Access control system Top trends in secure identification

Access control System


Each year, HID Global publishes its projections on the main technology trends in secure identification for the coming year. This publication is intended to help organizations understand and take advantage of the latest advances to improve the security, convenience, and experience of their users.

six technological trends that will drive new functionalities in different markets:

·         Increased innovation, encouraged by interoperable platforms that allow partners to design new solutions (secure print authentication, access control system to electric vehicle charging stations, among others) that can be accessed with the same card or smartphone as it is used to open doors.

·         Adoption of new credential presentations.

·         Other ways to open doors and other entrances.

·         Advances in the way of managing identities.

·         Using biometrics to help security migrate from a barrier to a containment fence.

·         The growing popularity of interconnected devices, as well as the Internet of Things (IoT) and where they connect to Wi-Fi, devices that support RFID, online connected hotel locks, mobile authentication keys, are all ways to interact or capture information for the benefit of companies or consumers.

Additionally, highlighted a number of trends that can be expected in vertical market segments:

·       Banking and financial institutions: Physical and logical security will continue to converge in unified solutions, against the background of the transformation of consumer mobile banking, the migration from the United States to credit and debit cards with the EMV (Europe / Mastercard / Visa) and the implementation of the first phases of biometric authentication in ATMs.

·       Hospitals and healthcare facilities: The latest secure identity solutions will play a critical role in protecting facility information and personal health information, and will also be used outside hospitals to verify "proof of presence" in home health services.

·       Education: As the transition from magnetic stripe cards and proximity cards to high frequency contactless smart cards progresses, universities will also move IDs to smartphones and other mobile devices equipped with systems that can handle different identification numbers for different uses on different platforms.

·       Federal Government: Government updates to new and more secure access control technologies will extend from desk to door, using both cards and mobile phones. Additionally, stringent secure emission requirements will drive a growing need for certified and approved printers.

·       Government ID: Demand for high-security and end-to-end citizen identification solutions will increase around the world, along with compact industrial printers, combining flexibility and security, reduced infrastructure investment and maximized performance.

·       Transport: In the transport segment, the importance of access control based on IP technology will increase, improving security by integrating a physical access control system (PACS) with other solutions on the same network. Meanwhile, biometric systems will provide the opportunity to strengthen security and increase profitability in commercial and personal transportation applications.

·       Enterprise sector: Organizations will increasingly need to strengthen their door, data and cloud security and migrate to converged solutions, while accelerating the migration of passwords to robust forms of authentication in numerous access control system applications physical and logical.

·       Retail sector: The main concern will continue to be defending against threats such as those experienced by large retailers such as Target Corporation, which recently fell victim to cyberattacks. Other areas that will see growth are mobile IDs, Internet of Things, integrated biometric authentication, brand protection solutions that validate the authenticity of products, reliable "proof of presence" applications for digital marketing campaigns. out of home (DOOH) and instant issuance solutions for credit cards and loyalty cards.

prospects for Access Control as a Service?

What will the adoption of the cloud by the electronic access control industry look like in the coming years? Will governments ever see the value of business cloud resources? Will governments create standards and best practices to ease cross-border cloud storage restrictions? Will operating expense (opex) options open the door to greater SMB adoption? Will decreasing cost per door of access control solutions negatively impact access control as a service (ACaaS) business opportunity?

These and many other questions are being asked by providers and future users of ACaaS. However, IHS foresees that ACaaS will prevail in the long run, and estimates that until 2018 the market volume will exceed $ US 530 million, and until 2025 it will exceed $ US 1.8 billion.

Behind this growth will be the global adoption of the cloud and virtualization by other sectors (not related to security), and services related to ACaaS. IHS estimated that during the first half of 2014, multi-tenancy data centers grew by 12.7% globally. As it relates to access control, IHS estimates that commoditization of access control hardware will attract more attention to value-added services and return on investment. As a result, distributors, who have greater specialization in IT, integration and mobility (remote connectivity) will have greater growth in the long term.

Although the access control industry is slow enough to adopt new technologies, knowledge and adoption by end users is only half the battle. Unless they were born in the cloud, most integrators and installers must change that entrenched mindset of selling boxes and components, and start selling services, features, and concepts. In addition, they must know the IT side of the business and be able to answer questions about redundancy, certifications, piracy, and other buzzwords associated with cloud services and ACaaS. Although the process is not straightforward, the access control industry is already heading in this direction. For example, Starwood hotels offer mobile keys with Bluetooth,

For the questions mentioned above, the short answer is yes, and the access control industry will continue to embrace the cloud, albeit at a much slower pace than originally projected. Today, most ACaaS providers don't just specialize in ACaaS. As a result, ACaaS remains a small portion of most monitoring stations and integrator businesses. One of the reasons that these distributors do not specialize only in ACaaS is because of their low profitability, at least initially. With the ACaaS model, it is vital to have a large number of accounts, so many distributors delay offering these services until they can add more accounts.

Also, most of these providers do not have a “true cloud” model, as defined by the US National Institute of Standards and Technology (NIST). Most of these providers rely on just a few servers to provide services. Until end users begin to request and use ACaaS in bulk and integration with video and other services spreads, IHS anticipates that this non-true cloud model will suffice for most end users.

On the other hand, IHS anticipates that governments will continue to embrace the cloud, but the fact that they must figure out how to manage resources and security makes this a lengthy and expensive adventure. The US government has already embarked on this path with milCloud and other initiatives. For the EU, the European Cloud Partnership (Trust Cloud) is the starting point and a blueprint for the future.

Overall, IHS expects ACaaS to continue to grow and expand thanks to the flexibility of supply that is not provided by local solutions. For example, end users can manage the complete solution themselves and delegate infrastructure maintenance to third parties. Or they can pay an additional charge to delegate the complete management of the solution, from monitoring, printing reports, badging, granting access permissions, etc. Or they can delegate only certain tasks and include a portion (in some cases up to 100%) of the hardware cost in a monthly payment, thus lowering the barrier to entry. Growth is constrained by continued decline in cost per door (hardware), privacy concerns, web-based control panels, personalized billing,

 


Comments

Popular posts from this blog

Integrations of Suprema and Bio Star 2 teams with other platforms

Open the door to global standards in access control

Access Control with Mobile Phones: The Future with Near Field Communications