Security Technology Executive

FEB-MAR 2018

Issue link: https://securitytechnologyexecutive.epubxp.com/i/956571

Contents of this Issue

Navigation

Page 38 of 61

www. SecurityInfoWatch.com • Februar y/March 2018 • SECURIT Y TECHNOLOGY E XECUTIVE 37 The Panel T he past year has certainly been an interesting one with regards to technology innovations on the access control front – from an American-based company offering RFID implants to its employees for both physical and logical access to Apple making the long- anticipated announcement that it would finally open its NFC chip for third-party developers beginning with the iPhone 7 and iPhone 7 Plus. However, unlike other product segments in the industry where early adopt- ers are willing to serve as beta test sites for bleeding-edge products in exchange for the ancillary benefits they may provide, access control remains the security backbone for most organizations and as such, end-users are much more hesitant to deploy what they see as unproven technologies. It is clear though that many businesses are ready and willing to migrate from legacy systems to newer, more proven solutions, such as hosted and managed access control offerings, which have garnered increasing interest across the industry in recent years. So, what technologies and trends stand to gain the most traction in 2018 and beyond? SecurityInfoWatch.com (SIW) recently con- vened a panel of industry experts to get their thoughts on the current state of access control and where the market is headed moving forward. What trend do you expect will influence the access control market the most in 2018? Kane: 2018 will see a shift in access con- trol management from a siloed system with- in a security department to the inclusion of technologically advanced teams in charge of network security. Trained IT specialists and CIOs offer valuable input when it comes to security decisions. A strong relationship between access control and network security professionals is invaluable as interconnec- tivity between devices continues to progress and cybersecurity threats grow in severity and complexity. Boriskin: It has grown slowly over the last few years, but the use of mobile as a secu- rity credential will receive a lot of attention in 2018. From the integrator 's perspective, they look at mobile and see the opportunity in that expensive piece of hardware already in their possession. In this case, the question becomes why not use this as a tool to config- ure, update, monitor and deploy devices? It becomes a powerful tool that they can only benefit from by leveraging it. From a technology perspective, we can look to the residential market as an exam- ple. This is where we now see technologies that allow a homeowner to control lighting , heating , cooling , and more from a mobile device. The question we start to ask is if we can do this in our homes, why can't we do it in our office where we spend eight or more hours a day? Arcement: The move away from de facto Wiegand to the Open Supervised Device Protocol (OSDP) standard is poised to be a major disrupter for access control in 2018. High profile exposure of legacy Wiegand vulnerabilities, combined with the desire for a more connected experience when man- aging readers, have driven demand for the OSDP standard. Many manufacturers have now adopted OSDP and early adopters have proven its viability and benefits. Laughlin: Continuing from 2017, cloud- based, fully hosted and managed access control and monitoring solutions will be the most powerful trend. This is changing the way access control systems are deployed and used because it reduces the complexity of implementing an integrated access control and security system. Gaulden: The adoption of more intelligent devices being incorporated into the access control solution will drive a more IoT cen- tric model. These devices will help expand the use and scope of access control systems beyond traditional security and help start to drive a better understanding of the environ- ment, including throughput and efficiency. More intelligent devices will also help gener- ate better service and customer satisfaction ratings as these devices will help troubleshoot and assist the integrator in understanding the problem before they deploy. What kind of impact do you expect the recent announcement of Apple opening up its NFC chip will have on the adoption of mobile access control solutions? Arcement: Although the interest and growth in mobile access control is acceler- ating , Apple's recent announcement will not yet have an impact on mobile access adop- tion. Apple has supported NFC in devices Brandon Arcement, Director of Product Marketing, HID Global Peter Boriskin, VP of Commercial Product Management, ASSA ABLOY Mitchell Kane, President, Vanderbilt Robert Gaulden, Director of Aftermarket and Electronic Sales, Allegion Robert Laughlin, President, Galaxy Control Systems

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - FEB-MAR 2018