Paving The Way To Freedom

Physical security embraces benefits of the network

IT leaders today face complex threats in protecting corporate IT networks from cyber threats that include spoofing, data theft, denial-of-service attacks and many other network risks. Enterprise IT departments incorporate multi-layered defense strategies, designed to ensure that any device on the IT network is protected from a large variety of potential threats.

As physical security devices continue to embrace the benefits of network-enabled communication, it opens the door to vulnerabilities. Video surveillance networks can, and have, been used as an entry point for malware. As more customers deploy comprehensive IP security solutions that incorporate IP-enabled edge devices and platforms, it becomes more critical to ensure end-to-end IT security throughout the physical security network.

Less concern has been given to next-generation access control solutions. But that is mostly because of the fact that a majority of enterprises today still rely on traditional, legacy access control solutions to manage access to their facilities. In this article, we take a closer look at the drawbacks to legacy access control systems as well as review the benefits, and risks, of transitioning to the next evolution of access control technologies.

SAFEGUARDING AND DRIVING RESPONSE

At its core, physical access control solutions (PACS) are designed to safeguard against unauthorized individuals, and serve as a key component of incident and emergency response. Over the past three decades, PACS architecture has essentially remained unchanged. The most important part of the system—granting or denying access—still resides in traditional hardware distributed throughout an organization. These hardware-centric PACS have significant disadvantages including high initial and ongoing costs, the inability to integrate with other systems and, because of the inherent restricted architecture, they cannot support sophisticated authentication processes, such as those outlined by the government.

Because traditional hardware-centric PACS architecture limits the capabilities of access control, advanced features and real-time authentication and authorization capabilities are not easily attained. Rather, users have to invest in implementing costly third-party solutions or custom-designing applications. To date, cost and reliability factors have kept such capabilities out of reach for most PACS customers— even though IP-based surveillance systems have capitalized on similar features for more than a decade.

There is, however, a significant change on the horizon. Today’s critical business systems are software-centric and require specialized hardware only at the final points of physical interaction (imagine a smart phone or a POS system). These platforms leverage common IT infrastructure to achieve high levels of reliable performance at acceptable levels of cost. Why shouldn’t an organization’s access control system be similar?

IT-centric access control is similar to any network-enabled business application that leverages end devices on the corporate network. This approach streamlines identity, credentialing and access management, and ensures that these processes are integrated with other business systems.

Applications utilize network infrastructure to obtain real-time data, gather enhanced situational awareness, increase asset protection and apply policy-based access control measures to minimize risks and threats. Information within the PACS is easily shared with key stakeholders in the event of an emergency, supporting faster response and proactive approaches to security. Real-time decision-making is enabled and immediate access to critical data drives faster response.

BENEFIT VS. RISK

As the interest in IT-centric access control grows because of the far-reaching benefits, it will be critical for users to protect corporate networks from risks faced through traditional IT threats, as well as those that can be funneled through devices that reside on the corporate backbone. Today’s security devices are vulnerable to IT threats just like any other IT device. But it is important to keep in mind that PACS that leverage common processes technologies from the IT world, a wide variety will ensure protection of the IT network. Why? These fundamentals have been tested and enhanced.

Moving to the next evolution of PACS takes work. It’s fundamentally different architecture, which may seem daunting to users that currently manage traditional solutions. But if companies can work to gain buy-in from users and senior management, the benefits of moving to next-generation PACS are far-reaching. Moving towards IT-centric deployments allows organizations to realize significant advantages that enhance physical and IT security, infrastructure and networking functionality across the enterprise.

Network-enabled platforms conform to an IT department’s plan and policies, and leverage common IT methods such as PoE, server redundancy and autofailover. It drives collaboration between security and IT teams because it can derive value from the system. Unified physical and logical identity becomes more of a reality with IP-based PACS because native support for corporate directory and identity management systems streamline system administration and management for both security leaders and IT departments.

Next-generation PACS deliver additional benefits, as well. It eases integration through well-established and trusted standards, which reduce integration complexity. Mobile credentialing is also supported, enabling users to perform real-time device authentication. Today’s smart card technology is also supported—without third-party devices or middleware. This drives digital certification authentication compatible with federal identity standards such as FIPS 201.

By leveraging the existing IT infrastructure, next-generation PACS conforms to IT policies for system security and resilience, allowing access control to be deployed in the same manner that IT deploys other business systems. The ability to integrate easily with other IT solutions is streamlined because of a high level of interoperability based on IT standards. This approach drives the correlation of unified logical/physical identity, credentialing and access data, enabling users’ access to higher levels of data collection and analysis than ever before.

This article originally appeared in the October 2015 issue of Security Today.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.