ACCESS CONTROL

1% downtime is too high for compliance: The benefits of continuous availability in access control

Avatar photo

Business development manager, UK & Europe , Stratus Technologies

October 26, 2017

Download

Whitepaper: Enhancing security, resilience and efficiency across a range of industries

One reason for significant growth over recent years in the deployment of enterprise-level access control systems is that advances in technology have delivered benefits over and above access control itself.

As a result, in addition to security managers being responsible for the security of people, property and assets, a number of other stakeholders are often now involved in the decision to justify and fund installation of an access control system. These could include, but are not limited to, health and safety, operations and HR management.

Compliance

‘Compliance’ is a word often on the lips of these stakeholders. Failure to comply with government regulations or local laws could have serious consequences for organisations with a duty of care to the general public.

An inspector’s visit to a food processing plant, for example, could prove costly and may even result in temporary closure unless it can be verified that everyone working at the plant has undertaken appropriate training and has a valid hygiene certification.

The same smart access control cards which facilitate staff access through a building entrance can also be configured through integration of various systems to produce a report of all those whose hygiene certificates are due for renewal.

Even a well-designed and maintained system is still vulnerable to downtime as server manufacturers cannot provide a 100% guarantee that there won’t be a component failure at some point

The weak link

In this and many other scenarios, the hardware and software elements of an access control system need to function effectively 24/7/365.

The weak link will most likely be the server that various software applications are operating on. Unfortunately, even a well-designed and maintained system is still vulnerable to downtime as server manufacturers cannot provide a 100% guarantee that there won’t be a component failure at some point.

And we shouldn’t forget the potential impact of a cyber-attack on associated software applications too.

Knowing your options

Data backups and restores: Having basic backup, data-replication and failover procedures in place is perhaps the most basic approach to server availability. This will help speed restoration of an application and help preserve data following a server failure.

However, if backups are only occurring daily, significant data can still be lost. At best, this approach delivers approximately 99% availability.

That sounds pretty good, but consider that it equates to an average of 87.5 hours of downtime per year, or more than 90 minutes of unplanned downtime per week.

High availability (HA): HA includes both hardware-based and software-based approaches to reducing downtime. HA clusters are systems combining two or more servers running with an identical configuration, using software to keep application data synchronised on all servers.

When one fails, another server in the cluster takes over, ideally with little or no disruption. However, HA clusters can be complex to deploy and manage, and you need to license software on all cluster servers, increasing costs.

HA software, on the other hand, is designed to detect evolving problems proactively and prevent downtime. It uses predictive analytics to automatically identify, report and handle faults before they cause an outage.

The continuous monitoring this software offers is an advantage over the cluster approach, which only responds after a failure has occurred. Moreover, as a software-based solution, it runs on low-cost commodity hardware.

HA generally provides between 99.9% and 99.99% uptime. On average, this means from 52 minutes to 4.5 hours of downtime per year – significantly better than basic backup strategies.

Maximum uptime

Continuous availability solutions can deliver 99.999% uptime – equivalent to just five minutes of downtime per year.

Supported by specialist continuous availability software, two servers are linked and continuously synchronised via a virtualisation platform that pairs protected virtual machines to create a single operating environment.

If one physical machine fails, the application or software platform will continue to run on the other physical machine without interruptions. In-progress alarms and access control events, as well as data in memory and cache, are preserved.

Continuous availability means that no single point of failure can stop a security software platform from running. And unlike high availability, back-up and clustering solutions, there is no failover or reboot required and therefore minimal downtime.

In a business environment where non-compliance can have serious consequences, adding a continuous availability solution to support an existing or new access control system would seem to be one of the easiest decisions to make.

Subscribe to the IFSEC Insider weekly newsletters

Enjoy the latest fire and security news, updates and expert opinions sent straight to your inbox with IFSEC Insider's essential weekly newsletters. Subscribe today to make sure you're never left behind by the fast-evolving industry landscape.

Sign up now!

man reading a tablet, probably the IFSEC Global newsletter
Subscribe
Notify of
guest
1 Comment
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Faith
Faith
November 1, 2017 6:23 am

Thank you, Duncan, for the great advice. But the article seems to concentrate on the software-side only. With my experience in both IS administration and the security industry, this seems to be the easiest component of the Access Control system to assure the availability of. BUT, what of the hardware components? Specifically the controllers/gateways in a centralized system? And what of the readers? How can we eliminate the 1% downtime for e.g. a 100% keyless bank (even the HQ’s main door is electronically access controlled)? For example, the controllers and reader interfaces that are part of our access control product… Read more »