SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

What are the challenges of retrofits, and how can they be overcome?

1 Jul 2020

What are the challenges of retrofits, and how can they be overcome?
Larry Anderson
Larry Anderson
1 Jul 2020

Editor Introduction

Retrofit projects provide new levels of physical security modernisation to existing facilities. However, retrofits come with their own set of challenges that can frustrate system designers and defy the efforts of equipment manufacturers. We asked this week’s Expert Panel Roundtable: What are the biggest challenges of retrofit projects, and how can they be overcome?


Card image cap
Joseph Degrassi Genetec, Inc.

Any installation brings a unique set of challenges but none more than retrofit projects. Some part of an existing security infrastructure, whether video surveillance, access control, intercom etc., needs to be included in the new plan. Until a few years ago, most of these projects involved the integration of legacy proprietary technology which made the process even more challenging, often forcing customers into a situation where they would have to completely rip and replace their existing infrastructure. As organisations have realised the benefits of building their security infrastructure on open systems, some of these challenges are being mitigated. By installing open architecture systems, integrators can maximise usage of the infrastructure and make upgrades seamless. Working hand-in-hand with manufacturers they can convert their databases to ensure a smooth transition. As their infrastructure continues to grow, and needs evolve, an open architecture-based security system ensures that future upgrades are futureproof.

Card image cap
Rebecca Wormleighton Zendelity

A safety and security retrofit implies the digital transformation of a property’s equipment. Out with the old, in with the new, in pursuit of improved effectiveness. The biggest challenge will be designing a plan that works around the immovable and minimises the rip and replace. While it would be wonderful to start from scratch, it’s not always possible physically or financially, nor is it always necessary. For example, you don’t necessarily need the latest equipment – rather, a third party adaptor can be added to bring equipment up to date. To plan your retrofit, initially forget about the technology and focus on what you are trying to achieve. With a clearly outlined objective, it’s easier to identify what specifically needs to change. While you may find you need the latest equipment, you may also find you can achieve your objective with a change in how you manage physical operating risk. 

Card image cap
Adam Wynne Azena

While there are lots of challenges here, perhaps the biggest is adapting your system to the latest technologies. There’s a mentality of “if it’s not broke, don’t fix it,” which can lead to outdated technologies and increased risks. The challenge to retrofit projects then becomes how to convince people to make their technologies work seamlessly with existing technology – especially when trends such as video analytics and upgrades to VMS systems are at the forefront. While we can acknowledge the hassle of replacing current IP cameras with ones compatible with the latest technologies, doing so enables the end user to future-proof their system and eliminates the need to rip and replace.

Card image cap
Per Björkdahl ONVIF

One challenge with retrofits projects from analogue to digital is with the costs of replacing physical infrastructure. With analogue, installers could always reuse the cabling, as it becomes costly to redo all of it, along with switching to a new network. In the recovery of businesses, we might see companies who are short on cash, finding retrofit projects to be an extra financial issue. Very often, a security system is a “grudge investment,” as you won’t gain revenue from it, but it’s necessary for the security of your business. This could prove to be a larger issue, as budgets are tighter and will end up leaving companies vulnerable if they choose to wait a few years. However, those companies who chose to make the switch to IP will be able to take advantage of the emerging analytic technologies, which are being designed to assist in the reopening process.

Card image cap
Tony Smith IDL

With entrance control, retrofit projects occur for a number of reasons. If the security landscape changes and technology evolves, an upgrade might be necessary to ensure the system remains fit for purpose. Or, the client is refurbing their office and the turnstiles need replacing to complement the new aesthetic. Or, the client might be experiencing issues with their existing turnstiles and want to replace them. These are just three of the drivers behind entrance control retrofit projects. Each circumstance comes with unique challenges, but the fact that you’re working in an existing, inhabited environment, often with legacy systems, is the case for most. This means designing within the limitations of the existing space, having measures in place to prevent damage to interiors, installation during off-peak times to avoid user inconvenience and system downtime, and having to integrate existing disparate systems.

