Industry Influencer Q&A: Perimeter Entry & Access Systems

March 10, 2022
Learn more about how cloud computing, managed services and 5G is influencing perimeter entry and access control in this sponsored Q&A with Richard Sedivy, Director of Marketing and Regulatory Affairs for DoorKing Inc.
The rise of cloud computing, managed services and 5G is influencing tech markets across the board, and the perimeter entry and access control market is no exception. Learn more about these in this sponsored Q&A with Richard Sedivy, Director of Marketing and Regulatory Affairs for DoorKing Inc. Mr. Sedivy has more 45 years of experience in access

control and vehicular automated gate systems and has been employed with DoorKing since 1991.

What are the benefits of transitioning to a cloud-based programming model for entry and access systems?

There are numerous benefits to cloud-based entry and access control systems. First and foremost, data stored in the cloud is continuously backed up and secure. The DoorKing cloud is hosted by Microsoft Azure, one of the most advanced and secure cloud environments available today, and it employs security measures beyond the affordability of most businesses; therefore, data is often safer in the cloud than on a server in an offices. Because cloud software is hosted, managers and system administrators do not need to worry about software or hardware maintenance, and upgrades are taken care of by the cloud service provider. Other benefits include predictable monthly payments that cover software licenses, upgrades, support and daily back-ups.

In today’s work environment, more and more people are working from their homes or other offsite (out of the office) locations. This makes the notion of an office-based PC with programming software an outdated concept. Large complexes

typically have more than a single person managing the entry system database, and many property management companies are based offsite and even out of state. By moving the entry system database from a single (or multiple) PC to a cloud environment, a single common database for the entry system is created and accessible by all administrators (with proper credentials) to manage the entry system database. Multiple people can update permission rights, resident/employee information, access codes, etc. as needed. And since the database is in the cloud, changes made can be effective immediately or on a scheduled basis.

Another great advantage with cloud-based programming is that the database can be accessed from anywhere, at any time with any type of internet connected device – laptops, tablets and even smartphones. Management companies, apartment managers, homeowner’s associations, etc., no longer need to have a dedicated PC with access management software on site. They can access the cloud from their homes or offices and make necessary changes regardless of the device being used (MAC or PC).

How do integrators facilitate this cloud transition for customers?

With a brand-new installation, the only thing the customer has to do is create an online account in the DoorKing cloud, register the entry/access system and then start entering the data. It really is that simple.

Transitioning an existing entry/access system database from a PC hosted database to the cloud is also a simple process. The customer creates an online account with DoorKing and registers the entry system to enable cloud programming. They should ensure they have the latest version of the DoorKing desktop programming software (V6.5.a) installed on their PC. This version of the software will convert the database so that is cloud ready, and then with a simple click of the mouse, will upload the database to the customers cloud account.

What are some of the other technological innovations we are seeing in gate and perimeter entry systems?

Plain Old Telephone Service (POTS) lines are a relic of the past. They are expensive, and the telecommunication companies do not want to maintain them or even install them anymore. Telecommunication companies have also been upgrading their switches to work in the digital environment. Often, the digital switches are incompatible with old modem-type communication protocols.

In many areas, you can no longer order a POTS service line. POTS lines are now being replaced with a network (internet) or cellular connection.

With a network or cellular connection for the entry/access control system, many manufacturers now have apps that can be installed on smartphones that allow the users control of the perimeter entry system from their phone. Video calling is being requested more and more on commercial and residential applications, along with expanded control and reporting capabilities.

How has the 3G sunset affected the perimeter entry and gate systems market?

The 3G sunset impacts every device currently using the 3G network; tablets, smartphones, security cameras, home security systems, burglar alarms, fire alarms, medical devices, vehicle tracking devices, cellular entry systems, and more, regardless of who the manufacturer is. Once the 3G network is shutdown, these devices will no longer function and will become obsolete.

Many manufacturers are now building and optimizing connected devices for the newer networks and are no longer offering 3G devices. For older systems that continue to operate on the 3G network, system integrators will need to contact their manufacturer directly and ask what their 3G transition plan is. Some older systems may simply have to be replaced while others may have an update option available.

The latest scheduled shut down dates are as follows:

· AT&T (3G HSPA+ network) — Feb. 22, 2022

· Sprint (3G WCDMA network) — Mar. 31, 2022

· T-Mobile (3G UMTS network) — July 1, 2022

· Verizon (3G EVDO network) — Dec. 31, 2022

Entry and access systems that use a 3G cellular connection will be affected when the carriers begin to shut down the 3G networks. Systems integrators need to work with the manufacturers to determine which of their systems are affected, and what they will need to do to maintain service to the entry/access system.

To learn more about DoorKing, visit www.doorking.com or request more information at www.securityinfowatch.com/10213482.