Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Hello to the Future of POE

By Joel Jensen
January 1, 2010

Why am I hearing so much chatter over Power-Over-Ethernet access control? I don’t have it, but should I?

Power-Over-Ethernet (POE) access control devices have been around for about two years. There are numerous reference sources detailing POE video and access control applications and information on the basics of system architecture and beyond.

When I started working with security video and card access in the late 1980’s, installation costs consumed an inordinate percentage of system installations. We were creating a dedicated standalone card access network and a standalone security video network. This was all accomplished using various forms of copper wiring. Access control networks at the time were quite primitive and shared some characteristics of large fire alarm systems from that era. The bulk of security video infrastructure was Coax cable – not exactly a network.

A major installation cost savings was introduced to both the access control market when the ability to utilize IP technology to communicate between traditional access control panels and their head ends. Goodbye dedicated network. The same technology jump introduced a radical change in the way video could be deployed as well.

Jump to today. POE IP video cameras are commonplace. POE access control hardware and systems offerings are growing in variety and configuration and may include locking hardware options that are not designed, necessarily, to work with specific access control systems and/or software. That alone provides an opportunity to consider introducing POE technology to an existing traditional access control system.

I’m avoiding labeling the systems that are so familiar to those of us who have been working with access control technology as “legacy.” This topology is still being produced and deployed right now. If you are at a point of deploying your first system, you should be looking at the pros and cons of traditional systems to the relatively new POE systems before making a final decision on a platform on which to build your system. I’m fortunate to have an entire facility with 100-percent POE network infrastructure complete with backup power supplies and generators. Communications, video and soon, POE access control is a great fit at my facilities. If there was not a reliable POE network with full backup power, POE card access really would not be an option for me.

Traditional card access systems rely on batteries located inside the panels for backup power and for panel memory back up power. POE systems rely on the network for primary and backup power. It is the latter that is a strong plus in the pro column for a POE system, as is yet another, potentially major, reduction in installation costs.

So, like many of you, I manage a large system that is based on a traditional access control platform that is also integrated with video. Can I replace this system all at one time with a POE based system? Why would I? Is that even possible? In my case, I have no reason to replace existing hardware and it would not be financially or operationally possible. My traditional hardware is adaptive to software upgrades and feature additions, but what about future installations?

A challenge for me is how to deploy a one or two door installation in a building, especially where the likelihood of expansion of the system is unlikely. This is where the cost of a traditional main control panel and door controllers drive the average price per door far above the average. What has often been applied to the situations is somewhat of a compromise in my opinion. While applying physical security best practices the compromise equipment does not reside on the main integrated system. Such applications are screaming apply POE access control technology!

How do I integrate POE access control technology with my existing system? I’m certain that I don’t want to duplicate databases. Fortunately, I no longer need to engineer and specify all of this technology, as was the case at the beginning of my career.

Here is where I turn first to the networking experts in the group. There has been more than one POE standard since it appeared on the scene, and those standards will continue to change. Before any decisions can be made to adopt additional network based security installations, the networking group needs to review the various door hardware and POE system network requirements. Do we meet them? 

Could we meet them at a reasonable cost?

This is the luxury of managing access control and video in the 21st century. There are security integrators that either have the knowledge or have access to those with the expertise to suggest options for IP based security technology. Don’t have a network manager or team? Most security integrators do.
Do I need to keep current on best practices and the technology options available? Yes, I do! It’s my name and reputation, as well our shared reputation as security professionals that will be on the line when the system rolls out. We all have something to bring to the table on technology decisions, even without having an interest in how it works or why. We have colleagues to turn to and publications such as this magazine to keep us informed. Remember that copper coax and primitive data cable I mentioned earlier? POE operates on that same trusty copper, just in a different form factor. Still reliable and perhaps a comfort factor for many of us…

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joel Jensen is the associate director of security at Minnesota State University, Mankato, and in addition, serves as the system administrator and project manager for the University’s access control system, radio communications systems and two networked video systems.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Electronic Access Control Systems: The Foundation of Your PSIM

    See More
  • The Best of Three

    See More
  • Open Dialogue to Keep Cost Down

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing