Security Technology Executive

FEB-MAR 2018

Issue link: https://securitytechnologyexecutive.epubxp.com/i/956571

Contents of this Issue

Navigation

Page 41 of 61

technologies advancing—and the cost for these technologies decreasing—electronic access control possibilities will expand once again. Arcement: Among the most exciting areas of development will be the use of data for predictive analytics and artificial intelligence (AI) to fuel risk-based intelligence and individualized access control capabilities. We will also see more focus on securing the IoT at the edge as new use cases replace traditional systems to drive the digital transformation. More organizations will embrace the benefits of the cloud, and we will see more focus on identity protection to combat cybersecu- rity threats, identity theft and fraud. Europe's Gen- eral Data Protection Regulation (GDPR) will be a major force in driving compliance activities; it will serve as a catalyst for ensuring that products and systems support new privacy-by-design mandates that require end-to-end security. Kane: We saw an increase in cloud-based applications in access control this past year and this type of technology innovation will continue to expand in use throughout 2018. As they gain acceptance across the industry, mobile credentials, hosted solutions and intelligent locking systems will contribute to more streamlined, technologi- cally advanced hardware and software solutions. End-users, integrators and other security pro- fessionals must realize the advantages of and embrace the advanced technologies we'll see in abundance this year. 40 SECURIT Y TECHNOLOGY E XECUTIVE • Februar y/March 2018 • www. SecurityInfoWatch.com ACCESS CONTROL to both select secure, standards-based technology and deploy it in a secure manner. To protect the industry, it is crucial to be willing to transparently discuss the weaknesses in legacy tech- nology. Lastly, organizations concerned about cybersecurity threats are becom- ing more proactive in seeking trusted manufacturers and partners who have security expertise. Equally, organiza- tions are looking for products and solutions that are developed using a security-by-design methodology, and vendors who have documented respon- sible disclosure policies. Laughlin: Like any other system connected to a network, access control is potentially vulnerable to hacking and other cybersecurity concerns. It is critically important to ensure all devices are hard- ened, passwords are as secure as possible and fre- quently changed, and other cyber-hygiene measures are taken to protect the system from attacks. The increased use of phone-based credentials, which are highly encrypted, offer more security and are more difficult to copy or counterfeit than keys, access cards or other physical credentials. What are some other technology innovations on the horizon that end-users, integrators and other security professionals should be on the lookout for in 2018? Gaulden: Electronic access control solutions will be able to do more, and not just from a convenience or productivity perspective. Today, facilities utilize wired electrified hardware at main entrances for increased security and the convenience of creden- tials. Many have extended those benefits to office doors, resident entries and other interior open- ings with wireless electronic locks. With wireless About the Author: Joel Griffin is the Editor -in-Chief of Securit yInfoWatch.com and a veteran securit y journalist. You can reach him at jgriffin@southcomm.com. » As with the video surveillance industry, we have seen security vulnerabilities become increasingly common... « — Brandon Arcement, Director of Product Marketing HID Global » We saw an increase in cloud- based applications in access control this past year… « — Mitchell Kane, President, Vanderbilt

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - FEB-MAR 2018