IoT, cybersecurity and access control

March 2018 Editor's Choice, Surveillance, Access Control & Identity Management, Integrated Solutions

Right now, we are beginning the next phase of digital transformation in the security industry – the move to connect all physical security components to the Internet of Things (IoT). The advantages are twofold.

First, having all the components in your system working in harmony maximises their effectiveness. Next, all the individual hardware pieces in a system transmit data, which, if handled correctly, can provide game-changing business intelligence.

Consider door stations, for example. This technology becomes so much more than just a video doorbell that controls access to a building. As part of an IoT system, network door stations can now become connected to an increasingly complex and high-value security network – simultaneously harvesting actionable business intelligence while sending data on to secure smartphones or servers.

Securing the devices that collect this data, and ensuring the data itself is secure, is the top priority. Not only are network and data breaches punished by severe reputational damage for the affected business, but each breach also hinders the IoT movement. This is because both corporations and the general public must have confidence that IoT technologies meet their expectations for safe, private and cybersecure daily operations. Data protection directives, such as General Data Protection Regulation (GDPR) [and POPI], should be seen as an aid and not a hindrance.

Act fast or lose out

Remember Blockbuster, the leading video rental firm in the 2000s? This former $37 billion franchise-based company failed to recognise a paradigm shift in the market towards on-demand video, video streaming and downloads. Within a few short years, Blockbuster was dead in the water and soon found itself bankrupt and out of business. In times of widespread technological evolution, it is imperative that your business acts with agility in incorporating the right technologies that will enable it to thrive – both today and into the future.

To maximise competitive advantage, use a combination of the best technology on the market, even if it means choosing multiple suppliers. Standard and open protocols, which enable different pieces of equipment to easily communicate with one another, are the best way of ensuring purchases made today will be compatible with those you’ll need to make in the future. It is also important that your security system is easy to use. The huge quantities of data coming in from different sources needs to be aggregated and presented to users in easily digestible formats. After all, human operators will need to interpret the data in making decisive, timely decisions. So, IoT technologies and products that are easy-to-use, built on open protocols, based on global standards and meet high demands for cybersecurity incorporate key success qualities.

Using licence plates as credentials

To see the benefits of the IoT and connected security systems, let’s examine how several technologies can work together over a network to securely control access to a car parking lot.

- A car enters a camera’s vehicle detection zone;

- This triggers software in the camera that checks the car’s licence plate number;

- The camera sends the number to the door controller at the gate;

- The door controller checks against its database of approved licence plate numbers and decides whether or not to grant access;

- If the licence plate is not approved for access, a network video door station can allow the driver to connect to an operator, who can then decide to grant access or not;

- An administrator or user in the system can also send a QR code in advance to the driver, who could then just use this code as a credential in his phone to the video door station to be granted instant access;

- Transaction data describing the event is logged and stored.

This basic licence plate as a credential system is comprised of five components, as mentioned above. These components all speak to each other using open protocols – standard, secure communication that allows the incorporation of different components from different manufacturers. This ensures businesses can choose the most suitable equipment for their individual needs.

Each of these components sends information to a computer program that makes relevant data easily accessible to a human operator. The information must be displayed as clearly as possible so the operator can quickly make informed decisions when needed. All data collected by this program is logged, so that a thorough analysis can take place. Over time, enough data will be generated to carry out a meaningful analysis.

Analysts will be able to identify trends in the data. For example, a failure to consistently identify licence plates with high accuracy. With this knowledge, an engineer can investigate and fix the problem. For example, adjusting the direction a camera is pointing. This resolves the issue and streamlines the process, maximising the benefits to the business through improved operational effectiveness and time reduced operational costs while providing positive user experiences.

This access control application also highlights the need to make cybersecurity practical. Each component in this system represents a potential gateway into it. If any component in the network can be breached, sensitive information would be leaked – resulting in a very real penalty to your company. In this way, using licence plates as credentials maximises ease-of-use for all parties involved, it maintains secure operations and it keeps operational costs low.

The future is open for smarter businesses

Businesses that recognise the importance of building a deeply integrated network of IoT-connected access control devices will soon find themselves at an advantage. Centrally managed security systems will be the most efficient. Such systems will continue to prove their worth beyond just security.

Encouraging openness and partnerships between hardware, software and application technologies and products will deliver tangible benefits. Organisations such as ONVIF, which champions the cause of standardised network protocols, will nurture a new era of collaboration in the security industry. Combined with the prioritisation of cybersecurity, this will form the basis for an ever-more connected world.

With these foundations in place, access control networks will break down barriers between people and lead to a more connected society. Truly smart cities, making use of all the data made available by IoT access control and other devices, will create operational efficiencies on a global scale.

For more information contact Axis Communications, +27 (0)11 548 6780, sasha.bonheim@axis.com, www.axis.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
ONVIF to end support for Profile S
News & Events Surveillance
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.