6 Trends Impacting Access Control and the Overall Security Market

6 Trends Impacting Access Control and the Overall Security Market

Increased emphasis placed on interoperability and total cost of ownership in security purchasing decisions

From 4K Ultra HD resolution surveillance cameras to near field communication (NFC) or Bluetooth-enabled access control readers and applications, technology innovation in the security industry runs the gamut. However, while these newer technologies and the advanced functionality they offer generate a lot of buzz, the fact remains that today’s end users and systems integrators are looking for much more in the security devices they purchase than just the latest and greatest features. Despite a slowly recovering economy, security budgets have yet to climb back to their pre-recession levels. As a result, end users and integrators must be able to show a tangible return on investment (ROI) on the security solutions they purchase.

For many years, security operated within a silo, but that is quickly changing. Companies are now looking for security solutions that can be leveraged across different departments—human resources, facilities and more—and also provide long-term value to the organization. Additionally, it is no longer acceptable for security manufacturers to use a “checkbox” approach to the features they offer. More thought needs to be put into how the features of a product can be best utilized by customers. For example, a video surveillance company could develop a revolutionary type of analytic, but if the setup of that analytic is temperamental for integrators, then what difference does it make to customers looking to use that technology?

Much of the industry’s recent focus on innovation is around additional products that can be added into the security environment, not on the fundamental value provided to integrators and end users. The question for the industry is this: What market factors and technology innovations are going to be the key to driving real growth moving forward?

Here are few things that could play a big role in the industry in the not-toodistant future.

Openness and Interoperability

The word “open” is thrown around frequently in the security industry, but it is typically used to describe a security system, such as access control, video surveillance or other solutions, that are interoperable with products from other vendors. Whole spectrums of possibilities exist when someone uses the term open. Where the technology sits on this spectrum can have a significant impact on the experience of the integrator and end user, both in the initial implementation of the solution and in the technology options in the future.

In the best scenario, the connections between solutions use a published standard. This often provides the manufacturers the best visibility into the connection between solutions, and ultimately provides greater flexibility to the end user. One way this can be achieved in the access control realm is by implementing solutions that comply with the Open Supervised Device Protocol (OSDP), a communications specification developed by the Security Industry Association (SIA) to enable devices, such as card readers and control panels, to work together.

Using a control panel that also supports OSDP, for example, can provide users with the flexibility they need for their future access control decisions. Customers should ensure the solutions they select support open standards, but it is also important to consider what they are doing to ensure long-term value for the security solution. Just like our laptops and cellphones, technology in the security space is constantly in motion. Manufacturers should be designing solutions to support the latest standards, and to provide a runway for the technologies around the corner.

Greater Usability and Reliability

Although there is often a shift of trends within the industry where manufacturers will find themselves pushed by customers to deliver a certain set of features, two things have remained constant through the years: usability and reliability.

There are numerous examples that can be found across all product sectors of systems that have either been disregarded, or in some cases, simply turned off because they triggered repeated false alarms or because an organization’s security staff found them onerous to manage. Ultimately, vendors that want to deliver an effective solution for their customers must ensure that their product not only provides the features that they need, but is also dependable and user-intuitive.

Changing Vertical Market Dynamics and Regulatory Compliance

While nearly all vertical markets will have an impact, to some degree, on shaping the access control and overall security industry in the years to come, there are some whose impact will be felt sooner rather than later. For instance, the government and healthcare markets stand poised to have a substantial effect on product manufacturers due to the necessary requirements these markets have put together around access control.

The government sector is a prime example of how changing requirements within a specific market can have a broader impact on the security industry as a whole. Unlike other industries where minimum security requirements are largely established by the organization itself, security standards in government agencies are regulated by different federal guidelines and mandates that change and evolve with the threat landscape.

In effort to establish a common identification standard for government employees and contractors, Homeland Security Presidential Directive-12, more commonly known as HSPD-12, was issued shortly after the 9/11 terror attack by the Bush administration. HSPD-12 subsequently resulted in the creation of Federal Information Processing Standard-201 (FIPS-201), requiring federal employees and contractors to have personal identification verification (PIV) credentials. Additionally, some corporate entities have also opted to adopt standards similar to PIV due to the enhanced level of security it outlines, which points to how the government market has impacted the access control industry.

However, because many agencies found that the different components they purchased to become compliant with the PIV standard didn’t work well together, the government recently introduced a new program called Federal Identity, Credential and Access Management (FICAM), which outlines the implementation of an endto- end access control solution where all devices are interoperable with one another.

