Managing and Migrating Aged Legacy Systems by ProQuest

VIEWS: 19 PAGES: 4

Advances in the consumer electronics market and advances in electronic security control hardware and software offerings leaves many a consumer and security purveyor wondering, "Can I catch up?" - or worse, feeling left behind. End-users must be able to respond affirmatively when asked: "Will you have the data needed for an investigation when called on to produce it?"

More Info
									                                                Enterprise Security


     Managing and Migrating
      Aged Legacy Systems
                                     Practical advice for upgrading
                                             By Howard J. Belfor, CPP


Y
       ou have just finished reading            Now, let’s get back from the future to       and do not require the wholesale removal
       another article (just a few short     your current control systems — a mostly         and replacement of the old with the new.
       pages from here), or maybe you just   reliable patchwork of systems and subsys-       Challenges are being met with hybrid
       attended a webinar and had your       tems that were installed over the course of     products designed to use older technolo-
appetite whetted for a high-level video      perhaps decades. During that time, your         gies and provide a bridge to newer fea-
analytics software package equipped with     organization has grown, moved, merged and       tures and data management capabilities.
the magic of algorithms and new meta         now has a cornucopia of security control           My friend Ray Bernard and I have pre-
data capabilities. Perhaps, during a         products and providers — all designed and       sented at many seminars, and topics sur-
recent trade show, you saw a demonstra-      installed by many dealers and integrators.      rounding both emerging technologies and
tion where the latest in ID technology —     The many systems include different ideas        convergence have been hot for some time
image capture, live comparisons and other    of what constitutes a standard installation     now. When we have discussed the changes
data gymnastics — were performed.            technique, a mish-mash of different com-        in technologies and the desire for migra-
   “Integration” has come to mean the        ponents and separate means of interacting       tion, his comment is that in the IT space,
ability to seamlessly manage disparate       with the functions of each “sub-system.”        convergence is more than a decade old
databases and elements of your control          So a bit of the technology boom blasted      and they have summed it up as the man-
system in one big, happy, easy-to-use,       right by you? Are your security controls        agement and distribution of voice, data
intuitive desktop application. That’s what   systems limiting your ability to deter,         and video using common IT and network
you have isn’t it?                           detect and respond to security threats?         equipment (wired or wireless) and over a
                                             Does the current hardware and software          common IP data network infrastructure.
                                             you employ limit your ability to perform           With the development of many other
                                             accurate forensic analysis of events and        IP-centric devices, we must now think of
                                             perform investigations?                         security systems as “IT Systems” and under-
                                                Advances in the consumer electronics         stand the full spectrum of convergence. The
                                             market and advances in electronic secu-         security space is playing catch-up.
                                             rity control hardware and software offer-
                                             ings leaves many a consumer and secu-           How Do I prepare?
                                             rity purveyor wondering, “Can I catch up?”         As the late Dean Ralston said when I
                                             — or worse, feeling left behind. End-users      attended undergraduate school, “Plan
                                             must be able to respond affirmatively when      your work and work your plan.” It is the
                                             asked: “Will you have the data needed for an    best advice that both a freshman and a
                                             investigation when called on to produce it?”    migration strategy can have.
                                                The technology boom is facing a lack-           There have been many seminars and ses-
                                             luster marketplace. Limited budgets are         sions and volumes of reference materials on
                                             facing off against pent-up needs and the        methods to aide those tasked with a migra-
                                                 relentless need to mitigate risks or per-   tion project. Regardless of the methods, it is
               
								
To top