Account
Please wait, authorizing ...

Don't have an account? Register here today.

×

Close the entrance to intruders: in facilities and networks

Latin America. The rapid evolution of access control technologies, in particular the shift from a closed system to an open IP-based architecture, has enabled a new set of possibilities for end users. 

Modern access systems offer an open communications architecture, designed to enable the deployment of advanced equipment such as IoT devices. The benefits are clear; access control technology can be connected to other devices on a network and interact to develop effective solutions. That is why, this type of physical security technologies have had a rapid growth in recent years: with a minimum investment in solutions, companies can count on high intelligence.

A clear example is to closely integrate an access control solution with video surveillance technology. This helps verify that the person trying to access the facility is the one listed on an ID card. Beyond physical security, interaction with other systems, such as HR software, can help organizations detect potential intruders by identifying that the credentials of an employee who may be on vacation are being used to try to enter. But what is the real picture of the transition from physical technologies to IP-enabled access control solutions?

Preventing cyber attacks
The problem with adding any technology to an IT network is the likelihood of enabling an access point or backdoor to a company's sensitive data to criminals or other cyber threats, if it is not deployed correctly. That is why, as IoT technologies are increasingly used, cybersecurity has become a real challenge for companies. Really, a company's future could depend on its ability to protect personally identifiable information (PII) that is generated and stored in a device's database and access control system. With the General Data Protection Regulation (GDPR) coming into action next May, ensuring security policies are up to date has become a priority.

- Publicidad -

When technology, whether access control, physical security, or any other IP device, is connected to a network, cybersecurity risks are immediately increased. To cite one example, last year it was discovered that nearly 200,000 internet-connected security cameras could allow cybercriminals to control them remotely. Located on an IT network, they could also act as an entry point to other systems within a company, meaning that data protection policies become essential.

Ensuring cybersecurity
Securing any device that is on a network is vital to ensure data protection. Cybercriminals could not only access and steal data related to the system they infiltrate, but they could also access other IT systems within a company. A "safe by default" design scheme is essential for any technology used today. However, the cybersecurity element of a modern company is a process that extends beyond a product-driven approach.

True security requires collaboration between the user and the manufacturer: no device, despite being secure by default, will remain so with the default passwords unchanged, for example. Any company that wants to install devices connected via IP, be it access control, video surveillance, or audio systems, should also ensure that the manufacturer and vendor you work with prioritize cybersecurity. In short, if your processes, systems, and suppliers aren't secure, your business won't be either.

By John Allen, Business Development Manager - Access Control, Axis Communications

Santiago Jaramillo
Author: Santiago Jaramillo
Editor
Comunicador social y periodista con más de 15 años de trayectoria en medios digitales e impresos, Santiago Jaramillo fue Editor de la revista "Ventas de Seguridad" entre 2013 y 2019.

No thoughts on “Close the entrance to intruders: in facilities and networks”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS

Webinar: NxWitness el VMS rápido fácil y ultra ligero

Webinar: Por qué elegir productos con certificaciones de calidad

Por: Eduardo Cortés Coronado, Representante Comercial - SECO-LARM USA INC La importancia de utilizar productos certificados por varias normas internacionales como UL , Ul294, CE , Rosh , Noms, hacen a tus instalciones mas seguras y confiables además de ser un herramienta más de venta que garantice nuestro trabajo, conociendo qué es lo que certifica cada norma para así dormir tranquilos sabiendo que van a durar muchos años con muy bajo mantenimiento. https://www.ventasdeseguridad.com/2...

Webinar: Anviz ONE - Solución integral para pymes

Por: Rogelio Stelzer, Gerente comercial LATAM - Anviz Presentación de la nueva plataforma Anviz ONE, en donde se integran todas nuestras soluciones de control de acceso y asistencia, video seguridad, cerraduras inteligentes y otros sensores. En Anviz ONE el usuario podrá personalizar las opciones según su necesidad, de forma sencilla y desde cualquier sitio que tenga internet. https://www.ventasdeseguridad.com/2...

Webinar: Aplicaciones del IoT y digitalización en la industria logística

Se presentarán los siguientes temas: • Aplicaciones del IoT y digitalización en la industria logística. • Claves para decidir el socio en telecomunicaciones. • La última milla. • Nuevas estrategias de logística y seguimiento de activos sostenibles https://www.ventasdeseguridad.com/2...

Sesión 5: Milestone, Plataforma Abierta que Potencializa sus Instalaciones Manteniéndolas Protegidas

Genaro Sanchez, Channel Business Manager - MILESTONE https://www.ventasdeseguridad.com/2...
Load more...
SITE SPONSORS










LATEST NEWSLETTER
Latest Newsletter