Account
Please wait, authorizing ...

Don't have an account? Register here today.

×

What does a modern access control system look like?

HIDWe analyze all the factors to take into account to identify a system that has the most recent developments.

By Alejandro Espinosa*

When an organization installs an access control system, it does so basically thinking about three purposes:

The first is to take care of the physical integrity of people; that is, to prevent them from attacking someone. The second is to protect company information: databases, sensitive material, etc. Finally, it is done to guard the assets of the company, such as electronic equipment or any other good that is saleable.

- Publicidad -

Thus, different means are used to monitor and control people's access to a facility. Decades ago, lock and key systems were used; however, in addition to being vulnerable, stolen or lost keys represented additional expenses for businesses.

Then, the way the world worked and interacted with technology, and even the way crime attacked, changed, and access control migrated to more robust systems with electronic credentials or biometric identification to grant or deny entry to a building or property.

It is worrying, not to say risky, that in the middle of 2020 many organizations will protect themselves with security systems designed in the last century. For that reason, we will present some recommendations for implementing a modern access control system and its features.

How much should I invest for an access control system?
Before implementing a system, it is necessary to reflect on the needs and cost of the investment. In matters of technology, when the risks are unknown, it is very likely to end up leaning towards the price factor.

It's clear: you can't have high security expectations with little investment. Unfortunately, in the market there are suppliers commercializing outdated and vulnerable technology, which generate confusion in users, which results in economic losses; either because of the vulnerability they represent, because of their after-sales service (some do not even have support in Spanish) or because of the operational problems they generate.

An example of the above idea is readers, in the case of biometrics, if the fingerprint sensor is of low quality, it will not have enough reference points to make a quick authentication, generating queues; and in the case of card readers, they will only accept legacy technologies, without any security, promoting the cloning of cards, a frequent crime in Latin America.

That's why it's important to think in the medium and long term, and analyze the return on investment from the question: what would be the costs of not protecting the data, assets and people of my organization?

- Publicidad -

A secure system
A secure access control system is one that is end-to-end encrypted, this is achieved, first of all, with an identification technology (biometric or card) that guarantees that it is not duplicable or can be cloned; then with the communication between the reader and the control panel, which must be encrypted and monitored using standards such as OSDP (Open Supervised Devise Protocol), and finally with a software that offers the security levels to keep the database protected, whether it is a client-server solution or in the cloud.
To call a system 'modern' you must first ensure that each of these elements that compose it are safe and that its operation is proven in the market.
To ensure this reliability, technologies that establish, verify, and manage identities must be chosen; that is, that they endorse a complete management of credentials throughout the life cycle of the identification: from the moment the reliability is established until the withdrawal of a credential.

A modern system must have strong multi-factor authentication and not disrupt user workflow or productivity.

Open and closed access control system
There is a belief that, by implementing an access control system with a private label, the organization will feel trapped and will not be able to buy credentials or readers from any merchant.

However, the question would be: how secure is an open system? Well, if that 'freedom' puts the whole system at risk, it would be an illusory benefit and would disarm the entire purpose of the project.
For example, if organizations have open databases: transactions, names, identification numbers, etc., and if apart from the hardware is vulnerable, then criminals can manufacture cards with the data of an employee and the photo of the imposter to enter a building.

To avoid the above, brands that offer protocols and closed inscriptions can be used to increase security; however, it must be clarified that it is not a "total closure", sometimes protocols are created to access the information, all with the aim of protecting the integrity of the data.

What are authentication factors?
For an identification process, whether physical or digital, the identity of the person making the request is verified. That verification can be executed using one or more authentication factors.
Authentication factors can be divided into:
• What I know: the knowledge the person has, can be a PIN, a password or a pattern.
• What I have: the id that an individual possesses to certify that it is him, such as a physical or virtual credential.
• What I am: The person's unique bodily traits that are used to verify identity (biometrics).

- Publicidad -

To increase the level of security, modern systems implement several authentication factors at access points, combining 'what I have' with 'what I know' and 'what I am'.

On the other hand, it is worth mentioning that one of the biggest trends in recent years is mobile access control, which consists of using a mobile device (a cell phone, a tablet or a smart watch) to access doors, gates, networks, services and other spaces of restricted access.

In addition to the use of mobile devices, which by their nature require at least one authentication factor, this modality represents the commitment to provide comfort and convenience to users, a fundamental pillar in today's access control systems.

It is important to clarify that the application that supports a mobile credential must have cryptographic security, which also prevents an identification from being transferred to another device.

By the way, one of the most frequently asked questions related to this type of system is: what happens when the person loses or has their mobile device stolen? Well, thanks to the system management software, security managers can grant or overthrow identities, in addition to controlling the doors by time, privileges, level of access, etc.

When the system uses an extra identity management platform, the privileges of both platforms must be removed, although currently the market offers cloud management software that can already link both platforms.

How to ensure a long service life of access control systems?
Finally, when we talk about useful life in access control, the most important thing is to regulate the voltage of an installation. Controlling that the system has a regulated energy is synonymous with guaranteeing a long service life of the system.

That is why it is recommended to have voltage regulators, power supplies and backup batteries for the readers and the control panel: to withstand electrical failures and voltage peaks. This is crucial when the energy returns after a fall, since it comes back very strongly, and that is when the systems are damaged.

On the other hand there is the dust factor. The recommendation is to have control panels with perfectly sealed cabinets. In this way, the useful life of this equipment is also guaranteed.

* Alejandro Espinosa, Sales Director of the Physical Access Control Business Unit for Northern Latin America at HID Global.

 

Duván Chaverra Agudelo
Author: Duván Chaverra Agudelo
Jefe Editorial en Latin Press, Inc,.
Comunicador Social y Periodista con experiencia de más de 16 años en medios de comunicación. Apasionado por la tecnología y por esta industria. [email protected]

No thoughts on “What does a modern access control system look like? ”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS

Webinar: NxWitness el VMS rápido fácil y ultra ligero

Webinar: Por qué elegir productos con certificaciones de calidad

Por: Eduardo Cortés Coronado, Representante Comercial - SECO-LARM USA INC La importancia de utilizar productos certificados por varias normas internacionales como UL , Ul294, CE , Rosh , Noms, hacen a tus instalciones mas seguras y confiables además de ser un herramienta más de venta que garantice nuestro trabajo, conociendo qué es lo que certifica cada norma para así dormir tranquilos sabiendo que van a durar muchos años con muy bajo mantenimiento. https://www.ventasdeseguridad.com/2...

Webinar: Anviz ONE - Solución integral para pymes

Por: Rogelio Stelzer, Gerente comercial LATAM - Anviz Presentación de la nueva plataforma Anviz ONE, en donde se integran todas nuestras soluciones de control de acceso y asistencia, video seguridad, cerraduras inteligentes y otros sensores. En Anviz ONE el usuario podrá personalizar las opciones según su necesidad, de forma sencilla y desde cualquier sitio que tenga internet. https://www.ventasdeseguridad.com/2...

Webinar: Aplicaciones del IoT y digitalización en la industria logística

Se presentarán los siguientes temas: • Aplicaciones del IoT y digitalización en la industria logística. • Claves para decidir el socio en telecomunicaciones. • La última milla. • Nuevas estrategias de logística y seguimiento de activos sostenibles https://www.ventasdeseguridad.com/2...

Sesión 5: Milestone, Plataforma Abierta que Potencializa sus Instalaciones Manteniéndolas Protegidas

Genaro Sanchez, Channel Business Manager - MILESTONE https://www.ventasdeseguridad.com/2...
Load more...
SITE SPONSORS










LATEST NEWSLETTER
Latest Newsletter