Pitfalls to avoid when migrating to an enterprise solution

Access & Identity Management Handbook 2014 Access Control & Identity Management

An enterprise system can mean different things to different people. In this instance we are defining an enterprise system as maintaining central control over an entire access control system, while each local facility maintains independent control of its individual operations.

Its power gives system administrators at the main facility the ability to configure and monitor all locations from that single site. It also allows them to simultaneously monitor alarms from multiple facilities from one convenient workstation. Whether your organisation consists of a few facilities that are locally dispersed or many that span the globe, an enterprise solution scales as your company grows.

The main factor to keep in mind when you begin to plan the migration to an enterprise access control solution is preparation. You need to know what resources are available to you, who the key players are to help you in this process, and how to develop a solid plan to get the system up and running successfully.

When migrating to an enterprise system, you will want to avoid the following pitfalls:

1. Failure to define the ‘operational paradigm’.

2. Failure to define performance and scalability expectations.

3. Poor coordination between multiple vendors.

4. Moving data without a plan.

5. Poor preparation for the unknown.

1. Failure to define the ‘operational paradigm’

Define the operational paradigm for:

* Administrative processes.

* Reporting.

* Monitoring and control experience (graphical expectations).

There are some critical questions that you will want to answer as you begin a migration to an enterprise access control system. Are you able to improve the administrative and monitoring workflow? Will this process improve the overall operation? How will you be able to leverage the new technology? Ultimately, this is the perfect time to define existing pain points up front and not wait until the end of the project. Take a close look at your existing model or old technology. What reports can you take advantage of? What should be updated? With the migration to an enterprise system you will have an increased amount of alarm monitoring capabilities and you should incorporate them into your workflow. You will want to utilise existing habits and leverage new features. It has been our experience that the migration process offers the owner an opportunity to review and ultimately clean up their existing database which has been subjected to years of management by different people.

It is also key to streamline reporting before you begin this type of project. Your business has information everywhere – information about people, policies, ideas, and money. That kind of information is what drives a business’ success – or its downfall if not harvested, organised, and managed properly. How much data will you need to retain? What was your previous journal management process? Will you need to move previous journals for future reporting? All of these reporting questions are important to answer before migrating to an enterprise system. Advanced reporting solutions such as Software House’s Business Intelligence Reporting Suite (BIRS) are designed to harvest and organise your business information properly.

2. Failure to define performance and scalability expectations

Every system has a limit. Understanding the volume of activity that you are planning to put through your enterprise will allow for proper definition of the overall system architecture. One of the key elements of this analysis is the understanding of input activity such as Door State Monitor or Request to Exit traffic. Software House’s Smart Services can assist in obtaining this data from existing systems as you move to an enterprise solution.

3. Poor coordination between multiple vendors

An enterprise system incorporates collaboration from multiple departments. The system runs across many facilities and requires coordination from multiple vendors. It is crucial to clearly communicate with all vendors, departments, and any other external groups that may be involved in the migration process. One should expect to have the key integrator(s), IT, and Software House Smart Services involved in the migration process.

The integrators will be called in to install all of your various applications including fire, security, CCTV, intrusion, visitor management and any others that you would like to include in your overall system. It is also important to incorporate version control and user experience to ensure that the integrations run smoothly.

Your IT team will help you move to a virtual environment. They are the experts who fully understand the IT environment and what needs to be monitored during the migration.

Software House’s Smart Services team will work with you to perform the pre-migration audit. They will audit all of your existing systems to assess rogue inputs and outputs or any other errors in the system. They will help identify potential problems within your existing database that could be taking up additional space. They will also identify hidden information that is not logged to the journal.

For example, a past user may have configured a point to not record to the journal because it was creating excessive traffic, making it easier to shut off rather than solving the core issue. Or an input point was removed from the database but not from the controller. The pre-migration audit will help identify: broken hardware, credentials that may not need to be moved from one system to another and un-trusted points (service related reports). If a point has not gone active in the past two years, is it really reliable? During the audit, Smart Services professionals will discover all of these errors in the existing system and help you solve them before the migration.

4. Moving data without a plan

Migrating from your existing access control system to an enterprise solution requires a solid plan. You will need to form a team. Who is going to set this up? Who will maintain the enterprise system and data once it is running? Your team should include individuals from human resources, security operations, IT, and server management. It is very important that you, or someone you designate, carefully coordinate between all of these people.

Once you have identified the team you will need to assign task owners. This should be clearly documented in a master schedule, which also defines the deliverables for each individual team member. These deliverables will include import and export requirements, report requirements and owners of the data. This will also allow you to determine any issues that may have arose from the imported training information. These issues may be stored in a separate location until identified and an import solution is put in place to properly handle the update of personnel and credentials.

5. Poor preparation for the unknown

Poor preparation for the unknown is the final pitfall to avoid when implementing an enterprise level access control system. By fully understanding your complete system and everything surrounding it, you will better be able to visualise the potential risk factors. Be aware of firewalls, virus protection, malware, backups, high availability, data sources, desktop policies, upgrade policies, and more. The pre-audit of all hardware components will help you determine a part of this as well. You should have your plan in place and know what details you want to include ahead of time. These steps will help you prepare for potential issues and maximise the success of your migration.

For more information contact Tyco Security Products, +27 (0)82 566 5274,  [email protected] www.tycosecurityproducts.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...