Security Technology Executive

JUL-AUG 2018

Issue link: https://securitytechnologyexecutive.epubxp.com/i/1013012

Contents of this Issue

Navigation

Page 49 of 83

S-6 ACCESS CONTROL TRENDS AND TECHNOLOGY 2018 JULY/AUGUST T en years ago we hosted a technology roundtable on SecurityInfoWatch.com discussing the migration of access control technology to "web-based" platforms and the impact this new digital approach to controlling ingress and identifying users would have on enterprise organizations. We wrote: "The complexities of planning and implementing an integrated access control pro- gram are becoming much more intense. Rapid technology advancements have forced security directors to reassess what the term access con- trol really means in the context of their business environment. A new world of internal partner- ship between IT and corporate security directors has facilitated the integration of biometrics and smart cards into the access control landscape. Web-based options have also enabled the global expansion of the security function." Of those participating on our panel a decade ago – Tyco Safety Products and Access Control, GE Security, Johnson Controls Fire & Security Solutions, PCSC, Hirsch Electronics, UTC and HID Global, only HID Global remains as a dynam- ic force in the industry. Others are either rebrand- ed or just footnotes in security industry history. But the past decade, that has been highlighted by tumultuous M&as, advancing technologies and even more interoperability and integration has also demonstrated the undeniable impact the IT revolution had – and is still having – on the access control industry. Still, how did these security executives see the access control future back in 2008? One global marketing VP stated that Web- based services introduced a whole new dimen- sion to information access and sharing within an organization. The three-to-five-year future would include further integration with other enterprise systems and third-party integration. "But keep in mind that the Web is not the ideal interface for every aspect of an access control system. At times other data is needed to help inform decisions. Additionally, for functions requiring device interactions like capturing photos or reviewing video, controls must be downloaded onto the machine, which means it is not a purely Web-based solution." He added that from overall enterprise standpoint an access control solution has to have the right combination of Web-rich clients and mobile clients, which would allow the end users to pick the right interface for their needs. The CEO and founder of an access control solutions provider stressed that network security concerns would need to be resolved before Web-based systems could be fully adopted. He admitted that 10 years ago the market for Web-based access control systems had a place in the small systems security access sec- tor, adding that many of the companies requiring access control had fewer than 100 employees with the need to control less than 12 security doors. He also noted that in many instances, the security manager was the president/owner or one of its managers, where security takes a secondary role and its use becomes a tedious task. "By offering simple card access management tools and no workstation software to worry about, Web-based systems continue to mature in today's security market," said the CEO about the 2008 market. "The Web itself offers a convenient infra- structure for application communication, allowing users to access security data no matter where they are. The convenience factor will encourage higher usage and acceptance, which in turn will increase new application developments." Another marketing executive extolled the virtues of "Web-based" technology saying it was "very well suited to conventional access control." He cited three primary benefits it brought to the table: • Improved workflow by allowing non-security personnel to enter data and queue up badge addi- tions/deletions/changes for an authorized security decision-maker to simply review and approve and help in streamlining the whole paperless process. • Provide for limited access functions to authorize users of portions of the security management sys- tem from any connected Web browser and elimi- nating the need for occasional users to have physi- cal access to the full workstation environment. • Allow for improved mobility of the security staff through wireless PDA connectivity to the security system. "Because of these benefits, and others, functions will continue to migrate from dedicated security worksta- tions to Web servers," said this marketing exec. "There has been no bigger disruptor in the access con- trol systems world than the migration from clunky analog technology to the dynamic data-rich platforms of today's IP-enabled systems. The enhanced interoperability and openness this environment provides has unleashed possi- bilities we only had on the drawing tables a decade ago." This 2018 Access Control Technology supplement is full of those new worlds, spanning the spectrum from mobile and wireless to challenges of PoE based sys- tems. We invite you to read what's powering today's access control market. ¥ Steve Lasky is the Edito- rial Director of SouthComm Security Media, which includes print publications Security Technol- ogy Executive, Security Dealer & Integrator, Lock- smith Ledger Int'l and the world's top security web portal SecurityIn- foWatch.com. He is a 30-year vet- eran of the secu- rity industry and a 26-year member of ASIS. A Decade of Speculation Comes to Fruition

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - JUL-AUG 2018