Credential migrations
Whether for migration, upgrading, compliance or data protection purposes, maintaining a healthy credential database is essential. Credential migration is the process where personnel databases are cleansed and migrated into a single source in preparation for a system upgrade or replacement. Our extensive industry experience in handling complex data has resulted in QCIC being the chosen supplier for numerous projects.
We begin the process by extracting cardholder data from the security systems. This is then analysed to identify and apply cleansing criteria that aims to remove duplicate records, expired cards and dormant entries. The result is a cleansed database.
Where multiple databases require consolidating, these are merged, once cleansed, into one unified database and then further cleansed. The databases are then ready for deployment into the new systems. In some cases, migration or upgrading is not required and the process is undertaken on existing systems for the purpose of cleansing the data.
Credential migration results in a dramatic reduction of personnel records.
Design
- 2D CAD design & CAD automation
- Automated access control design
- BIM
- Blast design & explosion consequence analysis
- CCTV Design
- Cloud advice & guidance
- Cloud based access control design
- Cloud based CCTV design
- Cloud design standards
- Cloud readiness & migration
- Cloud solution advisory
- Cloud video storage design
- Command & control room design
- Connected & smart building services
- Counter-terrorism & threat assesment
- Data centre design
- Design standards development
- Forced entry protection
- Hostile vehicle mitigation (HVM) & vehicle dynamics assesment (VDA)
- Intrusion & hold-up alarm system design
- Location services design
- Mail room design & internal detonation
- Marauding terrorist attack (MTA)
- Physical, technical & operational reviews
- Planning Advice
- Radio communication system design
- SABRE & Security Needs Assessments
- Secured by design
- Security policy & procedure development
- Security system integration
- Security threat & risk assessments
- System evaluation
- Threat, Vulnerability & Risk Assessments
Build
- Application engineering
- Cloud based evidence management
- Cloud data application services
- Cloud security deployments
- Credential migrations
- Credential review
- Global system migrations
- Location services deployment
- Mobile credential supply & deployment
- Project/programme management
- QCIC automation tools
- System upgrade conversion
- Technical project/delivery management
Run
- “Follow the Sun” system support
- Application maintenance & application patching
- Bespoke business administration reporting
- Bespoke dashboard & reporting
- Cloud system administration
- Embedded teams
- Global system administration support
- Hardening & cyber testing
- Mobile credential management
- System administration
- Virtual integrator led services