Pitfalls to avoid when migrating to an enterprise solution

Access & Identity Management Handbook 2014 Access Control & Identity Management

An enterprise system can mean different things to different people. In this instance we are defining an enterprise system as maintaining central control over an entire access control system, while each local facility maintains independent control of its individual operations.

Its power gives system administrators at the main facility the ability to configure and monitor all locations from that single site. It also allows them to simultaneously monitor alarms from multiple facilities from one convenient workstation. Whether your organisation consists of a few facilities that are locally dispersed or many that span the globe, an enterprise solution scales as your company grows.

The main factor to keep in mind when you begin to plan the migration to an enterprise access control solution is preparation. You need to know what resources are available to you, who the key players are to help you in this process, and how to develop a solid plan to get the system up and running successfully.

When migrating to an enterprise system, you will want to avoid the following pitfalls:

1. Failure to define the ‘operational paradigm’.

2. Failure to define performance and scalability expectations.

3. Poor coordination between multiple vendors.

4. Moving data without a plan.

5. Poor preparation for the unknown.

1. Failure to define the ‘operational paradigm’

Define the operational paradigm for:

* Administrative processes.

* Reporting.

* Monitoring and control experience (graphical expectations).

There are some critical questions that you will want to answer as you begin a migration to an enterprise access control system. Are you able to improve the administrative and monitoring workflow? Will this process improve the overall operation? How will you be able to leverage the new technology? Ultimately, this is the perfect time to define existing pain points up front and not wait until the end of the project. Take a close look at your existing model or old technology. What reports can you take advantage of? What should be updated? With the migration to an enterprise system you will have an increased amount of alarm monitoring capabilities and you should incorporate them into your workflow. You will want to utilise existing habits and leverage new features. It has been our experience that the migration process offers the owner an opportunity to review and ultimately clean up their existing database which has been subjected to years of management by different people.

It is also key to streamline reporting before you begin this type of project. Your business has information everywhere – information about people, policies, ideas, and money. That kind of information is what drives a business’ success – or its downfall if not harvested, organised, and managed properly. How much data will you need to retain? What was your previous journal management process? Will you need to move previous journals for future reporting? All of these reporting questions are important to answer before migrating to an enterprise system. Advanced reporting solutions such as Software House’s Business Intelligence Reporting Suite (BIRS) are designed to harvest and organise your business information properly.

2. Failure to define performance and scalability expectations

Every system has a limit. Understanding the volume of activity that you are planning to put through your enterprise will allow for proper definition of the overall system architecture. One of the key elements of this analysis is the understanding of input activity such as Door State Monitor or Request to Exit traffic. Software House’s Smart Services can assist in obtaining this data from existing systems as you move to an enterprise solution.

3. Poor coordination between multiple vendors

An enterprise system incorporates collaboration from multiple departments. The system runs across many facilities and requires coordination from multiple vendors. It is crucial to clearly communicate with all vendors, departments, and any other external groups that may be involved in the migration process. One should expect to have the key integrator(s), IT, and Software House Smart Services involved in the migration process.

The integrators will be called in to install all of your various applications including fire, security, CCTV, intrusion, visitor management and any others that you would like to include in your overall system. It is also important to incorporate version control and user experience to ensure that the integrations run smoothly.

Your IT team will help you move to a virtual environment. They are the experts who fully understand the IT environment and what needs to be monitored during the migration.

Software House’s Smart Services team will work with you to perform the pre-migration audit. They will audit all of your existing systems to assess rogue inputs and outputs or any other errors in the system. They will help identify potential problems within your existing database that could be taking up additional space. They will also identify hidden information that is not logged to the journal.

For example, a past user may have configured a point to not record to the journal because it was creating excessive traffic, making it easier to shut off rather than solving the core issue. Or an input point was removed from the database but not from the controller. The pre-migration audit will help identify: broken hardware, credentials that may not need to be moved from one system to another and un-trusted points (service related reports). If a point has not gone active in the past two years, is it really reliable? During the audit, Smart Services professionals will discover all of these errors in the existing system and help you solve them before the migration.

4. Moving data without a plan

Migrating from your existing access control system to an enterprise solution requires a solid plan. You will need to form a team. Who is going to set this up? Who will maintain the enterprise system and data once it is running? Your team should include individuals from human resources, security operations, IT, and server management. It is very important that you, or someone you designate, carefully coordinate between all of these people.

Once you have identified the team you will need to assign task owners. This should be clearly documented in a master schedule, which also defines the deliverables for each individual team member. These deliverables will include import and export requirements, report requirements and owners of the data. This will also allow you to determine any issues that may have arose from the imported training information. These issues may be stored in a separate location until identified and an import solution is put in place to properly handle the update of personnel and credentials.

5. Poor preparation for the unknown

Poor preparation for the unknown is the final pitfall to avoid when implementing an enterprise level access control system. By fully understanding your complete system and everything surrounding it, you will better be able to visualise the potential risk factors. Be aware of firewalls, virus protection, malware, backups, high availability, data sources, desktop policies, upgrade policies, and more. The pre-audit of all hardware components will help you determine a part of this as well. You should have your plan in place and know what details you want to include ahead of time. These steps will help you prepare for potential issues and maximise the success of your migration.

For more information contact Tyco Security Products, +27 (0)82 566 5274,  emallett@tycoint.com www.tycosecurityproducts.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.