Analog to IP: Making the Change

The wave of security system migrations to network-based communications is riding high with manufacturers and resellers of Internet Protocol (IP) security devices announcing record volumes. However, considerable planning and coordination is required when...

IT will want to look at your migration plan: If you are migrating from one system to another, IT will want to know what is expected of them when systems are run in parallel and the timing of the cutover to the new system. The migration plan may also include sections on data migration (conversion of the access control cardholder and door hardware configuration databases from the old system to the new one) and access management (development of a logical access privilege scheme.)

IP Address Control: The IT department controls IP addresses and will require a list of all of the devices that require an IP address.

Device certification: This may be required if any of the devices are “foreign” to the IT staff, such as cameras, intercoms and door control panels. They may want to study their specifications for intrinsic “hack resistance” and network bandwidth impact, and even put them through separate testing.

While the list of planning tools above may seem onerous, and it certainly adds an additional level of expense and schedule creep, these IT tasks raise the level of professionalism used to implement a new IP security system or to migrate from an analog system. The planning is intended to ensure that there are no unintended impacts on the business systems being supported by the network and to guarantee a smooth transition from one system to the next.


David G. Aggleton, CPP, CSC, has been actively engaged in the design of new and upgraded security system since 1978. He can be reached at