Skip to main content
BluINFO

How to Migrate Your Legacy Security System to BluSKY

(with Minimal Downtime and Minimal Cost)

Migrating from an on-prem or legacy cloud security system to BluSKY is far simpler than most financial institutions expect. The key is that BluSKY allows your entire environment to be built, configured, and automated in the cloud before any hardware cutover happens.

Here is the complete, step-by-step process.

Define Your System Structure in BluSKY

Begin by setting up the core framework:

  • Create your enterprise-level system in BluSKY.
  • Define each facility (branch, data center, HQ, admin building).
  • Define occupancy — which people belong to which buildings.

This establishes the foundation for devices, people, and access assignments.

Define Your Devices and Hardware for Each Facility

For every facility, configure:

  • Card readers
  • Portals/doors
  • Alarm points
  • Cameras
  • Intercom stations
  • Elevators
  • Any other security devices

Fast Method: Import directly into BluSKY

If your existing system can export hardware, schedules, or access levels to Excel or CSV, BluB0X can:

  • Import all devices
  • Import device locations
  • Import schedules
  • Import access levels
  • Import access level groups

This instantly populates the entire security architecture without manual entry.

Import All Personnel, Visitors, and Vendors

Export your current personnel database — employees, contractors, tenants, vendors — including:

  • Unique identifiers (required)
  • Access levels
  • Building occupancy
  • Access level groups
  •  Roles or departments

BluSKY imports all of this directly, preserving structure and assignments.

Set Up Automated Database Synchronization (Optional but Recommended)

If your institution maintains a centralized identity system (HRIS, IAM, IT directory), BluSKY can receive automated updates through:

  • SCIM integration
  • BluSKY API
  • Nightly sync files
  • Real-time event-based updates

Adds, edits, and deletes flow automatically—including access entitlement changes.
This ensures your cloud database stays perfectly aligned with your authoritative identity source.

Create Maps and Plot Devices Automatically

Import any existing floor plans or building maps.

BluSKY will:

  • Automatically place devices
  • Associate devices with physical areas
  • Determine camera descriptions
  • Generate camera metadata and relationships
  • Link access, alarms, and video by location

This produces a clean, visual layout before any cutover begins.

Configure Rules, Alerts, and Automations

Next, configure BluSKY’s automation engine:

  • “If-this-then-that” rules
  • Alarm actions
  • Video verification
  • Behavioral analytics
  • Notification routing
  • Escalation logic
  • Compliance workflows

Again — all done before switching hardware over.

Perform Full QA and Database Validation

Before migration day, the entire cloud system can be:

  • Fully tested
  • Validated against the legacy system
  • Compared for consistency using BluSKY reports
  • Checked for missing access levels, people, devices, or schedules
  • Reviewed in parallel with your current system

BluSKY allows organizations to verify 100% of the database before going live.

Cut Over Hardware — Quickly and with Minimal Downtime

Once BluSKY is built, tested, and validated:

Option A: You already use Mercury hardware

Simply point your Mercury controllers to BluSKY.
They immediately begin taking updates and instructions from the cloud.

Cutover can be done:

  • Overnight
  • Over a weekend
  • Site by site

No major hardware replacement.

Option B: You use proprietary legacy hardware

Replace it with:

  • BluB0X ARC controllers, or
  • Mercury boards

This step is simple because all configuration is already prepared in BluSKY.

Run Both Systems in Parallel (Optional)

BluSKY supports dual-running:

  • The legacy system continues receiving identity updates
  • BluSKY receives the same updates through API/SCIM
  • Both systems operate simultaneously
  • QA can be performed without any operational impact

This eliminates risk and ensures zero disruption during the transition.

Enable Single Sign-On (Recommended During Setup)

While integrations and imports are being set up, many institutions also deploy:

  •  SSO for BluSKY dashboard access
  • Integration with Azure AD, Okta, Ping, or any SAML/OIDC provider
  • Adaptive MFA for admins or high-privilege users

This improves consistency and governance for both IT and physical security.

Final State: Your Institution Is Fully Modernized

Once a site is migrated:

  • All devices communicate with the cloud
  • All people and access permissions flow automatically
  • All schedules, access levels, and groups are unified
  • All logs, alarms, and events are neatly correlated
  • All analytics and AI pipelines are active
  • All compliance reporting becomes automated
  • All audit trails become unified and searchable

Your institution now has enterprise-wide cloud-native security — with minimal disruption and minimal cost.

Summary: The Fastest, Safest Path to a Modern Security Platform

BluSKY allows institutions to:

  •  Build the entire system before cutover
  • Automate all identity changes
  • Import all devices, schedules, and access levels
  • Test everything in parallel
  • Migrate site-by-site with almost zero downtime
  • Reuse Mercury hardware
  • Keep costs low
  • Avoid operational disruption

This is the most modern, controlled, and low-risk migration process in the industry.