Advertisement

Advertisement

Let’s Talk Legacy: Evaluating a move to mobile access control

By Deborah L. O’Mara | Jan 15, 2025
Let’s Talk Legacy: Evaluating a move to mobile access control

Access control and video surveillance are the predominant technologies in physical security. Today, access control has the right mechanisms in place for growth, bolstered by mobile credentials and cloud computing. 

Advertisement

Advertisement

Advertisement

Advertisement

Users have more options in moving to mobile credentials. Wavelynx can upgrade without a total rip-and-replace while leveraging wallet applications.

 

Access control and video surveillance are the predominant technologies in physical security. Historically the foundation of many security systems, access control has lost ground to video surveillance since IP cameras gave users better images and new project possibilities.

Today, access control has the right mechanisms in place for growth, bolstered by mobile credentials and cloud computing. Mobile platforms leverage the smartphone as the identification credential. It’s more secure than easily lost or cloned cards, fobs or other forms of RFID that are constantly transmitting signals. Mobile credentials use the phone’s wallet app or another app presented to a reader.

The latest smartphones are design-built with multifactor authentication for cybersecure transmissions that integrate with credentialing. Mobile credentials also entail a lower cost of ownership as opposed to using and replacing cards, which become expensive over time and unwieldy for large enterprises to manage. Other benefits include remote management of access permissions and system controls through the cloud.

Dealing with legacy

Legacy systems that are 10–15 years old dominate access control, representing as much as 80% of installed systems, said Kim Loy, an independent security consultant in West Palm Beach, Fla. Loy believes many of those systems will transition to mobile credentials when upgraded.

So what’s involved in evaluating an installed access control system for the move to mobile? Systems integrators have options, depending on the system’s age; whether it’s proprietary technology; and the current readers, hardware and software. Infrastructure wiring needs to be assessed, especially if it’s an older, closed system leveraging unique communication protocols.

“If the integrator is the contractor who installed the system, they should have a good understanding of its potential migration path,” Loy said. “In some cases, a rip-and-replace is inevitable. It’s quite dependent on the installed hardware. Some legacy systems were designed as an end-to-end solution to keep users captive and may even have proprietary wiring.”

Loy advised integrators to conduct a system audit to ascertain mobile technology compatibility, including hardware, software and network infrastructure.

“Consider replacing existing readers with mobile-enabled options that support traditional and mobile access [e.g., Bluetooth, NFC or QR code readers]. Also, evaluate power and connectivity to ensure the existing infrastructure can support the new hardware for mobile-enabled devices,” Loy said.

An assessment of the communication and network infrastructure is next. Loy suggested the following:

  • Review network capacity and security: Verify whether the current communication system (wired, wireless or cloud-based) can handle the data load of mobile access.
  • Connectivity options: Assess whether the existing network can be used for mobile access systems or if upgrades are needed (e.g., improved Wi-Fi coverage and VPN configurations for remote access).
  • Integration potential: Evaluate if the existing system can easily integrate with cloud-based access-management platforms.

More options for migration

There are more options today for systems integrators, with manufacturers focusing on open communication protocols and software that integrates with existing access control. For example, Wavelynx Technologies Corp., Broomfield, Colo., introduced technology that supports legacy readers while creating a migration path to mobile. Wavelynx Ethos readers are designed with open and interoperable architecture to integrate into existing access-control systems. Wavelynx Wallet turns mobile devices into secure credentials, accommodating Apple, Google and Samsung platforms.

Robert Lydic, president of Wavelynx, said the first step in evaluating the move to mobile is to investigate existing readers and physical credentials. Lydic said integrators should walk the facility, examine the infrastructure and inventory how many new readers are needed.

“Any reader over 10 years old will need replacement,” he said.

Systems integrators also need to know what access-control software is in place and whether it requires an update to accommodate new mobile credential formats.

Lydic said replacing existing wiring isn’t always necessary. 

“With Wavelynx, literally whether you have our readers or not, we have a unique patent that enables us to use any of the wiring already installed and make it very secure utilizing Open Supervised Device Protocol, which is a secure bidirectional channel,” Lydic said.

“Engineers are told they need to replace the wire. And I will tell you, we just won a very large customer that’s saving $10 million on wiring. So, from an electrical contractor or a technology contractor perspective, you can upgrade a customer and move them to mobile credentials utilizing the wallet with Wavelynx and never have to replace the wire,” Lydic said.

Users want a seamless, convenient experience. Ultimately, mobile credentials are the secure way to go, especially as legacy gets its makeover.

Wavelynx Technologies

About The Author

O’MARA writes about security, life safety and systems integration and is managing director of DLO Communications. She can be reached at [email protected] or 773.414.3573.

Advertisement

Advertisement

Advertisement

Advertisement

featured Video

;

Advantages of Advertising with ELECTRICAL CONTRACTOR in 2025

Learn about the benefits of advertising with Electrical Contractor Media Group in 2025. 

Advertisement

Related Articles

Advertisement