Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

How to Evaluate Your Choices for Legacy Systems

By Kim Rahfaldt
November 26, 2013

You’ve reached the stage where it’s time to consider a new security system. The system you have works well enough; it might be outdated, slow or at its maximum capacity for growth, but it still does the job. Replacement parts and service is getting increasingly harder to obtain and site support software agreements are increasing in price, but it’s not quite bad enough to pull the plug and start over. Or is it?

How do you know when it’s time to make a change? What choices do you have? Let’s examine the pros and cons of the different choices.

Keeping your Existing System – The Pros and Cons

There are many pros to keeping your existing system. First, you skip the tedious and intense process of re-evaluating and assessing your company’s security needs. This time-intensive process can take months and often involves counterparts from other departments. Once the assessment is finished, you must research numerous access control systems on the market to determine which one is best. This includes hearing presentations from several companies, learning about their systems and figuring out what the best fit is for your needs… and budget. As an added advantage, if you keep your current system you eliminate the need to write that dreaded purchase order and come up with the budget for a large upfront cost.

Third, your current system is familiar, and the security team doesn’t have to learn a new system. You don’t need to invest in training.

Lastly, you skip the system downtime that normally accompanies a large installation.

However, using an older system often presents frustration on a daily basis. The security system is antiquated and hasn’t met your organization’s security requirements for a long time. Older systems tend to incur higher costs with expensive out-of-date replacement parts just to keep the system running. Oftentimes parts may no longer be available or they are discontinued by the manufacturer, leaving you to scramble or make-do with what you have, possibly compromising the security of your building(s), employees and assets.

Older systems reach their expansion limits and can no longer grow with you. If you need to add readers, cameras or cardholders, you can’t because your system simply can’t handle it. Areas are left unsecured, and in this day and age, taking that gamble can be dangerous.

Older systems also can’t support the latest technology, or integrate with third-party manufacturer’s systems because their system is out of date.

Starting Over with New System – The Pros and Cons

A brand new state-of-the-art security system will offer the latest technology solutions available, and it should provide you with all the features you need to secure your facility. The current software and hardware should meet every security requirement on your list and grow with your company for years to come. The system should also have the capability to integrate with the latest security technologies and building management functions to provide streamlined processes, help with green building initiatives and provide optimum security.

Before purchasing that new security system, it’s essential to thoroughly assess your company’s security requirements and evaluate what technology is specific to your needs. Often a committee is established to determine the different areas needing assessment such as IT, security, HR, etc. The evaluation process is lengthy and often takes months to perform and complete. Once the committee knows what it needs, it must evaluate the different security systems on the market to determine the best solution. This can also be very time-consuming.

Starting over with a new system is expensive and requires a large up-front budget. Allocating the budget and getting costs approved takes time and a company-wide commitment. Once the budget is approved and the system finally chosen, it can take months to install, causing a disruption in service and inconvenience to employees.

Installing a Retrofit – Migrate Part of your System – The Pros and Cons

Upgrading your current security system to a retrofit solution could be the best option to keep costs low and minimize disruptions in service and training. A system retrofit is quick, easy and much more affordable than starting over with a new system. When you upgrade, you might be able to use your existing network infrastructure, including wiring, which saves money on labor costs. You could reuse your existing card readers, cards and enclosures, saving even more money. With a retrofit solution, you can also maintain your existing database population and eliminate hours of re-entering data.

While a retrofit solution will require transition time during the hardware and software migration, some change-overs have very little to no down time at all. Once the system is fully functional, security staff will need training to learn the new system. These cons of a retrofit solution can be planned for in advance and in stages over time as needed.

With a retrofit, you get all the benefits of a new system: state-of-the-art hardware and software, up-to-date technology features that make securing your system easy, and a system with the ability to grow with your organization for the next 15 years or longer.

The pros and cons vary greatly when deciding whether or not to rip out an old system and replace with a new one, or install a retrofit solution. Examine your needs and budget, do your research and determine what’s best for your company.

KEYWORDS: legacy security security budget security retrofit upgrading security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kim Rahfaldt is Public Relations Manager for AMAG Technology

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • How to Find Solutions for Legacy Systems

    See More
  • Old PC

    3 Things to Understand About Legacy Hardware Systems to Protect Your Data

    See More
  • customer service

    How to Evaluate Your Access Control Provider’s Customer Service

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • SSCP.jpg

    SSCP Systems Security Certified Practitioner Practice Exams

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing