sb-au logo
Story image

How to successfully phase out legacy physical security systems

Legacy physical security systems often create a cumbersome and difficult environment for those that need to make use of them. Examples of this can often be seen in enterprises, especially in educational institutions. 

However, many institutions despite being aware of the issue, have struggled to move away from these legacy systems.

The vast majority of educational institutions have embraced the concept of multi-function Smart Cards or “one cards” and realise the benefits of such a migration, HID found that out by speaking with these institutions directly, however, some are still lagging behind the majority in transitioning.

These institutions understand that moving from legacy technologies to contactless, high-frequency Smart Cards will provide their students, faculty and staff with a more secure and convenient on-campus experience, however, they are still being held up. 

Surprisingly, it wasn’t merely budget constraints or limited resources. Interviews conducted with several institutions by HID revealed that many just didn’t know where to start.

Given that revelation, HID thought they should share some insights regarding recommended best practices that can really help colleges and universities begin to implement these modern solutions

Based on their own implementation experience and interviews with institutions that have successfully traversed the gap from legacy magstripe and prox cards to multi-function Smart Cards, the six critical steps detailed in the White Paper are:

Step 1: Ensure all stakeholders are included in the process

Step 2: Complete a baseline evaluation and security assessment

Step 3: Clearly define the goals of your campus card solution and select relevant elements

Step 4: Leverage outside support to tie services together

Step 5: Select a service provider/integration partner

Step 6: Issue multi-technology credentials and upgrade only critical access readers

While it can seem difficult at first glance to know just where to begin a large transition such as a campus-wide Smart Card upgrade, having a plan in place and leveraging tried and true best practices take the guess-work out of such an endeavour and lay the foundation for a smoother, less costly and successful migration. 

As such, HID prepared a  White Paper which details recommended action items as well as topics to take into consideration during both the initial planning and first phases of your implementation.

You can find out more by clicking here.

Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Story image
Shlayer malware proves Apple devices aren't as secure as you think
"Apple never talks about malware publicly, and loves to give the impression that its systems are secure. Unfortunately, the opposite has been proven to be the case with great regularity."More
Story image
Why securing IoT installations will be ‘do or die’ in post-pandemic Australia
Unless IoT technology is visible on the network, organisations will find themselves at risk with an unmanageable high-tech morass, warns ExtraHop A/NZ regional sales manager Glen Maloney.More
Link image
Webcast series: The necessary tools to secure a remote workforce
Experts from across the A/NZ region discuss the best security practices in a remote working world - with sessions available on the first Thursday of every month.More
Link image
Gartner report: Why SD-WAN is becoming the de-facto option
Network service providers are increasingly challenged by established and new competition in the overlay SD-WAN management as well as in the underlay WAN transport, the report says.More
Story image
Proofpoint launches new SMB focused security awareness training
Proofpoint has launched security awareness training for small to medium businesses (SMBs) with the aim of reducing successful phishing attacks and malware infections to almost zero. More