Hosted and managed access control

1 October 2014 Access Control & Identity Management

The business world has been inundated with news about cloud computing and software as a service. In keeping with the advance of technology, the security industry is also incorporating aspects of cloud computing into its arsenal of services.

In the access and identity market, a trend to hosted and managed access control has developed, with service providers offering various solutions to take the requirement for the management and maintenance of access solutions away from customers, leaving them with only the benefits of the service.

Unfortunately, many of these services rely on Internet connections and therefore are not always popular in South Africa with its expensive and unreliable connectivity. Nevertheless, some service providers have adapted and still manage to offer managed or hosted services, delivering an access or T&A service to clients for a monthly fee, sometimes even incorporating the cost of the hardware and its maintenance into the cost.

Barry East, Impro Technologies.
Barry East, Impro Technologies.

When looking at access as a service, clients who want to have the service, but not the hassle that goes with it are often faced with the choice of a managed or hosted service. Hi-Tech Security Solutions asked Ernest Mallett from Tyco Security Products and Barry East from Impro Technologies to explain the difference and benefits of each.

Ernest Mallett, Tyco Security.
Ernest Mallett, Tyco Security.

Starting off, we asked what the difference is between a hosted service and a managed service. Mallett explains that the main difference between the two is in the management of the software. “With hosted access control, the management service provider (MSP), who is typically a dealer or integrator, provides the initial set-up and server hosting only. In managed access control, the MSP not only installs and hosts the instance of the software, but also manages and performs changes and updates to the customer’s system.”

With hosted access control, the MSP hosts the database, server applications and hardware infrastructure, and provides the initial set-up of the account and components. Customers access the software through a browser and/or mobile device to maintain and monitor their access control system, with the ability to manage such variables as adding an access card for a new employee or deleting a cardholder who has left the company. The MSP hosts the software for a monthly fee.

In a managed access control scenario, the MSP still hosts the software as in the hosted access scenario, but in addition, also manages any additional changes or updates for the system. With a managed access control system, the host, in this case the dealer or integrator adds and deletes cards for the client and so forth.

East expands, noting that a hosted solution refers to the fact that there is no requirement for server infrastructure at the local deployment point for the access control solution. “In other words, the site is still managed and administrated by the client, but the physical hardware that runs the service side of the application is hosted in the cloud. A managed access control service, in some instances can follow a cloud-based server deployment, but the administration of the system is managed by an offsite third party on behalf of the end users.”

Realistic for South Africa

In both of these scenarios, there is an element of offsite hosting, which requires some form of connectivity. As noted in the Access and Identity Management Round Table, printed earlier in this issue, these services are not generally popular in South Africa, but may be of value in smaller businesses.

Mallett confirms that this is not a huge business in South Africa at the moment. However, he notes there has been interest from some Tyco partners in deploying armed reaction and video monitoring, as well as hosted access control. “Property developers with multi-tenant environments also have started to see the value and have shown interest in hosted and managed access control.”

Coming at it from a different angle, East says these types of systems are being deployed all over South Africa, especially in the time and attendance market, but less in the larger enterprise market. “At this stage, most of the clients prefer to have localised control of their access control infrastructure, but globally it does seem to be a trend and I suspect as Internet connectivity and the like increase in South Africa, so adoption of cloud based computing will expand accordingly.”

What are the benefits?

The decision to move to a hosted solution is not unlike the decision by many companies to seek a third party to run their IT. As staffing shrinks and people are pulled in more directions, Mallett says questions are bound to arise: “Do we have the resources to stay on top of everything that is required to manage the security system, not only generating new cards and photo IDs or putting additional doors and elevators on line, but also backing up data, upgrading software and maintaining the equipment?”

Some data suggests that around 90% of companies are negligent when it comes to staying on top of systems updates and backups, which means a potential loss of important data and costly service calls when the computer housing their access control software fails and significant data is lost. A hosted solution allows staff to focus on the daily operation of the system while the rest is taken care of.

East says the main driver behind cloud-based computing is that the customer does not have to worry about continual physical server hardware and operating systems upgrades. “So the maintenance of the entire IT infrastructure is handled by a third party with a guaranteed high availability or 99.9% uptime. In the case of the Internet going down, certainly as far as Impro systems are concerned, all of our hardware operates with 100% intelligence and there is no need for service-side interaction in order for the site to continue to function fully. It would simply buffer transactions that occurred on the site and as soon as the service side application was back online, the transactions would migrate to the hosted solution.”

Mobility also plays a productivity role in these scenarios, according to Mallet. “Mobile applications allow users to remotely manage a multitude of everyday tasks, and security and access control is no exception. Similar to the Web portal, the advent of the smart phone and tablet, the creation of applications for these devices that link with the access control system has allowed administrators to execute tasks remotely that used to be handled in front of a computer screen. Everything from report generation to updating and managing ID cards to viewing event history can now be handled on a mobile device.”

Are small businesses the best clients?

As noted above, it seems that these solutions are optimal for smaller businesses that don’t want the responsibility or don’t have the skills for managing their own infrastructure.

“If training or hiring human resources to manage an access control system is prohibitively expensive, or if the appropriate personnel aren’t available to manage operations, a managed solution is a good option,” notes Mallett. “It places installation, maintenance and the more complex operational responsibilities upon the integrator/dealer. The user does not have to provide advanced training for its staff. Companies that may not be sure of their future locations or infrastructure can also benefit from a managed solution, as the solution can move with the company, regardless of the company’s location or specific personnel.”

The major benefits behind a hosted solution, according to East, is the fact that the ongoing cost to maintain a high availability IT infrastructure is now no longer borne by the customer. “A simple monthly rental ensures that all the service specifications and operating systems are maintained and the latest security patches etc. are automatically updated.

“So the main reason why people go for a hosted solution as has been seen in products such as Office 365, is because the cost of the IT infrastructure is no longer a capex cost borne by the customer.”

And while smaller companies are the best target for these types of services (but by no means the only targets), Mallett says there is additional interest arising from larger companies with multi-site locations or branches. Instead of having a separate access system at every branch, a managed system can ease the complexity and ensure standard access across all the locations.

Products on offer

Both Tyco and Impro are active in this market. Kantech, part of Tyco Security Products, offers the hattrix security services solution with three tiers of service: a hosted option, a fully managed solution or a hybrid of the two. This translates into significant advantages in flexibility and scalability, and reduces the infrastructure and training costs compared with other more traditional systems.

“With our hattrix solution, the data resides in secure, cloud-based servers, capacity is no longer an issue and scalability is achieved much more easily,” explains Mallett. “We don’t have to have the debate about servers and storage, as it is trumped by the fact that a system can now grow from 10 doors to 100 doors to 1000 or more and it doesn’t take a room full of hardware on site to achieve this.”

From Impro’s perspective, East says the company’s Access Portal range offers a managed solution. “We have not yet made the hosted solution commercially available in South Africa, however it is in our roadmap for the early part of 2015 to start deployment of a hosted Portal solution into a South African environment.”

For more information, go to: www.tycosecurityproducts.com, www.impro.net



Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...