Load-Balancing Security

Distributed network architecture provides scalability in industry environment

Global enterprises and large, multi-site hospitals, universities and government agencies are increasingly facing a common challenge: how to bring all of their disparate buildings into an easy-to-manage enterprise security system. Most multi-site organizations have a variety of sites that range in size from small branch offices to large, multi-building campuses.

When it comes to designing an enterprise access control and security solution, security directors and IT managers need to balance several competing priorities:

  • Maintaining an up-to-date synchronized database of all personnel across all sites;
  • Monitoring events, alarms and activity reports from a central location;
  • Ensuring management at each site can autonomously manage day-to-day activities, such as adding/deleting personnel or changing access control privileges; and
  • Protecting the system and facilities against network failures.

Using different standalone access control solutions at each site can achieve priorities [three and four], but this strategy makes central monitoring and staff management impossible. Designing a true enterprise security system that is easy to use and delivers all four priorities requires an access control solution that can effectively manage the volumes of data produced by large enterprises via distributed network architecture.

Why should security directors and IT managers consider a distributed approach?

For end users, it is the only solution that delivers on all four priorities. For systems integrators, it avoids the labor and headaches of manually constructing interfaces between standalone systems.

Defining Enterprise and Distributed Network Architecture>
An enterprise is a company or organization consisting of two or more facilities that are either locally situated or widely dispersed. An enterprise could be multiple facilities grouped together in the same area -- such as a hospital campus, with its main building surrounded by clinics or doctor’s offices. Or it could be a large global company that comprises many buildings that can be hundreds, even thousands, of miles apart from one another.

The key framework of a distributed network architecture includes the distribution of decision-making and control to each site while simultaneously networking and synchronizing the sites via a central hub.

What End Users and Integrators Want
Distribution of decision-making and control to each site are essential for two reasons. First, local site managers need the flexibility to manage the security needs specific to their site. From adding personnel to modifying access rights, they need the ability to manage their system day-to-day without fear of losing network connectivity or bandwidth to a central, off-site server. Second, from a scalability perspective, well-designed security architecture avoids unnecessary data transmission and bandwidth consumption. For example, adding a new contractor and assigning him/her access privileges at a single local site should not require communication back to a central server.

While local site control is essential, enterprises also need easy-to-configure synchronization of security data between sites. Key factors essential to a “networked” architecture include:

  • Instant and scheduled synchronization: Security directors need real-time notification about critical events and alarms, as well as the ability to schedule synchronization of non-critical activity to better manage peak network use.
  • Tolerance of network outages: Multi-site synchronization must survive brief or extended network outages. When a site or the central server comes back online, synchronization must restart automatically.
  • Scalability from large to small: Most enterprises have a mixture of small sites -- such as four to five reader sales offices -- and large office buildings. Enterprise architecture must incorporate all sites, big and small, into the network.

A well-designed distributed network architecture also gives enterprise security and IT directors powerful central management capabilities. Central personnel management -- defining and changing global access control privileges and editing personnel details -- is the essential starting point. However, true central management goes beyond staff. Security directors also need the ability to create an integrated, multi-site event viewer and to centrally manage, monitor and configure their panels and readers.

To satisfy IT, the multiple autonomous servers at each site in distributed network architecture must be able to communicate with the central hub via either a LAN or WAN.

Return on Investment
The key benefits of a distributed network architecture include: scalability, efficiency, cost and reliability.

Scalability. Enterprise solutions that rely on a single server inevitably suffer from performance issues as the company grows and the server is overwhelmed. Moreover, single-server solutions are highly susceptible to network failures. Distributed architecture balances the load across multiple servers at each site.

Efficiency. Security managers control the flow of data and decision-making, minimizing network bandwidth and allowing them to focus on their business. At the same time, centrally located security staff can easily run reports, make changes, and view the status of local sites without needing to login to multiple separate systems.

Cost. Servers and software at each local site can be sized appropriately to meet each site’s specific needs, without requiring installation of an expensive server at even the smallest sites.

Reliability. Distributed network architecture is much more resistant to network and hardware failures than a single, central server approach.

These benefits can be made clear with a simple use case in which a large organization wants to integrate its access control system with its enterprise resource planning (ERP) system to eliminate replication and redundancy of employee data. With a distributed, but not networked, architecture using separate standalone access control solutions, the organization needs to pay for and maintain multiple, separate ERP integrations to the access control software at each local site.

With a networked, but not distributed, architecture -- the classic, singleserver approach -- only one integration is required, but system performance is poor at local sites and network bandwidth consumption is high. Distributed network architecture offers a single, cohesive solution that allows for a single ERP integration and optimized system performance and network bandwidth.

The early generations of enterprise security solutions focused on access control functions and harmonizing those with an organization’s personnel database. Today, it has evolved into complete control at every site and the ability to manage access points, card readers and alarm monitoring from a central location.

The range of an access control system’s capabilities is expanding, thanks to the distributed network architecture, because it solves the performance, scalability and load-balancing issues inherent in single-server architecture. Finally, security directors can ask for an access control solution that delivers on all of their security priorities.

This article originally appeared in the June 2011 issue of Security Today.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”