Card image cap
John Davies TDSi

There are many potential access control challenges. With credentials, for example, most end users will want to move away from 125 MHz proximity cards (which are unfortunately now cloneable) to more secure MIFARE Plus or DESfire systems. If a large number are required, how do you roll out replacements? Do you use dual tech readers that work with the older cards and new MIFARE cards, then issue these to new employees and all others on a gradual rollout basis? Will the newer credential work with existing controllers? Will the existing system integrate with all the other aspects of the security system? Should you adopt open protocol systems to futureproof the investment? In a nutshell, it is whether the legacy system can be successfully modernised whilst utilising as much of the legacy kit as possible, or do you need to start from scratch?

Card image cap
Thomas Schulz ASSA ABLOY Opening Solutions

Two challenges loom large over every retrofit: potential disruption to the building fabric and cost management. Both are magnified further when the site for retrofit is protected, whether by heritage preservation rules or because a business rents rather than owns the property. Traditional wired access control, of course, needs drilling and cabling, making installation expensive and sometimes damaging. Wired locks also have greater ongoing costs because they must draw power from the mains 24/7. Wireless locking is different. Devices are battery-powered and can be installed without any drilling around your doors. Ongoing costs are much reduced, with no electricity and less maintenance required. Multiple lock types are available to overcome this “costs and cabling” problem for almost any retrofit.  

Card image cap
Chris Hugman System Surveyor

From a system design perspective, outdated information can hamper retrofits. Often, companies do not have a complete or accurate list of each facility’s physical security components. Out-of-date license and maintenance records make the job even more challenging. Plans and details get lost in spreadsheets, applications, file cabinets, and employee’s heads. Blueprints and floor plans are a good starting point if available but are almost always outdated. Another hindrance is the typical paper and pencil process for conducting site surveys. One solution is to create a digital system of record for every retrofit project, starting with the first site walk. With all details in one place, projects go more quickly and smoothly throughout a site’s lifecycle. Any stakeholder should be able to easily make updates. Future projects are simplified, because the current staff always has access to a living, digital as-built for each customer.

Card image cap
Jeff Bransfield RS2 Technologies, LLC

The biggest challenge of retrofit projects is trying to combine new technology with the old. This presents a variety of challenges, as many manufacturers are proprietary so their solutions are unable to “talk” to solutions provided by other manufacturers. This drastically limits what the end user can do and, at times, it can force them into purchasing solutions that do not truly cater to their needs. Open source systems provide a level of flexibility that is unmatched by other options in the market. Instead of choosing a single hardware manufacturer, users can instead mix and match to receive a true “best-of-breed” solution. Software platforms that can incorporate various open integrations really allow for many choices to suit their needs. In addition, some companies allow integrators to interface with an open API to cater to unique client needs and requests to further expand upon product integration capabilities.

Card image cap
Brian Worrell Boon Edam

A great many of our security entrance projects are retrofits to existing buildings, and the biggest challenge usually revolves around the flooring in the facility. First, in any situation, the floor must be dead level for a security entrance to work properly. Second, all conduit and wiring for electrical, access control, and fire should be run through the floor for lobby turnstiles (security revolving doors and portals can potentially have wiring come down from the ceiling). Existing flooring configurations, especially when the floor is poured concrete and existing conduit is embedded, often requires breaking and removing the floor and installing the new wiring and conduit in the correct locations. This can add considerable expense to the project and is not a desired solution for historical buildings or higher end, aesthetic applications. One potential solution to this problem is to add special, above-grade platforms for the lobby turnstiles.


Editor Summary

The challenges of a retrofit project can be as unyielding as an immovable architectural feature. Retrofit difficulties can range from adapting existing infrastructure to dealing with building disruption during installation. Combining new technology with older, existing systems can be a bigger challenge than creating a new system on a blank sheet of paper. Cost can also inhibit retrofit projects. However, the resulting, more modern system operation is worth the extra stress. 

  • Related links
  • TDSi CCTV software
  • Verint CCTV software
  • TDSi IP cameras
  • Verint IP cameras
  • TDSi IP Dome cameras
  • Verint IP Dome cameras
  • Related categories
  • CCTV software
  • IP cameras
  • IP Dome cameras
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
IDIS launches new AI PTZ cameras for enhanced security

IDIS launches new AI PTZ cameras for enhanced security

Everon & Alarm.com unify commercial security solutions

Everon & Alarm.com unify commercial security solutions

Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Round table discussions
About this page

Explore retrofit challenges & solutions for optimising legacy security systems - ensuring seamless integration, cost-efficiencies, & compliance.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec