SJUK hears from Tim Norris, Vice President, Global Product Marketing at Brivo speaks about the key trends and future of access control.
What is the future of access control?
Our recent research into Global Security Trends found a desire to integrate existing systems to better manage people and facilities.
They want, for example, for security and human resources to be able to work together to make onboarding and offboarding simple.
At the base level core business services like security and access control are a part of every aspect of integration.
Cloud-based access control has many advantages. It means connecting systems to business systems, including HR, identity, cybersecurity, workflow engines and more.
It means not having to deploy lots of local instances of software and firmware is always up to date.
Using the cloud to communicate with the access control panel and verify credentials means streamlining the access control process.
It’s simple to lock or unlock doors, add or remove credentials from the whitelist and even change where a credential will work.
Many businesses have areas where only some employees should have access and this can quickly become a real pain when the requirement changes for the business or an employee.
Managing multiple sites is easier too, which is vital for growing businesses and those with different types of site—not just offices, but factories, warehouses and more.
Without a cloud-based approach, security teams often must be on-site to make changes to the level of security.
Plus, flexible working isn’t always about working from home.
If an employee wants to work in an office on the other side of the country for a few months, the access part of moving offices can be made far simpler with the use of the cloud.
Cloud-based access control can also be integrated with video surveillance technology, identity management schemes and can use mobile devices as access credentials.
And while an access credential in a mobile wallet is convenient, it’s increasingly useful as a security tool.
Security and user convenience is something that’s often seen as a balance, but it shouldn’t be.
Convenience is key.
If any kind of security is difficult to use, the first thing users will try to do is subvert it, whether they’re using a personal laptop for sensitive work, or wedging open a secure door because it’s awkward to use.
Some may complain that it’s the scourge of the modern world, but people carry their mobile devices everywhere.
If access credentials are stored on a mobile, then they are easily accessible too.
They will also be as secure as those devices.
They will be locked behind the likes of Face ID and fingerprint technology and far less likely to be loaned out to a colleague in the same way as a fob or card.
Brivo has launched mobile apps for both Android and iOS, so our customers can take advantage of smartphone ubiquity. Users don’t need a card or a fob—saving on the initial cost and the cost of replacement.
AI will be used in specific use cases to make security easier and free up human resources so they can make more valuable use of their time.
Reporting will be replaced by natural language search. Rather than detailed reports that must be analysed, AI will be able to summarise quickly.
Anomaly detection will prioritise follow-up actions from this reporting, and AI will mean fewer false positives.
AI will be able to make sense of interconnected building systems, with more data allowing for more intelligent building management and operations.
As for identity, we often use credentials outside of the use they were originally designed for.
So, it’s very common to use a driving licence to buy restricted items, such as alcohol. A passport can be used as identification to open a bank account.
While today, we often have cards and key fobs for specific uses, in the future we will be able to use credentials more widely, enabled by mobile.
The use of AI and identity in access control will offer flexibility and convenience.
But while the conversation around these concepts tends to be around the needs of employees, there is also a need for the same for businesses, so they can better understand their security and have greater control with less effort.
This article was originally published in the May Edition of Security Journal United Kingdom. To read your FREE digital edition, click here.
Click to Open Code Editor