How Security Dealers Can Deliver

Generating RMR from physical access control as-a-Service

Physical Access Control Systems (PACS) have evolved considerably over the past few years. Traditional systems that required heavy upfront IT infrastructure investments have given way to cloudbased systems. And, more recently, Web-based access control has allowed extension to cloud-enabled security capabilities to users’ smartphones and tablet devices.

Despite these technology developments, enterprise customers still seek greater flexibility, scalability and affordability from their PACS—not only when it comes to technology but also pricing and contract structures. As a result, security dealers and integrators have welcomed the emergence of physical access control “as-a-Service” to meet customer expectations.

Several converging factors are drawing security integrators and their enterprise customers to physical access control as-a-Service. Organizations are increasingly unwilling to make significant investments in expensive servers and IT infrastructure up-front and then be on the hook for recurring costs associated with managing this IT infrastructure. Security integrators, for their part, view the “as-a-Service” model as a way to extend their access control offering to new customers that could not previously budget for these services. It simultaneously generates recurring monthly revenue (RMR) that comes along with an ability to offer customers access control as a hosted or managed service.

Access control as-a-Service creates new revenue opportunities for security dealers and integrators that can effectively communicate the cost, feature and functionality benefits to existing and prospective customers.

Key Benefits of Access Control as-a-Service

Access control as-a-Service significantly lowers the entry barrier for security and IT systems integrators to deliver cloud-based access control as a hosted or managed service and delivers several key benefits to the integrator:

More flexibility and options for customers. Ultimately, organizations today seek greater flexibility and options when it comes to securing their facilities, people and assets. Customers do not want to be locked into purchasing servers and IT infrastructure that will be outdated in six months. Nor do they want to be locked into rigid contracts that do not allow for up-and-down scalability based on growth or consolidation.

With an as-a-Service model, security integrators can offer access control to customers as a hosted or managed service. With a hosted service, a customer can manage the IT infrastructure itself and maintain its own facility access privileges.

This is an attractive option for organizations seeking more hands-on control and one that has baseline resources available in-house for these functions. With a managed service, the integrator can host all of the servers and equipment— eliminating the need for customers to make up-front capital outlays to stand-up servers at their facilities or deal with changes to access privileges and device management.

In addition to a greater array of options, access control as-a-Service also delivers enhanced flexibility. Integrators can manage all aspects of building access control for their customers as an online, monthly subscription service— from a few doors at a single facility to hundreds or thousands of doors across multiple customers and locations.

Ability to generate RMR quickly. Offering access control on a subscription basis transforms the economic model for security integrators, for they can lease access control appliances on a monthly basis and then sell access to the appliance to their customers. The leasing model eliminates CapEx and unlocks new recurring monthly revenue opportunities for security integrators and resellers that benefit from a more predictable revenue stream via monthly managed service fees. The monthly subscription model further allows integrators and resellers to achieve profitability from the beginning of the venture instead of having to purchase the head-end and manage the financing.

In addition to generating RMR more rapidly, the as-a-Service model opens up access control to a new category of organizations that could not previously afford upfront IT infrastructure expenses. For many organizations, the cost of installing, licensing and provisioning a new rack-mounted server can exceed the cost of fully transitioning to a managed service model for access control—in some cases saving the enterprise customer more than 40 percent on recurring annual system support and licensing costs.

Unlocks new features and capabilities. The affordability and flexibility of the as-a-Service model places innovative features and functionality in the hands of customers. Web-based access control, for example, exists on the front end, so it can be quickly and easily integrated with door controllers, hardware, readers, wireless locks, switches and wiring. As a result, cloud-enabled Webbased access control can be implemented in a matter of hours and provides security administrators the ability to move beyond legacy client/server-based access control systems that limit user access to a small handful of authorized PC and laptop workstations.

Access control as-a-Service also positions security dealers and integrators to adapt to the increasingly mobile workforce. With cloud-enabled, Webbased access control, security integrators can offer customers the flexibility to securely manage access privileges from a broad range of devices (smartphone, tablet or laptop), from any location (home, office or road) and Web browser (Firefox, Safari and Internet Explorer).

This article originally appeared in the October 2012 issue of Security Today.

Featured

  • From the Most Visible to the Less Apparent

    The Cybersecurity and Infrastructure Security Agency (CISA) states “There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, and national public health or safety or any combination thereof.” Read Now

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”