Looking for Access Control with No Software Licensing? Consider R-MAC for License-Free Access Control

20507151_1638279879535571_1806169143997363319_o

For the past decade or so, security professionals have been slowly moved towards expensive software licenses and ongoing software maintenance agreements by security manufacturers and IT service & software vendors.

Security industry move to licensing

In the security realm, this became prevalent with the introduction of IP video. When analog video matrix switchers were replaced by video management systems (VMS), the manufacturers needed a way to recoup lost revenue from declining hardware sales. The answer was to charge for software licensing, and along with that came annual Software Maintenance Agreements (SMA).

That trend also seems to have been the same for access control manufacturers.

Not everyone’s ok with that change

Enterprise-class security end users who are heavily supported by their IT department are more agreeable to these new licensing plans. Their IT departments are already accustomed to the licensing required for everything from data storage to virtualization and database management.

Smaller companies with security departments that have historically run autonomously have balked at the new trend in security software licensing. Some video security manufacturers have started to offer various alternative solutions and others are sticking to the licensing strategy.

For example, some security surveillance companies sell enterprise class video system software licenses and SMA’s to support those licenses year over year. The same company, in many cases, also provides small “all-in-one” recording devices that have the licenses bundled into the product with one fee and no annual SMA program.

Enter R-MAC for License-Free Access Control

R-MAC is a complete access control solution, from hardware at the door to the web-based graphical user interface and database, that eliminates complex initial and annual licensing fees with a simple, low cost monthly maintenance fee for the entire bundled system.

Plus, you can even add CCTV integration to the system. Integration of access control and CCTV allows a simplified user experience.  This is particularly important when a security officer is operating in a stressful environment.

Cybersecurity and Private Employee Information

Securitronics, manufacturer of R-MAC, delivers innovative, cost-effective solutions that address security’s most demanding concerns, including cybersecurity.  Our established, internal policies and best practices not only protect our network and infrastructure, but ensure we work in a responsible manner with our customers to help mitigate the risk associated with cybersecurity attacks and vulnerability.

Working with Securitronics

Problem-solvers: we’re not just another security system provider. We look at new technologies and examine ways in which they might fit your current and future needs.

Innovation: we provide state of the art security services. Systems that are ideal for your facility and business.

Our goal: we build long-term, lasting partnerships based on absolute trust, personalized attention and services, and the most skilled and talented people available.

Contact a Solutionist at Securitronics for a complete access control assessment today at 800.795.3747

How much will an Access Control System cost your business?

shutterstock_418217857

Choosing and deploying an access control system is a relatively complex decision, and there are a few challenges that could become a risk to productivity. Having the right security partner working with you and your team will prevent and mitigate risks.
However, no matter the chosen solution, an access control system will impact multiple aspects of your business. Impact minimization measures that are considered and initiated with your security partner during the planning process will ensure business continuity.

Financial

Cost should directly reflect the benefit to business security and operations. A business operator will need to consider ongoing costs associated with hardware maintenance, annual software licensing, and person per hour investment.

The initial cost of the system is based on several key components:
• Number of buildings or locations to be secured
• Number of doors to be secured
• Number of credential holders
• Computer hardware or virtualization to be augmented
• Integration to other systems such as video surveillance or intrusion detection
• IT department time commitment to support the deployment
• Human resources, facilities, and other departmental training
The often overlooked, ongoing costs will include:
• Human resources: user management and credential purchases
• IT department: software updates and computer hardware maintenance
• Installer contracts: component maintenance
• Vendor contracts: annual Software Maintenance Agreements (SMA)

Operations

When a new access control system is deployed, company personnel will have new procedures to follow. They may need to carry and display an ID badge or programmed key fob to access the building as well as secure interior areas. Doors that used to be left open for easy access may now be closed and require a free hand to open. Short cuts through the facility may now require a new travel route.

Security

Security will improve as the procedures are followed. Sensitive corporate information will be kept from unauthorized access and visitors will be screened prior to entry. Accountability will improved with activity logs and electronic awareness of facility and sensitive area access.

Safety

Areas that are off limits to untrained personnel will be controlled. The risk of injury, or worse, will be reduced. Compliance with OSHA and local jurisdictional authorities will be streamlined, avoiding costly fines and potential stop-work orders.
System Deployment at a Glance

A simple access control system may include a handful of doors to be controlled with only a few dozen employees using the system. This would require a database, user interface software program, and door control hardware. The system allows doors to be opened when an authorized user presents her credentials and remains secure when an unauthorized credential is presented. It will also remain secure if someone simply pulls on the door.

In a complex system, each door in the system will be treated the same as a door in a simple system. However, there will be far more doors to address. Likewise, a complex system typically involves far more users in the system. These users can be included in the software database, or in some cases, IT departments include the access control system in their LDAP (Lightweight Directory Access Protocol) database to simplify human resources operations. Users may be placed into smaller user groups with a variety of access “levels”, such as basic facility access or limited access to sensitive administrative spaces.

Cost Sources at a Glance

• Planning meetings
• IT hardware/virtualization
• IT time investment
• System and door hardware installation
• Door replacements and modifications
• Software licensing
• Software Maintenance Agreements
• Integration to additional systems
• Training
• Support contracts
• Credentials

Evaluation and Deployment

Choosing an access control system is a complex decision. There will be expected, and unexpected, challenges that are unique your business and operational needs.

KEEPING ON TRACK

Our Solutionists have extensive experience with access control manufacturing leaders and will provide a perfect match to your unique business needs. Our years of experience ensure minimal impact on operations during installation and we’ll provide ongoing, expert support throughout the life of the solution.