Considerations and best practices for migrating to an IP-based access control system

Migrating from an existing legacy Access Control System (ACS) to an Internet Protocol (IP) based ACS makes it easier for organisations to operate, expand, and customise their physical access control infrastructure, allows them to leverage new ACS capabilities, including efficient multi-site management and Power over Ethernet (PoE) technologies, and helps them to achieve significant reductions in their Total Cost of Ownership (TCO).

Undertaking a successful migration, however, requires planning and careful consideration. First, it is important to have a clear set of goals for a migration to ensure that an organisation chooses an IP ACS system designed to evolve over time and re-uses as much of the existing security infrastructure as possible. Then, before beginning to plan a migration, an organisation must evaluate their existing system in order to determine costs and time required for the migration. Finally, together with a systems integrator, it is important that an organisation follow a number of steps to realise a seamless and successful integration.

Migrating an existing centralised or distributed legacy Access Control System (ACS) to an Internet Protocol- based (IP) ACS has the distinct advantage of making it easier for an organisation to operate, expand, and customise their physical access control infrastructure.

What's inside?

  • Reasons for migrate to an IP-based access control system
  • Goals for a migration
  • The time required for IP-based ACS migration
  • Steps in the migration process
  • Genetec’s approach to migration
Register to download...

Thank you for submitting your information.

Thank you for your download. Please check your inbox shortly – the asset will be emailed to you.

No email? Please check your Junk or Clutter folders; your email is likely to have been delivered there. To prevent this happening again, please white list our domain @SourceSecurity.com. Instructions can be found here.

Thank you!

Your request has been sent to the company. A representative from the company will get in touch with you shortly via the email / phone number you have provided.

Have a great day!

SourceSecurity.com Team

Popular Whitepapers

Unify Your Security Communications with Access Control, Video Surveillance, and ALPR

Three simple ways to optimise your bandwidth management in video surveillance

Optimising video and access control integration with a next-generation security platform

3 reasons to migrate to a new access control system