Digital Transformation

Digital Transformation

Five access control trends to watch for in the coming year

The global pandemic accelerated a worldwide digital transformation that has simultaneously reduced or eliminated physical touchpoints and in-person contact. Meanwhile, today’s definition of physical security has expanded to address the user experience, as access control technologies evolved to enable myriad new building services that can be accessed through people’s mobile phones and other devices. These two dynamics are driving five major trends in access control.

Tapping into touchless technology. As the world reoriented its digital transformation to a touchless experience during the pandemic, this spawned new use cases that benefit from the safety, security, convenience, and efficiency of contact-free interactions with both the physical and digital worlds. Biometrics will be an important addition to this model and advance the security and convenience of these touch-free experiences, from opening doors and printing documents to interacting with connected buildings and digital consumer services, and implementing physical distancing and contact tracing protocols.

Identity is the new perimeter. There had been a change in the workplace even before the pandemic, as secure workplace access is defined less by the workplace physical perimeter. Instead, identity had become the new perimeter. In many cases it is the only perimeter. Protecting this new perimeter requires a new approach that unifies both physical and cyber/IT access through a single physical identity and access management solution. As part of this approach, identity management for a secure, safe, and productive workforce environment requires three key elements: credential management, multi-factor authentication and secure visitor management.

Greater choices for streamlining security. There is growing demand for simple and cost-effective physical security frameworks that support multiple form factors and communication protocols. Physical access cards are a good example. Organizations that choose feature-rich, multi-technology cards can follow a smooth migration path from vulnerable legacy. Also, low-frequency 125 kHz-based systems to a modern and secure technology with multi-application support, at their own pace. Readers also must support this kind of migration path, by supporting the widest possible range of credential technologies. An example is the HID Signo line, which supports HID Mobile Access via native Bluetooth and Near Field Communication (NFC) capability. It also includes Apple's Enhanced Contactless Polling (ECP) application to support credentials in Apple Wallet.

Future-proofing solutions to improve adaptability. An example of the value of solutions that enable organizations to prepare for the future is Vanderbilt University. The institution tapped HID Global in 2014 to help implement a mobile access solution using HID Mobile Access, powered by Seos® credential technology. It was deployed alongside a reader infrastructure comprising HID® Signo™ readers, HID iCLASS SE® readers, and OMNIKEY® desktop readers to manage access to buildings. The university later wanted to add support for credentials in Apple Wallet without compromising the existing access infrastructure or its security. Using HID Reader Manager, this helped to upgrade firmware on the university’s physical access control readers to extend support for NFC-based credentials in Apple Wallet.

Physical ID cards will endure, with inkjet technology expanding personalization options. Nearly 78 percent of respondents in an HID user survey said they would rather be issued both a physical card and mobile ID rather than one or the other. In some environments, such as hospitals, physical photo ID badges are mandatory and must be displayed above the waist for quick visual identification. Not only will physical cards endure, but there will be more choices for producing them.

The latest inkjet printers for industrial card personalization deliver better quality at lower cost than ribbon-based technology, along with easier deployment, upgrades, and maintenance than possible with large central issuance machines. Inkjet technology is also bringing the broader benefits of personalized, secure ID cards to much smaller organizations. They print on the same standard, off-the-shelf polyvinyl chloride (PVC) stock used for most of the world’s corporate IDs and campus cards but replace print ribbons with snap-in ink cartridges that simplify printer use and maintenance while offering more control over per-card costs.

A changing workplace combined with new ways to create, issue, and manage trusted identities will continue to transform access control and enable buildings to become even smarter and more data-driven places. As organizations more tightly integrate access control systems with their advanced smart building solutions, what were previously separate solutions for security and workplace optimization are coming together to reflect the simplicity, scalability and universality of mobile apps. Meanwhile, physical ID cards will continue to play an important role alongside mobile IDs on phones, watches, wristbands and other devices, and will be easier to create and personalize using the latest inkjet printers.

This article originally appeared in the November / December 2021 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3