Blog

Access Control as a Service (ACaaS)

The focus of this discussion document is on acquiring Access Control for your facility in an “as a service” manner.

As a Service

First, let us define “as a service”. It is a phrase that reflects the use of a solution in a manner where ownership is not transferred. Effectively, you pay as you use it in a subscription or reoccurring fee-based approach.

As a service is believed to have originated with cloud-based software offerings and now has expanded to apply to several other areas that are both technology-based such as streaming services and more conventional offerings such as car rental.

CAPEX to Subscription

In the security world, where solutions are composed of software, on-premise hardware, and labor to install the hardware, as a service was limited to the software component in most cases and still required the CAPEX investment upfront for the hardware and labor. This is changing.

There is now a solution available to support the as a service approach for security implementations of all sizes and designs.

Typically, for jobs as small as $5,000, the end-user can have the security system installed and made operational in their facility without paying any CAPEX dollars. Instead, they will sign a three or five-year contract for a set monthly subscription which supports the entire system implementation AND all service and maintenance for the duration of the contract (some contractual limitations exist on no charge service).

During the Term of the Agreement:

  • Add to the system – add more access control doors. This adds to the subscription amount but does not impact the term of the agreement.
  • Upgrade the system – this provides the end-user with the ability to ensure their system does not become outdated or upgrade to a more innovative solution. For example, a card access to facial recognition access.

At the End of the Term:

  1. Allow the agreement to expire, in so doing the end-user will be asked to remove the equipment and return ship it to a specified location.
  2. Sign an extension to the existing agreement of one or two years and continue using the existing system.
  3. Upgrade the system.                

Business investment (CAPEX) should be aimed at increasing company profits or expanding business operations. The technology needed to safely and securely run a business is not a business investment. It is a business expense.

Additionally, security technology closely resembles IT technology (much of it is the same) in that it has a usable lifespan of 3-5 years before it is outdated or no longer supported by the manufacturer.

Finally, the ACaaS approach to using security solutions ensures the cybersecurity profile of your physical security systems is secure and endpoint component firmware is current, reducing vulnerability to cyber-attacks.

Save your cash for investments in your business and your people.

Upgrade your current access control system using the “as a service” approach. For more information on this topic please visit the M3T Service Shield pages.

M3T John Maffey

John Maffey

President