Bringing down the walls in the corporate world

Issue 4 2021 Commercial (Industry)

Today, more and more businesses are foregoing the traditional design setup of cubicles and closed-off offices for an open floor plan. Open office layouts are designed to be collaborative, inviting workspaces. These open workspaces, typically for 10 or more people, are suitable for activities that demand frequent communication or for routine activities that need relatively little concentration. While these layouts allow for flexibility, they also create some risks when it comes to security.

Open office spaces have essentially made office cubicles redundant in favour of a more collaborative and creatively engaging workspace environment. Co-working spaces commonly adopt open plan office layouts for increased productivity, flexibility and networking opportunities.

One thing is certain, having an open floor plan tips the balance between private and public and this shift affects how a company protects and safeguards personnel as well as proprietary and sensitive company information. This raises the question: what security threats does the open floor plan expose and how can security professionals manage this potential data security headache?

Access control systems are designed to protect buildings and to safeguard the equipment inside. They keep unwanted people out and give access to authorised individuals. While network and cybersecurity are important, preventing physical security breaches and threats is key to keeping technology and data safe, as well as any staff or visitors who have access to the building. Without physical security plans in place, offices or buildings are left open to criminal activity, physical security threats including theft, vandalism, fraud and even accidents.

Access starts at the front door

An effective access control system for any office, open or traditional, starts at the front door. Is the door locked? Is there a guard or are lobby personnel present? How do authorised personnel gain access? Once inside, how are movements and locations tracked? These are important questions and the requirements of an access control system depend on the answers.

Many open office plans do not have a traditional lobby and may not have a ‘front desk’, so securing the main entrance becomes particularly challenging. Traditional access control that relies on physical credentials (ID card, key fob, even a mobile phone) can solve the main entrance question, but what about once inside the building. A physical credential does little to limit access if there are no other doors or partitions to pass through.

The trend today is to include on an access control list a system that relies on biometrics for both multi-factor authentication and single-factor authentication. Historically, access control used the most reliable biometric measures (fingerprints, eye scans) almost exclusively. Over the last five years the accuracy of facial image extraction has improved and the use of stable biometric templates has elevated facial recognition beyond crowd control. Face recognition has achieved parity with the accuracy of the traditional biometric authentication systems and now meets the requirements of access control applications.

Face-as-a-Credential technology

Facial recognition is a biometric software application capable of uniquely identifying or verifying a person by comparing and analysing patterns based on the person’s facial contours. Facial recognition is considered the most natural of all biometric measurements. Facial biometrics are the preferred benchmark because the technology is easy to deploy and implement. The interaction with a facial recognition system is contactless, frictionless and extremely fast.

Detecting and capturing a face is the first task of a contactless access control system. The next and most crucial step is granting access to authorised personnel. Face-as-a-Credential technology integrates surveillance cameras, facial recognition algorithms and access control points into a powerful and completely contactless access control system. Face-as-a-Credential technology not only offers secure points of entry, but can also track the movement and locations of employees and visitors within the building. Plus, many Face-as-a-Credential systems allow for remote user registration, where visitors, contractors and delivery people can request access from their computer or phone.

While the primary goal of any access control system is the protection of people, protecting data and personal information from prying eyes, hackers is a close second. In many offices, biometrics are being used – via iris or fingerprint scanners – to protect important information from would-be hackers. This way, only authorised users have access to the information. Additionally, IT departments within these facilities are working closely with security leaders to ensure that networks are as secure as possible to protect from ransomware attacks.

Access control and physical security can go a long way to protect sensitive information, but company policies and procedures should dictate what information can be accessed where and when. Employees need to be trained effectively when they start employment and have regular refresher sessions. Communication should be encouraged and proper adherence to the rules should be rewarded. The larger the company, the greater the chance employees will find themselves working alongside different individuals on a daily basis. Physical security and data security need to be complete to mitigate the possible security risks of the open office environment.

One vendor that meets the challenge of securing an open office is Suprema, an innovator in proximity and contactless access control security. It all starts with BioStar 2, a web-based, open and integrated security platform that provides comprehensive functionality for access control. Featuring a modular, flexible framework, the platform provides a customised system depending on system scale, number of users and system structure that was used. The addition of Suprema FaceStation F2, an advanced facial recognition terminal, provides true contactless access control with the added benefits of time and attendance management, offering unrivalled matching speed, accuracy and levels of security.

Source: Suprema blog, Bringing Down Walls in a Corporate World Using Access Control, found at*suprema1


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Revamping Liberty Life’s reception area
Turnstar Systems Access Control & Identity Management Commercial (Industry)
Turnstar supplied and installed four Speedgate Express lanes, each 550 mm wide, as well as two Pulse Special Needs Gates for wheelchair access to Liberty Life.

Suprema joins FiRa Consortium
Suprema News Access Control & Identity Management
Suprema recently became a member of the FiRa Consortium, a consultative body that establishes standards for ultra-wideband (UWB) technology, the next generation of wireless communication.

AI will drive the future of access control
Suprema Access Control & Identity Management
Artificial intelligence is driving changes previously in the realm of the imagination. AI-based voice recognition and image recognition enable machines to understand and recognise things better than humans are able to.

Stability and continuity with automated failover
Suprema News
Suprema recently announced the successful integration of its BioStar 2 security platform with Mantech Continuous Cluster Server (MCCS), a high-availability solution by Korean IT service provider Mantech.

Networked devices increase cyberattack risk for building systems
Commercial (Industry)
Firms must reboot their building operations security strategies now, and building managers need an integrated approach with IT professionals including clear lines of responsibility.

Are you your insider threat?
Technews Publishing Editor's Choice Security Services & Risk Management Commercial (Industry)
Insider threats are a critical aspect of risk management today, but what happens when it is the owner of the company acting fraudulently and making sure none of his staff can catch him?

ACaaS: The future of access control systems
Suprema Access Control & Identity Management
As many SaaS-based cloud services in other industries have shown, ACaaS will improve quality, making it more convenient, safe and quick to responding to user feedback.

How to make data governance practical
Security Services & Risk Management Commercial (Industry)
For many businesses, data governance is not well received because governance programmes are often driven by supporting functions like compliance or IT, with a focus on the needs of these functions.

Dynamic Drop Arm Barrier for disabled access
Turnstar Systems Access Selection Guide Commercial (Industry)
Accommodating those who use wheelchairs, while also maintaining adequate access control into business facilities, means selecting reliable access control products that provide wheelchair accessibility.

RealScan S60 fingerprint reader
Suprema Products
Suprema’s RealScan S60 is an FBI Appendix F certified fingerprint live scanner suitable for desktop applications, also available in a module-form, making it the perfect scanner for integrating into mobile devices and biometric kits.