Digital Transformation

Digital Transformation

Five access control trends to watch for in the coming year

The global pandemic accelerated a worldwide digital transformation that has simultaneously reduced or eliminated physical touchpoints and in-person contact. Meanwhile, today’s definition of physical security has expanded to address the user experience, as access control technologies evolved to enable myriad new building services that can be accessed through people’s mobile phones and other devices. These two dynamics are driving five major trends in access control.

Tapping into touchless technology. As the world reoriented its digital transformation to a touchless experience during the pandemic, this spawned new use cases that benefit from the safety, security, convenience, and efficiency of contact-free interactions with both the physical and digital worlds. Biometrics will be an important addition to this model and advance the security and convenience of these touch-free experiences, from opening doors and printing documents to interacting with connected buildings and digital consumer services, and implementing physical distancing and contact tracing protocols.

Identity is the new perimeter. There had been a change in the workplace even before the pandemic, as secure workplace access is defined less by the workplace physical perimeter. Instead, identity had become the new perimeter. In many cases it is the only perimeter. Protecting this new perimeter requires a new approach that unifies both physical and cyber/IT access through a single physical identity and access management solution. As part of this approach, identity management for a secure, safe, and productive workforce environment requires three key elements: credential management, multi-factor authentication and secure visitor management.

Greater choices for streamlining security. There is growing demand for simple and cost-effective physical security frameworks that support multiple form factors and communication protocols. Physical access cards are a good example. Organizations that choose feature-rich, multi-technology cards can follow a smooth migration path from vulnerable legacy. Also, low-frequency 125 kHz-based systems to a modern and secure technology with multi-application support, at their own pace. Readers also must support this kind of migration path, by supporting the widest possible range of credential technologies. An example is the HID Signo line, which supports HID Mobile Access via native Bluetooth and Near Field Communication (NFC) capability. It also includes Apple's Enhanced Contactless Polling (ECP) application to support credentials in Apple Wallet.

Future-proofing solutions to improve adaptability. An example of the value of solutions that enable organizations to prepare for the future is Vanderbilt University. The institution tapped HID Global in 2014 to help implement a mobile access solution using HID Mobile Access, powered by Seos® credential technology. It was deployed alongside a reader infrastructure comprising HID® Signo™ readers, HID iCLASS SE® readers, and OMNIKEY® desktop readers to manage access to buildings. The university later wanted to add support for credentials in Apple Wallet without compromising the existing access infrastructure or its security. Using HID Reader Manager, this helped to upgrade firmware on the university’s physical access control readers to extend support for NFC-based credentials in Apple Wallet.

Physical ID cards will endure, with inkjet technology expanding personalization options. Nearly 78 percent of respondents in an HID user survey said they would rather be issued both a physical card and mobile ID rather than one or the other. In some environments, such as hospitals, physical photo ID badges are mandatory and must be displayed above the waist for quick visual identification. Not only will physical cards endure, but there will be more choices for producing them.

The latest inkjet printers for industrial card personalization deliver better quality at lower cost than ribbon-based technology, along with easier deployment, upgrades, and maintenance than possible with large central issuance machines. Inkjet technology is also bringing the broader benefits of personalized, secure ID cards to much smaller organizations. They print on the same standard, off-the-shelf polyvinyl chloride (PVC) stock used for most of the world’s corporate IDs and campus cards but replace print ribbons with snap-in ink cartridges that simplify printer use and maintenance while offering more control over per-card costs.

A changing workplace combined with new ways to create, issue, and manage trusted identities will continue to transform access control and enable buildings to become even smarter and more data-driven places. As organizations more tightly integrate access control systems with their advanced smart building solutions, what were previously separate solutions for security and workplace optimization are coming together to reflect the simplicity, scalability and universality of mobile apps. Meanwhile, physical ID cards will continue to play an important role alongside mobile IDs on phones, watches, wristbands and other devices, and will be easier to create and personalize using the latest inkjet printers.

This article originally appeared in the November / December 2021 issue of Security Today.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.