In the Clouds

In the Clouds

How big is too big; the sky is the limit

Cloud solutions are changing the way businesses operate at almost every level. Their ease of implementation, access from anywhere and cost-effective pricing are making them the preferred solution for everything from marketing platforms to payroll administration to project management. Now, security solutions are joining this popular trend, including access control “in the cloud.”

Cost-conscious small- to medium-sized companies have been quick to embrace the many benefits of hosted access control. Larger, enterprise organizations, however, have been more guarded. With hundreds, or even thousands, of doors and access points, cloud solutions have the potential to deliver enormous savings, but concerns over whether the technology is truly “ready-for-prime-time” may have kept larger entities from taking the leap.

Until now.

A new generation of cloud-based access control solutions that offer centralized management, combined with redundant and decentralized system topology, highly secure communications, an open API for easy integrations, and complete “manage from anywhere” flexibility, matches the wish list of any large corporate IT or IS management team. System integrators have equal reason to take note; cloud-based access is highly cost-effective, significantly easier to install and configure, and allows integrators to play a more proactive role in providing on-going support.

Security That’s Actually Secure

A majority of CIOs and CTOs will tell you that concerns over cybersecurity threats are what keep them up at night. Combine that with the fact that between 80 to 90 percent of all cyber-attacks on small to medium-sized businesses are happening through their security infrastructure, and it’s no wonder enterprise businesses are leery of trying new solutions. In reality, it’s the tried-and-true standalone, network-based physical security software and devices that have proved to be most vulnerable. Attacks through video surveillance software, IP cameras and access control software have been well documented.

New cloud-based access control solutions that have been designed, from the ground up, with a security-first mindset can deliver in ways that IP-based solutions, that were designed 10 years ago and are now being retroactively adapted for cloud applications, cannot. For example, a 100 percent cloud solution should eliminate the need for public IP addresses to connect to, and opening ports across the network. This is a huge contrast to leading stand-alone IP access control solutions on the market, for which phishing websites can easily lead hackers right to the log-in screen for their systems.

New hosted solutions can also require hardware-specific authentication before connection with the cloud. A smart manufacturer will make sure that each customer’s system connects to the cloud using a unique key embedded in its hardware, so that even if one server is compromised, the rest of its customers are not vulnerable.

Cloud solutions, as well as any access control solution, can (and should) require two factor authentication for all users with administrative privileges. A system that requires a combination of biometric data, texting codes or even physical hardware keys is going to go a long way toward ensuring that the wrong people don’t gain access to the system.

Reliability, Redundancy and Responsiveness

Access control solutions must be absolutely fail-safe, which begs the question, “With a cloud solution, what happens when the internet goes down?” What might initially seem catastrophic is actually no big deal when using a well-designed, smart cloud solution with local redundancy. If system-wide data is always backed up and stored, on site, by a local node, then loss of internet connectivity only degrades the ability to log into the system remotely and make changes to settings. On-site operability remains fully functional. Once internet connectivity is restored, all controls are restored and the local node will re-sync with the cloud platform.

What about operating a system, or portions of a system, from a location that has unreliable internet access? Or none at all? Some cloud access control manufacturers now offer GSM modules that connect to the cloud via a cellular connectivity.

As for system reliability and responsiveness, be sure to ask any cloud solution provider about its hosting platform. What sort of infrastructure is in place to deliver consistently fast usability time, to accommodate for spikes in network traffic and possible server attacks? If proper attention has been paid to these concerns, then cloud solutions can deliver reliability and responsiveness on par with any stand-alone system, with the added benefit of universal accessibility, and true security.

Enterprise Features and Functions

After passing muster for security and reliability, cloud-based access control must deliver the functionality demanded by sophisticated IT management teams looking for operational flexibility, integration options and ease-of-use. This is where hosted solutions really excel. But in discussing these capabilities, it is important to differentiate between 100 percent true cloud-based systems versus more traditional IP systems that offer a mobile module. In the case of the latter, phone apps or thin-client, browser-based platforms that allow users to manage stand-alone systems “from anywhere” typically do not provide full control. There is still the need for an on-site server to deliver the solution’s highest level features.

