More agile, flexible access management

Issue 5 2023 Editor's Choice, Access Control & Identity Management

Efficiency, agility and convenience have become megatrends. They are important drivers across almost every area of global economic activity1. Within security and access management they play a major role in the rapid adoption of cloud infrastructure. Perhaps a third of security end users already use cloud-based software to manage access to their premises, according to one industry report2.

The motivations for cloud adoption are easy to understand. Managers want to operate from anywhere, at any time. This can be especially important in security, where unexpected issues are usually urgent, or at least time-sensitive.

Cloud management simplifies budgeting and reduces IT expenditure; its simple subscription model prevents nasty surprises in the shape of unexpected hardware or support costs. According to Polar Capital Technology Trust, the cloud “allows businesses to save the cost of having to own, maintain and manage their own data centres (servers, storage and networking) while still having the ability to provide full computing capabilities. Cloud computing is a key part of businesses’ digital transformations”.

According to the UK’s National Cyber Security Centre, cloud security services may also encourage good practice and improve resilience3.

In an economic environment where change is a constant, security management must be agile and futureproof. Cloud access control provides this. For a small or medium sized organisation, readiness to expand or pivot the use of space at any time is even more critical. The inherent scalability of a cloud solution offers a huge advantage for these businesses.

The easy way to take control

The key question is, what to look for in a cloud access management solution? The security of the cloud environment is non-negotiable. Whether self- or third-party hosted, the solution must keep data safe and software up to date.

To maximise the benefits from cloud adoption, it is also recommended that customers consider three major factors, to ensure their chosen solution will offer the flexibility benefits they expect.

• Flexible control for different security levels: areas in a building often have different security requirements. Where entrance doors or critical zones need real-time (online) monitoring including alerts, some other parts of a building might have lower demands for physical security. Here, autonomous devices can be installed faster and more cost-efficiently, with no need for network cables or hubs.

• Don’t forget to check the device range: a modern access control solution should offer a wide range of digital locks, helping a business manage their workspaces and workflows with maximum efficiency. Growing organisations require a large and diverse choice of access control hardware. Doors, cabinets, gates, server racks and almost any other opening may need to be locked with a wireless or wired device.

• A broad and futureproof choice of credentials: for user convenience, it makes sense to choose a system which supports all common RFID technologies, including iCLASS and MIFARE. However, the investment should be futureproofed, offering the chance to upgrade later to smartphone keys. Because many organisations still have legacy credentials in circulation, rolling out a shift to mobile access control will be more cost-efficient if mobile and RFID may be used simultaneously.

Boost agility and efficiency

ASSA ABLOY’s Incedo Cloud access control ecosystem was developed to meet these needs. When they choose Incedo, organisations can secure almost any opening with autonomous electronic locks or in real time with online devices. They issue building users with credentials of their choice. And they manage everything from one place, via the flexible, scalable, intuitive Incedo platform.

Building users gain access via smartcards, mobile keys stored on their smartphone, or energy-harvesting smart keys. Incedo Cloud software manages doors and users securely, from anywhere. Installation is easy, with no complex integrations required.

The entire ecosystem is modular, designed for simple adoption and easy expansion at any time and in any direction. An Incedo system can include both wired and wireless locks, all natively integrated and covering almost any application, for a handful of doors or hundreds, a startup or a staff of thousands in multiple locations.

Incedo Cloud adopters can combine online and autonomous management. For example, controlling access to entrances, labs and server rooms in real time, with online management. Adding autonomous devices alongside these adds control for access to areas that previously have been uneconomical due to location, environment, or cost. Switching between online and autonomous management is seamless. The only difference is how credentials are managed, online or via updaters.

Choice of devices and credentials

On the Incedo platform, wireless locking is provided by a range of Aperio devices with built-in readers: the Aperio wireless handle, escutcheon, cylinder, security lock and server rack lock. Aperio devices can secure almost any interior or exterior door, including wooden doors, glass doors and fire doors. Because they are wireless, installation is quick and without disruption to walls or work. They also consume much less electricity during use than equivalent wired locks.

Also deployable within the same cloud-based system, PULSE key-operated digital cylinders are self-powered using energy harvesting technology – no wires, no batteries. They consume no power in use. The PULSE cylinder range includes door locks, cam-locks, furniture locks and padlocks which operate outdoors in any climate. Almost any mechanical or electromechanical cylinder can simply be switched for a PULSE device and connected to Incedo without wires or drilling.

Incedo systems can also include hardwired, high-security doors with ASSA ABLOY Signo readers. These upgrade door and identity security without compatibility worries. Signo readers are powered by Seos, with the highest encryption and authentication standards. Each one supports almost any RFID credential and is mobile-ready when installed – Bluetooth, NFC and Apple Wallet.

A shared Seos backbone ensures all credential types may be deployed together, which makes gradual site upgrading easier. Incedo Mobile Keys work on most smart devices, including phones and watches. They are simpler and safer to administer than fobs or smartcards, sent over the air to employee devices and thereby removing the need to buy plastic cards or schedule time-wasting credential handover meetings. Updating, revoking or adding new access rights is practically instant.

To download an Incedo Cloud solution guide, visit



[2] Wireless Access Control Report 2021,



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

The human factor side of video management systems
Leaderware Editor's Choice Surveillance Risk Management & Resilience
A video management system (VMS) is central to, and the most vital element to any control room operation using CCTV as part of its service delivery, however, all too often, it is seen as a technical solution rather than an operational solution.

Get the basics right to win more business
ServCraft Editor's Choice Risk Management & Resilience
The barriers to entry in security are not high. More people are adding CCTV and fencing to their repertoire every year. Cowboys will not last long in a space where customers trust you with their safety.

Lock down your access control with Alcatraz AI
C3 Shared Services Healthcare (Industry) Access Control & Identity Management AI & Data Analytics
Alcatraz AI, represented in South Africa by C3 Shared Services, changes access control by harnessing the power of artificial intelligence and analytics at the edge, where facial recognition becomes the essential credential autonomously.

All aspects of data protection
Technews Publishing Editor's Choice Information Security Infrastructure AI & Data Analytics
SMART Security Solutions spoke to Kate Mollett, Senior Director, Commvault Africa, about the company and its evolution from a backup specialist to a full data protection specialist, as well as the latest announcements from the company.

Global strength, local craft
Impro Technologies Editor's Choice
Impro Technologies is a resounding success story. Started in South Africa, the company remains true to its roots and still designs and manufactures its access control systems and solutions in the country.

New generation of cyber-focused controllers
Gallagher News & Events Access Control & Identity Management Products & Solutions
The C7000 gives users an opportunity to leverage their hardware and firmware to build a platform designed to catapult their organisation into the future, with cybersecurity baked in from inception.

New T&A terminal features revolutionary AI technology
Suprema News & Events Access Control & Identity Management AI & Data Analytics
Suprema has launched BioStation 2a, the world’s first deep learning-based fingerprint recognition solution, providing powerful access control features and an improved ability to extract templates from low-quality fingerprints.

South Africans play a role in becoming scam victims
Editor's Choice Risk Management & Resilience
The South African fraud landscape is becoming increasingly risky as fraudsters and scammers look to target individuals with highly sophisticated scams, in an environment where it is becoming increasingly difficult for lawmakers and authorities to bring these criminals to justice.

Service orientation and attention to detail
Technews Publishing Editor's Choice Risk Management & Resilience
Lianne Mc Hendry evolved from working for an accounting firm to an accomplished all-rounder familiar with the manufacturing, distribution, and system integration aspects of the security industry value chain.