Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Getting the Most from Your Legacy Access Control System

By Robert Laughlin
Security key pad
Jupiterimages / PHOTOS.com>> / Getty Images Plus / Via Getty Images

Jupiterimages / PHOTOS.com>> / Getty Images Plus / Via Getty Images

February 25, 2014

In a constantly evolving business environment, an increasingly popular strategy for organizations to achieve growth and market share is through acquisitions and mergers. Among the many challenges facing these new business situations is standardizing and/or upgrading the physical security systems to ensure enterprise-wide compatibility and efficiency. In many of these organizations, that process begins with the access control systems.

Updating Legacy Systems

Even just a few years ago, a “rip and replace” plan would have been the most feasible to bring uniformity to the enterprise. However, the availability today of best-in-breed access control solutions that enable legacy systems to be upgraded and/or integrated is resolving many of the issues and eliminating the need for an entire system replacement. What makes this solution even more viable is that new software solutions negate the need for concern regarding the brand of legacy hardware or system topography.

New software is the critical system enhancement component, and is by far the easiest component to deal with from an installation perspective. It also provides significant savings relative to equipment and installation costs, resulting in a higher return on investment and lower total cost of ownership.

Legacy systems are typically comprised of a series of controllers that have embedded software to control specific entrances. Essentially, the intelligence in the system is distributed to the access location entry points, with data sent back to a centralized location for system control. To upgrade this system, controllers are replaced and new remote interface cards are installed so that all operations are controlled centrally by an enterprise access control solution. In legacy access control systems that feature centralized architecture, all the system intelligence resides in the software. In most cases, these legacy systems are also most likely running on twisted pair cabling that can be utilized by the new system. This yields extremely high cost-efficiency as only the centralized software is being replaced at the head-end.

Addressing Growth Issues Today and Tomorrow

With new software solutions, even systems that span separate buildings in different locations can be efficiently upgraded – even if they have different hardware providers – by using one or both of the previously described methods. More importantly, disparate systems can be integrated without ripping and replacing costly hardware. The larger the deployments to be upgraded, the larger the incremental savings.

New software also holds the key for future growth of access control. This is especially true as users continue to employ access control systems for business operations beyond security, for example time and attendance or billable hours. Applications might include auto repair centers for accessing tool vending cabinets; verifying time for grounds maintenance crews; behavioral or usage tracking; and so on.

In a specific application, a school in Connecticut was looking for a better way to manage student traffic between a large number of portable classrooms being used while a new facility was constructed. One of the main concerns centered on children using restrooms and other facilities located in the main school building throughout the course of the day. School administrators wanted a way to efficiently track student movements beyond issuing conventional written hall passes. A feature called “Hall Pass” was developed that provides teachers with proximity devices they issue in lieu of conventional hall passes. Through the placement of access readers in the classrooms and at all entrances to the main school building, students are monitored with a predetermined amount of time to walk from their classroom to the building. If a student fails to report in the allocated time period, the system issues a general alert.

New access control and management technologies on the market today promise dramatic improvements in performance and efficiency. It’s to the benefit of both users and system integrators that these new technologies are also capable of maintaining legacy support and providing enhancements to pre-existing systems.

KEYWORDS: hybrid security systems rip and replace security efficiency security software

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Robert Laughlin, President, Galaxy Control Systems

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • install-enews

    10 Things to Require from Your Access Control Provider

    See More
  • Access keypad on brick wall

    Why It’s Time to Move on From Legacy Access Control Systems

    See More
  • Person holding phone to smart lock

    Why it’s Time to Move on From Legacy Access Control Systems

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

See More Products

Events

View AllSubmit An Event
  • July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    ON DEMAND: What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo. Learn how this dynamic public environment leverages cutting-edge security technologies to protect people, animals and assets.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing