Story image

How to successfully phase out legacy physical security systems

21 Jan 2019
Sponsored

Legacy physical security systems often create a cumbersome and difficult environment for those that need to make use of them. Examples of this can often be seen in enterprises, especially in educational institutions. 

However, many institutions despite being aware of the issue, have struggled to move away from these legacy systems.

The vast majority of educational institutions have embraced the concept of multi-function Smart Cards or “one cards” and realise the benefits of such a migration, HID found that out by speaking with these institutions directly, however, some are still lagging behind the majority in transitioning.

These institutions understand that moving from legacy technologies to contactless, high-frequency Smart Cards will provide their students, faculty and staff with a more secure and convenient on-campus experience, however, they are still being held up. 

Surprisingly, it wasn’t merely budget constraints or limited resources. Interviews conducted with several institutions by HID revealed that many just didn’t know where to start.

Given that revelation, HID thought they should share some insights regarding recommended best practices that can really help colleges and universities begin to implement these modern solutions

Based on their own implementation experience and interviews with institutions that have successfully traversed the gap from legacy magstripe and prox cards to multi-function Smart Cards, the six critical steps detailed in the White Paper are:

Step 1: Ensure all stakeholders are included in the process

Step 2: Complete a baseline evaluation and security assessment

Step 3: Clearly define the goals of your campus card solution and select relevant elements

Step 4: Leverage outside support to tie services together

Step 5: Select a service provider/integration partner

Step 6: Issue multi-technology credentials and upgrade only critical access readers

While it can seem difficult at first glance to know just where to begin a large transition such as a campus-wide Smart Card upgrade, having a plan in place and leveraging tried and true best practices take the guess-work out of such an endeavour and lay the foundation for a smoother, less costly and successful migration. 

As such, HID prepared a  White Paper which details recommended action items as well as topics to take into consideration during both the initial planning and first phases of your implementation.

You can find out more by clicking here.

Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.