Security Systems News

Source Book 2017

Security Systems News is a monthly business newspaper that reaches 25,100 security installers, product distributors, central stations, engineers & architects, and security consultants. Our editorial coverage focuses on breaking news in all major se

Issue link: https://ssn.epubxp.com/i/888468

Contents of this Issue

Navigation

Page 9 of 17

10 OCTOBER 2017 www.securitysystemsnews.com 2017 Access Control Source Book Continued from page 6 Continued from page 7 mOBiLE Jim Dearing CLOUD enabled us to evolve to where we are today. Not every player enabled us to evolve to where we are today. Not every player in the physical access space is yet equipped to take this step or is able to offer cloud solutions that can meet the stringent security and privacy regulations that we are able to deliver." Arrehed continued: "Cloud hosting allows continuous threat Arrehed continued: "Cloud hosting allows continuous threat monitoring, vulnerability scanning, advanced encryption and monitoring, vulnerability scanning, advanced encryption and monitoring, vulnerability scanning, advanced encryption and monitoring, vulnerability scanning, advanced encryption and provides various other privacy-preserving features." In addition to providing cybersecurity advantages, the cloud also provides great potential for leveraging emerging technologies. "The cloud is implicated in easier installation, greater ease of use for the users, but the other thing with the cloud is it really is the platform for everything," said Van Till. "All of the really is the platform for everything," said Van Till. "All of the interesting things that are happening with mobile are con- nected to the cloud. All of the interesting things happening with AI are happening in the cloud, so if you go through any of the advancing technology sectors, cloud is foundational to all of them. If you want to be part of AI, big data and IoT, you are going to be on a cloud platform. So saying you are not going to believe in the cloud or the cloud is not secure, you are really cutting yourself off from most of the new advances in technology generally." Arrehed believes "there is huge promise in data analytics in the context of physical access control and HID Global is investing heavily in this area in an ongoing effort to integrate data in the core of all our services," he said. "We believe that devices related to physical access control will be increasingly connected to the cloud and the data ranging from virtual/digi- connected to the cloud and the data ranging from virtual/digi- tal identities, mobile access, video streaming and biometrics, to IoT applications, BLE sensors and location services can be consolidated to and used for machine learning analytics. Combined, we believe that the data from these technologies, coupled with advanced data analytics, can provide services such as 'intention detection' for a more seamless, secure and connected user experience." Data analytics "is key to our business," noted Shillington. "I heard a quote that data is the new oil, and I firmly believe that. Now for that to be true, though, the data has to be meaningful and it has to be aggregated across a number of different vectors. Once you start to have all of that informa- tion coming into a single repository and being handled by a single management pipeline, then you can start to do some very interesting predictive analysis. Over the course of the next of year, you will see a lot more from us in that area." Hebert added that the proper aggregation of data also provides "greater operational efficiencies, business intel- ligence and business continuity" that can benefit the inte- grator from a selling standpoint and the end user from an ROI perspective. SSN cloud services in the U.S., compared to Europe and China, as the primary reason. IHS Markit provides information and analysis for defense and security companies. But while mobile access presents a whole new world in some respects, the proverbial "experience" is not without complications. There are pieces to the puzzle that remain invisible to the employee or security guard after they have secured access with a mobile device. One issue that is still evolving is credentialing and verification. Manufacturers and suppliers of mobile access devices depend on end users to hold up their end of the bargain, said Dukes, by "[making] their mobile device policies consistent across the board" to accommodate multiple phone types, or setting requirements for what type of device you must have for access. Boriskin also referred to the need for end users taking proper safeguards, while Dumas at UniKey said, "We draw the line at mobile keys. For identification management, we work with partners. … It comes down to sticking to what you are good at." The same dynamic of shared responsibility for solving market development issues exists for cybersecurity, said Dearing. "It's a two-way street," he said. "You can have all the encryption policies imaginable, but if the end user is downloading freeware or is opening himself up to vulner- abilities," the experience of mobile access will be short and unpleasant. "The only way to address this is with education," Dearing said. Dearing, with a perspective from his IHS Markit office on Shanghai, China, expects global growth in the mobile access control market, but adds, "There have been a number of barriers. … A market equilibrium has not been found yet." Others appear to be somewhere between optimistic and bullish. Just wait until the private home market matures, says Boriskin. "Beyond commercial applications, mobile access control has crossed a threshold into the domestic market for home and family use," he said. "Managing the home security automation hub—thermostats, light bulbs, and digital locks" is no longer a luxury, no longer considered bells and whistles only available to consum- ers with high-end homes. "We're getting used to home automation devices as the center of our universe," he said. "We're moving from credential to much more." Once customers have that mobile access experience at home, not having it in the commercial or industrial settings at work becomes more of a head-scratching experience, Boriskin suggests. "You come to the office and realize you have to pull out a card with your picture that is eight years old," Boriskin said. "And you ask, 'Why?'" SSN

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Systems News - Source Book 2017