In the healthcare market, there has been a push over the last two decades to improve patient privacy with the implementation of the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health (HITECH) Act. While these regulations are primarily designed to safeguard patient data in the age of digital information and cybercrime, the majority of data breaches are not the work of sophisticated hacking networks, but rather negligence on the part of healthcare employees. This means that physical access control measures within hospitals and other healthcare facilities has become critically important as it only takes one door being propped open to reveal a treasure trove of information to identity thieves.

As a result of the continually shifting threat landscape in these markets, security manufacturers and the products they develop must continue to evolve to meet changing requirements. Oftentimes, it takes collaboration between all parties involved—manufacturers, integrators and end users— to develop comprehensive and effective solutions that not only meet the requirements set forth, but can maintain and manage the system as technology advances.

Increased Convergence between Physical and Logical Access

The advent of IP technology has dramatically changed the way security systems are installed, managed and monitored. It has also brought the worlds of IT and security together in ways that some people could have never dreamed. One of these ways is combining technologies to enable access to the physical locations of an organization as well as their computer networks.

That’s not to say there haven’t been some challenges in getting the technologies lined up to provide an effective solution for end users; it’s been a tough sell in many ways. However, the value is certainly there as it simply makes sense for many organizations to have the capability of implementing a converged physical and logical access solution. Like other integrations, the value of the information that is present in a traditional access control system has applicability to the larger organization, and IT is one of those departments.

Despite the benefits that can be realized by bringing these two areas together, many companies have yet to understand how to take full advantage of this convergence. Meanwhile, solutions do not always deliver as advertised; therefore, untapped potential still exists. This will likely change, though, as organizations become more tech savvy and hold vendors accountable for what they need to be successful.

Mobility Comes of Age

The development of NFC technology has been touted by many vendors in the industry as the next great technological leap in access control. On the surface, this excitement is certainly understandable, given the proliferation of smartphones and other mobile devices as well as the increased desire by customers who want the same level of convenience and usability as commercial security solutions in home consumer devices. However, despite the high hopes for NFC access control, actual implementations have been slow to materialize for several reasons.

First, manufacturers have to be able to access the Secure Element (SE) of a mobile handset in order to embed a credential. To do so, companies have to enter into partnerships with wireless carriers. Secondly, a large portion of the smartphone market is dominated by the Apple iPhone, which until recently did not come equipped with NFC technology. Although the iPhone 6 and iPhone 6 Plus, which made its debut in stores last month, features an NFC antenna, it still remains to be seen if the company will grant security manufacturers access to an API for access control purposes. With that being said, there is now one less potential hurdle to wider adoption of NFC in the market.

“The announcement by Apple addresses one of the barriers the access control industry has faced with regards to NFC, i.e., loading an identifier onto the secure element,” IHS analyst Blake Kozak wrote in a research note published by the market research firm last month. “With the API mentioned by Apple, it is possible that access control manufacturers—among others in the supply chain—could load and command an identifier directly onto the secure element.”

In the meantime, developers have turned their attention to Bluetooth Low Energy (BLE) technology which has several advantages over NFC, including the fact that it is available on almost every mobile phone available today and because the SE doesn’t have to be accessed in order to have the secure credential placed onto it.

Regardless of which technology wins out, the trend toward increased convenience and mobile access is one that will continue in the market for years to come.

Advanced Capabilities Move to the Edge

While edge capabilities are not new to the industry, there are signs pointing to increased interest by end users in using these capabilities more so than they have in the past. As such, manufacturers need to be able to deliver platforms that have the power and flexibility necessary to provide advanced capabilities at the edge.

When it comes to access control, there are many functions that can be performed at the edge that can enhance value for the end user. For example, being able to display messages to users when they swipe their card at a door, and the addition of personalization and communication options are functionalities that vendors will look to improve upon as time goes by.

This article originally appeared in the December 2014 issue of Security Today.


  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Survey: Only 13 Percent of Research Institutions Are Prepared for AI

    A new survey commissioned by SHI International and Dell Technologies underscores the transformative potential of artificial intelligence (AI) while exposing significant gaps in preparedness at many research institutions. Read Now

  • Survey: 70 Percent of Organizations Have Established Dedicated SaaS Security Teams

    Seventy percent of organizations have prioritized investment in SaaS security, establishing dedicated SaaS security teams, despite economic uncertainty and workforce reductions. This was a key finding in the fourth Annual SaaS Security Survey Report: 2025 CISO Plans and Priorities released today by the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Mobile Applications Are Empowering Security Personnel

    From real-time surveillance and access control management to remote monitoring and communications, a new generation of mobile applications is empowering security personnel to protect people and places. Mobile applications for physical security systems are emerging as indispensable tools to enhance safety. They also offer many features that are reshaping how modern security professionals approach their work. Read Now

Featured Cybersecurity


New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3