Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

How to Evaluate Your Choices for Legacy Systems

By Kim Rahfaldt
November 26, 2013

You’ve reached the stage where it’s time to consider a new security system. The system you have works well enough; it might be outdated, slow or at its maximum capacity for growth, but it still does the job. Replacement parts and service is getting increasingly harder to obtain and site support software agreements are increasing in price, but it’s not quite bad enough to pull the plug and start over. Or is it?

How do you know when it’s time to make a change? What choices do you have? Let’s examine the pros and cons of the different choices.

Keeping your Existing System – The Pros and Cons

There are many pros to keeping your existing system. First, you skip the tedious and intense process of re-evaluating and assessing your company’s security needs. This time-intensive process can take months and often involves counterparts from other departments. Once the assessment is finished, you must research numerous access control systems on the market to determine which one is best. This includes hearing presentations from several companies, learning about their systems and figuring out what the best fit is for your needs… and budget. As an added advantage, if you keep your current system you eliminate the need to write that dreaded purchase order and come up with the budget for a large upfront cost.

Third, your current system is familiar, and the security team doesn’t have to learn a new system. You don’t need to invest in training.

Lastly, you skip the system downtime that normally accompanies a large installation.

However, using an older system often presents frustration on a daily basis. The security system is antiquated and hasn’t met your organization’s security requirements for a long time. Older systems tend to incur higher costs with expensive out-of-date replacement parts just to keep the system running. Oftentimes parts may no longer be available or they are discontinued by the manufacturer, leaving you to scramble or make-do with what you have, possibly compromising the security of your building(s), employees and assets.

Older systems reach their expansion limits and can no longer grow with you. If you need to add readers, cameras or cardholders, you can’t because your system simply can’t handle it. Areas are left unsecured, and in this day and age, taking that gamble can be dangerous.

Older systems also can’t support the latest technology, or integrate with third-party manufacturer’s systems because their system is out of date.

Starting Over with New System – The Pros and Cons

A brand new state-of-the-art security system will offer the latest technology solutions available, and it should provide you with all the features you need to secure your facility. The current software and hardware should meet every security requirement on your list and grow with your company for years to come. The system should also have the capability to integrate with the latest security technologies and building management functions to provide streamlined processes, help with green building initiatives and provide optimum security.

Before purchasing that new security system, it’s essential to thoroughly assess your company’s security requirements and evaluate what technology is specific to your needs. Often a committee is established to determine the different areas needing assessment such as IT, security, HR, etc. The evaluation process is lengthy and often takes months to perform and complete. Once the committee knows what it needs, it must evaluate the different security systems on the market to determine the best solution. This can also be very time-consuming.

Starting over with a new system is expensive and requires a large up-front budget. Allocating the budget and getting costs approved takes time and a company-wide commitment. Once the budget is approved and the system finally chosen, it can take months to install, causing a disruption in service and inconvenience to employees.

Installing a Retrofit – Migrate Part of your System – The Pros and Cons

Upgrading your current security system to a retrofit solution could be the best option to keep costs low and minimize disruptions in service and training. A system retrofit is quick, easy and much more affordable than starting over with a new system. When you upgrade, you might be able to use your existing network infrastructure, including wiring, which saves money on labor costs. You could reuse your existing card readers, cards and enclosures, saving even more money. With a retrofit solution, you can also maintain your existing database population and eliminate hours of re-entering data.

While a retrofit solution will require transition time during the hardware and software migration, some change-overs have very little to no down time at all. Once the system is fully functional, security staff will need training to learn the new system. These cons of a retrofit solution can be planned for in advance and in stages over time as needed.

With a retrofit, you get all the benefits of a new system: state-of-the-art hardware and software, up-to-date technology features that make securing your system easy, and a system with the ability to grow with your organization for the next 15 years or longer.

The pros and cons vary greatly when deciding whether or not to rip out an old system and replace with a new one, or install a retrofit solution. Examine your needs and budget, do your research and determine what’s best for your company.

KEYWORDS: legacy security security budget security retrofit upgrading security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kim Rahfaldt is Public Relations Manager for AMAG Technology

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • How to Find Solutions for Legacy Systems

    See More
  • Old PC

    3 Things to Understand About Legacy Hardware Systems to Protect Your Data

    See More
  • customer service

    How to Evaluate Your Access Control Provider’s Customer Service

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • SSCP.jpg

    SSCP Systems Security Certified Practitioner Practice Exams

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing