering time and attendance in and out function keys.

Read more...
Eliminating forced gate opening scenarios
August 2019, ET Nice , Home Security, Access Control & Identity Management
When activated by the gate forced open alarm feature, the transmitter transmits a wireless alarm signal up to 750 metres in any direction.

Read more...
IAM has business on high alert
August 2019 , Access Control & Identity Management
Identity and Access Management (IAM) is now a must in commerce and the need to protect digital assets is driving the development of solutions and widespread adoption

Read more...
Came acquires Turkish company Özak
August 2019, CAME BPT South Africa , News, Access Control & Identity Management
Came broadens its market horizons and signals growth and consolidation in the Middle East.

Read more...