// THE PLATFORM, THE SERVER, AND THE HARDWARE BELOW
Access control head-end design for Canadian institutional installs. Platform selection, server sizing, Mercury hardware, HID Aero, Software House C-CURE, Genetec Synergis, Hirsch Velocity for high-security, database and high-availability, integration with directory and identity systems.
The access control head-end is the brain of the system. The platform software runs on the server, the field hardware (controllers, readers, locks) connects back to the server through the network, and the credential database lives at the server. Every reader event, every door command, every audit log passes through the head-end. Picking the right platform, sizing the server correctly, and integrating with the institution’s directory and identity systems at design determines whether the access control system holds up under operational load or becomes the institution’s single most-frequent service call.
Platform classes
When the rule applies
Every access control project. The platform choice is made at design and is the largest single decision affecting the install’s character. The four classes below cover most institutional Canadian work; the institution’s preference, the federal compliance requirements, and the integrator’s certification all influence the choice.
The four platform classes
Enterprise unified (Genetec Synergis)
Genetec Synergis runs on the same Security Center platform as Genetec Omnicast video. Unified search, unified audit, single management interface across access, video, intrusion, and ALPR. IT-friendly, virtualisation-ready, large-deployment-ready. Strong fit for institutional projects where access and video are managed together.
Traditional institutional (Software House C-CURE 9000)
Software House C-CURE 9000 is a long-established institutional access platform. Mercury-based field hardware, mature integrations with video and intrusion through partner products. Strong fit for institutional projects standardising on the Software House ecosystem (federal, healthcare, education with existing C-CURE deployments).
High-security / federal (Hirsch Velocity)
Hirsch Velocity with Mx-1, Mx-2, Mx-4, Mx-8 controllers. FICAM and HSPD-12 compliance, supervised PIV and CAC card readers, the ScramblePad randomized PIN keypad for shoulder-surfing resistance. Strong fit for federal facilities, court facilities, evidence rooms, server rooms, critical infrastructure where supervised credential reading and PIN entry are mandatory.
HID Aero controllers (Mercury-compatible, HID-branded), HID Origo Mobile credentials, HID Signo readers. Smaller institutional or commercial deployments where the integrator manages the platform directly without a third-party VMS. Cloud-managed option (HID Origo Management) for distributed deployments.
Other platforms in the market
Mercury hardware: the layer underneath
When the rule applies
Every Software House C-CURE, Genetec Synergis (where Mercury is selected), HID Aero, and many other access control deployments. Mercury Security manufactures the controllers and subpanels that several platforms OEM and badge as their own. Understanding Mercury is the difference between treating the platform as a black box and being able to troubleshoot the field hardware effectively.
The Mercury product line
Field note
Server sizing
When the rule applies
Every head-end server on the project. The server is sized at design against the door count, the cardholder count, the event volume, and the institution’s database retention policy.
The spec
Field note
Database and high availability
When the rule applies
Every institutional access control deployment. The database holds the cardholder records, the door schedules, the access groups, the credential assignments, and the audit log. Database integrity and availability are the access control system’s primary technical risks.
The spec
Field note
Directory and identity integration
When the rule applies
Every institutional deployment where the cardholder records have to stay synchronised with the institution’s identity management system (HR system, student information system, or active directory).
The spec
Field note
Network communication between head-end and field
When the rule applies
Every door, every reader, every subpanel on the install. The IP backhaul from the field controllers to the head-end is the data path for credential decisions, audit logging, and command-and-control.
The spec
Field note
System monitoring and audit logging
When the rule applies
Every deployment. The audit log is the institutional record of who accessed where and when. The monitoring is the operational visibility for the security team and the integrator.