Creating Cloud Platforms

Creating Cloud Platforms

Access control and trusted workplace share responsibility of innovation

Cloud technologies are giving people access through their mobile phones and other devices to a variety of new experiences, while making their workplaces smarter and more data-driven. With the advent of identity- and location-aware building systems, virtual assistants, and “personal IoT” solutions that recognize people and customize their office environment based on deep learning analytics, the workplace is undergoing a period of unprecedented change.

Until now, though, these capabilities could generally only be developed and delivered on an office-by-office, facility-by-facility or, at most, company-by-company basis. This all changes as mobile identities move towards greater adoption plus when an installed base of millions of physical access control system (PACS) readers, controllers, panels and locks, worldwide, are connected to the cloud and IoT and married with location services capabilities. This trifecta provides the opportunity to create a common cloud platform upon which developers can build, deliver and manage innovative and data-driven trusted workplace solutions.

Physical Access Control Transformation

It has been estimated that by 2020, 20 percent of physical access control solutions will be shaped by mobile technology and cloud architectures. Early adopters such as universities and co-working spaces are now even moving to “mobile-only” access-control system models due to the benefits around integrating numerous applications into a unified mobile experience.

First, cloud-based platforms will ensure identity-aware, seamless and more consistent service delivery and user experiences while improving how identity solutions are delivered. For example, bridging biometrics and access control has been challenging in the past, because it requires a trusted platform designed to meet the concerns of accessibility and data protection in a connected environment. These barriers can be addressed through a secured and connected cloud architecture that can remotely manage all readers and users (including onboarding, template loading and enrollment activities for supported authentication modes).

Second, cloud platforms will provide the backbone for quickly adding complimentary applications like secure print, virtual photo ID, and vending as well as other access control use cases and emerging permission-based transaction capabilities yet to be developed. These platforms also give organizations greater flexibility to upgrade their security infrastructure, scale it as they grow, improve maintenance and efficiency, and get the most out of their investments. Key among these is a location services platform that delivers high-value data for a host of new applications and capabilities.

A third benefit of multi-tenant cloud platforms is the opportunity to adopt new, more flexible subscription models that could enable users to more easily replenish mobile IDs if their smartphones are lost or must be replaced. These models have the potential to streamline forecasting, budgeting and reporting while pushing mobile credentials from a product-based model to more of a service-based approach (which also helps organizations move cost from a CAPEX budget to a “pay-as-you-need-it” OPEX line item). Mobile ID subscriptions have the potential to be transferrable across an organization’s employees, and they can be more convenient for administrators to register multiple mobile IDs across multiple devices—whenever they need to and without having to place replenishment orders.

Another example can be seen in cloud-based ID card issuance platforms that give users the option for hardware, software and other resources to be leased and their costs bundled into a service offering billed on an annual or monthly-installment basis. The service model not only cuts multiple layers of program costs but also makes it easier for administrators to scale the card office to accommodate future technology capabilities or changing volume demands.

Finally, cloud-based access control will be accompanied by simplified development environments that are designed for easy integration into vertical solutions. This will fuel innovation and a new way to look at workplace design as the convenience of mobile apps is married to the power of insights derived from data analytics (from both location services and access control devices that are connected throughout the workplace). The result: a more intuitive and seamless service delivery, better workflow planning, regulatory compliance, remote hardware configuration, predictive access control system maintenance capabilities. This is in addition to other exciting new operational advances that will benefit the entire access control chain—from application developers to end customers.

Enabling a New Chapter in Physical Access Control

Millions of installed physical access control devices are poised to become a global cloud platform for trusted workplace innovation. They first must be connected to the cloud and supported by software developer kits (SDKs) and open application programming interfaces (APIs).

To enable these connections to cloud-based services, IoT functionality will be embedded in access control panels as app extensions. With these IoT connections, access control systems will deliver realtime data to the cloud, which will facilitate remote diagnostics and a more predictive approach to system maintenance and help protect against emerging vulnerabilities.

The complexity of reader configuration will be dramatically simplified: no longer will it be necessary to guess at the current reader configurations or make manual and time-consuming changes to them. Cloud-connected readers will enable remote inspection or changes to the reader configuration and updates to reader firmware.