In a pure cloud solution that has been engineered, first and foremost, for the mobile user, the user experience is going to be 100 percent the same whether logging in from phone, tablet, laptop or desktop. Many of the features and functions discussed here pertain exclusively to these types of systems.

Let’s begin with flexibility. By definition, cloud systems offer unparalleled flexibility in how and where they can be accessed. And this benefit isn’t just limited to system administrators. Accessibility means that cloud systems can be more easily supported and serviced by system integrators and manufacturers. For example, cloud systems designed with health monitoring capabilities can alert the system integrator, as well as the in-house IT team, when any problems arise. These might relate to lost connectivity to a controller, power supply status, or even low battery life. Automated communications like these allow dealers to provide support that is proactive, rather than reactive. Plus, if unusual challenges arise that are beyond the normal capabilities of the dealer, with consent the manufacturer can also provide remote consulting and support.

System configuration and integrations are also simplified. When an integrator goes on site to install a system, he can use configuration tools built into the app to facilitate set up. All the tools are right there in his phone or any web-enabled device. For example, he can discover all available wireless devices, do a test to make sure a door is within range, and even click “relay” to see physical action at the door and monitor dB gain.

Once hardware is in place, a 100 percent cloud solution should require zero onsite configuration. Again, the app provides all the tools necessary. The integrator sets up initial users and their administrative permissions, and once they accept the invitation, they can add, change and delete access rights, even from a mobile device. It’s truly plug-and-play. It’s equally easy to upload large employee databases, create groups, time zones, create partitions, and use the rules engine to make the system do whatever is desired.

Now, to the topic of integration flexibility. The delineation between physical security solutions, network security, cybersecurity, and solutions like building management and life safety systems, continues to blur as the IoT (Internet of Things) encompasses more and more devices. Integration is easier, and can deliver more capabilities, when systems are designed to communicate with each other, and cloud-based solutions are predisposed for this type of functionality. Hosted access control solutions can more easily integrate with a wide range of platforms, and can even seamlessly integrate with standalone solutions.

For an IT manager looking to streamline operations and consolidate solutions, cloud-based platforms make that task infinitely easier. Look for cloud-based access control to integrate with lock systems, video surveillance, HR and payroll systems, visitor management, billing systems and much more.

Paths to Migration

For large companies looking to upgrade their physical security infrastructure, the sunk costs of hardware already installed might make the proposition of “going cloud” seem prohibitive. Cloud solutions often offer compatibility with all your existing hardware, and do not require an all-or-nothing investment. Initially, only controllers need to be swapped out, and these can be connected via existing cabling. These then get connected to a “cloud node” facilitating the physical connection to the hosted platform.

Once this has occurred, the customer can run the new controllers indefinitely. As all software is automatically updated, the hardware never becomes obsolete and the system never goes out of date. If, at some point in the future, there is a desire to further upgrade the system’s hardware, or to add additional doors using wireless connectivity, both legacy and new components can operate through centralized management, with seamless interoperability.

The Bottom Line

As mentioned at the beginning of this article, the financial benefits of cloud solutions are well known; it’s one of the primary reasons that the industry-leading business solutions are now hosted.

Access control is no different. Compared to stand-alone solutions, it is significantly less expensive to install, operate and maintain. However, for the enterprise customer, price is not enough. When it comes to access control, decision makers must feel fully confident that any quest to save dollars on a cloud solution doesn’t compromise their corporate security, diminish their functionality or limit their future options for expansion and integrations.

The new generation of cloud-based access control should go far beyond putting these concerns to rest. In fact, look to cloud-based access control to redefine the category, establishing a higher level of expected features and performance, as required by even the most demanding, enterprise customers.

This article originally appeared in the September 2017 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3