Digital Transformation

Digital Transformation

Five access control trends to watch for in the coming year

The global pandemic accelerated a worldwide digital transformation that has simultaneously reduced or eliminated physical touchpoints and in-person contact. Meanwhile, today’s definition of physical security has expanded to address the user experience, as access control technologies evolved to enable myriad new building services that can be accessed through people’s mobile phones and other devices. These two dynamics are driving five major trends in access control.

Tapping into touchless technology. As the world reoriented its digital transformation to a touchless experience during the pandemic, this spawned new use cases that benefit from the safety, security, convenience, and efficiency of contact-free interactions with both the physical and digital worlds. Biometrics will be an important addition to this model and advance the security and convenience of these touch-free experiences, from opening doors and printing documents to interacting with connected buildings and digital consumer services, and implementing physical distancing and contact tracing protocols.

Identity is the new perimeter. There had been a change in the workplace even before the pandemic, as secure workplace access is defined less by the workplace physical perimeter. Instead, identity had become the new perimeter. In many cases it is the only perimeter. Protecting this new perimeter requires a new approach that unifies both physical and cyber/IT access through a single physical identity and access management solution. As part of this approach, identity management for a secure, safe, and productive workforce environment requires three key elements: credential management, multi-factor authentication and secure visitor management.

Greater choices for streamlining security. There is growing demand for simple and cost-effective physical security frameworks that support multiple form factors and communication protocols. Physical access cards are a good example. Organizations that choose feature-rich, multi-technology cards can follow a smooth migration path from vulnerable legacy. Also, low-frequency 125 kHz-based systems to a modern and secure technology with multi-application support, at their own pace. Readers also must support this kind of migration path, by supporting the widest possible range of credential technologies. An example is the HID Signo line, which supports HID Mobile Access via native Bluetooth and Near Field Communication (NFC) capability. It also includes Apple's Enhanced Contactless Polling (ECP) application to support credentials in Apple Wallet.

Future-proofing solutions to improve adaptability. An example of the value of solutions that enable organizations to prepare for the future is Vanderbilt University. The institution tapped HID Global in 2014 to help implement a mobile access solution using HID Mobile Access, powered by Seos® credential technology. It was deployed alongside a reader infrastructure comprising HID® Signo™ readers, HID iCLASS SE® readers, and OMNIKEY® desktop readers to manage access to buildings. The university later wanted to add support for credentials in Apple Wallet without compromising the existing access infrastructure or its security. Using HID Reader Manager, this helped to upgrade firmware on the university’s physical access control readers to extend support for NFC-based credentials in Apple Wallet.

Physical ID cards will endure, with inkjet technology expanding personalization options. Nearly 78 percent of respondents in an HID user survey said they would rather be issued both a physical card and mobile ID rather than one or the other. In some environments, such as hospitals, physical photo ID badges are mandatory and must be displayed above the waist for quick visual identification. Not only will physical cards endure, but there will be more choices for producing them.

The latest inkjet printers for industrial card personalization deliver better quality at lower cost than ribbon-based technology, along with easier deployment, upgrades, and maintenance than possible with large central issuance machines. Inkjet technology is also bringing the broader benefits of personalized, secure ID cards to much smaller organizations. They print on the same standard, off-the-shelf polyvinyl chloride (PVC) stock used for most of the world’s corporate IDs and campus cards but replace print ribbons with snap-in ink cartridges that simplify printer use and maintenance while offering more control over per-card costs.

A changing workplace combined with new ways to create, issue, and manage trusted identities will continue to transform access control and enable buildings to become even smarter and more data-driven places. As organizations more tightly integrate access control systems with their advanced smart building solutions, what were previously separate solutions for security and workplace optimization are coming together to reflect the simplicity, scalability and universality of mobile apps. Meanwhile, physical ID cards will continue to play an important role alongside mobile IDs on phones, watches, wristbands and other devices, and will be easier to create and personalize using the latest inkjet printers.

This article originally appeared in the November / December 2021 issue of Security Today.


  • Cloud Adoption Gives Way to Hybrid Deployments

    Cloud adoption is growing at an astonishing rate, with Gartner forecasting that worldwide public cloud end-user spending will approach $600 billion by the end of this year—an increase of more than 21% over 2022. McKinsey believes that number could eclipse $1 trillion by the end of the decade, further underscoring the industry’s exponential growth. Read Now

  • AI on the Edge

    Discussions about the merits (or misgivings) around AI (artificial intelligence) are everywhere. In fact, you’d be hard-pressed to find an article or product literature without mention of it in our industry. If you’re not using AI by now in some capacity, congratulations may be in order since most people are using it in some form daily even without realizing it. Read Now

  • Securing the Future

    In an increasingly turbulent world, chief security officers (CSOs) are facing a multitude of challenges that threaten the stability of businesses worldwide. Read Now

    • Guard Services
  • Security Entrances Move to Center Stage

    Most organizations want to show a friendly face to the public. In today’s world, however, the need to keep people safe and secure has become a prime directive when designing and building facilities of all kinds. Fortunately, there is no need to construct a fortress-like entry that provides that high level of security. Today’s secured entry solutions make it possible to create a welcoming, attractive look and feel at the entry without compromising security. It is for this reason that security entrances have moved to the mainstream. Read Now

Featured Cybersecurity


New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3