These cloud connections will also enable access control systems to join advanced smart building solution set through cloud-based monitoring applications that deliver robust analytics capabilities used to proactively pinpoint and troubleshoot potential system failures. The applications will also monitor secure connections between access control peripherals and trigger firmware updates to address potential cyber threats.

With a cloud connected hardware foundation in place, there will also be a faster, more simplified path from design to deployment, transforming how products and solutions are developed, marketed and scaled across the enterprise, as well as how they are adopted and used. Developers will shift from having to create an entire vertically integrated solution to simply layering an app experience on top of an existing access control infrastructure already connected in the cloud and made easily available through APIs and SDKs. This will fuel market-making opportunities as new players are attracted to the space beyond traditional physical and IT security integrators, resulting in a richer and more vibrant development community focused on bringing to market new and innovative solutions. This community will be supported by new kinds of tools and services for integration enablement and support as compared to the traditional physical access control marketplace.

With this model, the industry will move beyond siloed security and workplace optimization solutions to simplicity, scalability and universality of mobile apps that can be downloaded anywhere across a global footprint of millions of compatible physical access control system endpoints that are all connected in the cloud and IoT.

The relationship between PACS technology suppliers and their integration partners will also evolve. A growing developer community will be able to access a comprehensive offering of integration enablement services, access control cloud services, engineering and IT/ operations resources, sales and pre-sales support, and other customer care support (see Fig. 2).

An Early Adoption Path

Among the most attractive early adoption paths for leveraging cloud platforms in access control are co-working solutions that enable building occupants to use their smartphones to access facilities, book desks, private offices and meeting rooms, and unlock them at the time of their specific appointment.

One example of this type of co-working environment is the Deskopolitan office building in Paris, which serves entrepreneurs who need professional, reliable working spaces to build their businesses. Deskopolitan uses HID Mobile Access to enable building occupants to access their co-working campus in the heart of Paris, conveniently and securely, expanding how occupants and tenants engage, interact and work in their more intelligent workspaces. Deskopolitan can easily provision or revoke mobile IDs, streamlining management with zero compromise on security.

In a similar example, the international property management group Skanska is using HID technology for secure access throughout its new office complex. The company selected HID Mobile Access due to the ease of integrating all of its building applications into a unified mobile experience, including secure access to its parking garage, virtual reception capabilities, access to offices, and other IoT functionality. Today, employees and their guests can now move throughout the building with nothing more than a smartphone and enter restricted areas to which they have been given access rights.

The Honeywell Vector Occupant App is another great example of how mobile IDs and a cloud platform are making it possible for building occupants to use their mobile devices for card-free secure access to a single area of a building, an entire facility or multiple locations around the globe. HID Global partner Datawatch Systems continues to transform the tenant experience across numerous high-rise buildings in the United States, where they have deployed Mobile IDs at major commercial properties to address the increasing demand for property management companies and tenants seeking better ways to interact with buildings where people live and work. The Datawatch system can also be used to analyze HVAC load requirements based on when someone enters or exits a suite or common area and adjust temperature settings accordingly—as well as turn off lights when the last person leaves the area.

Access Control of the Future

Cloud platforms are giving facility managers more information about how their buildings are used for workplace optimization, wayfinding within large campuses and other applications. They are also fueling new opportunities to dramatically expand choices for organizations to get the most out of their physical access control investments by providing the backbone for adding new and emerging technologies, while improving how identity solutions are delivered. A trusted, cloud-connected workplace that utilizes an ecosystem of millions of readers and other devices, applications and trusted mobile identities (Mobile IDs) also give organizations greater flexibility to scale their security infrastructure as they grow, improve workplace efficiency, and enhance their security.

This new world will also provide a rich environment in which developers can continually build innovative applications for the trusted workplace. At the same time, it will usher new ways to innovate, develop and deploy solutions that deliver seamless, even more secure and consistent user experiences, flexible service subscription models, a new way to look at workplace design, and more simplified path from design to deployment in the access control developer community.

This article originally appeared in the October 2018 issue of Security Today.

Featured

  • Making the Grade with Locks and Door Hardware

    Managing and maintaining locks and door hardware across a school district or university campus is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Knowing the basics of common door hardware, including locks, panic devices and door closers, can make a difference in daily operations and emergency situations. Read Now

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3