Closer, seamless integration

November 2018 Access Control & Identity Management, Cyber Security, Integrated Solutions

We are now seeing an increased focus placed on data protection, and this will roll over into the access control market. We are already seeing the access control market adopting a combination of technologies such as SEOS (other secure card format technologies) with credentials at the edge, TLS 1.2 (or equivalent, OSDP to controller) during transmitting and receiving data and software asset management on the server/client side. This is according to Chris Lelicanin, product specialist for access control at Elvey.

He says that while none of these are really brand new technologies, they are technologies pulled together to service specific requirements such as personal information security. They are more prominent now because there are bodies in place to enforce these standards.

“The security sector is definitely becoming more IT-centric and a number of broad categories are dominating our industry, including IoT devices, artificial intelligence (AI), cloud and serverless computing and robotics,” says Lelican.

IoT devices and cybersecurity

IoT devices are generally not designed with cybersecurity in mind and are typically an easy target. According to a recent report in IoT For All one known security risk is that those companies with IoT devices that have known vulnerabilities don’t fully patch the devices.

Some scary statistics that came out of the report include the fact that the annual cost to the US economy due to breaches of these systems is $100-billion, resulting in the loss of approximately 100 000 jobs. Malware made for IP cameras is still a matter of concern and researchers associated with Kaspersky Labs found that a type of malware for those devices infected 57 000 units in only a week. Elvey sees the cybersecurity space growing substantially as these attacks increase with the commensurate increase in adoption of connected devices.

Network-level attacks are a security risk for IoT devices, with hackers known to carry out a distributed denial of service (DDoS) attack. This DDoS floods network-connected devices with too many requests and prevents the server from processing legitimate requests under the load.

Another challenge with IoT devices is RFID spoofing which allows cybercriminals to create fake RFID signals that let them read and record data transmissions. Probably the largest issue however, is software threats from Trojan viruses, malicious scripts, and malware.

Artificial intelligence

AI, and more specifically Deep Learning predictive analytics, is becoming more evident in time and attendance (T&A) where systems learn from the user’s patterns. Additionally, it is being used in monitoring or control rooms where the guard is the software and it can use a combination of analytics and user data/behaviour to provide security models with alerts to take action autonomously.

While there are positive benefits to be derived from implementing AI, it can be taken to extreme (and negative) levels. A seemingly dystopian world can be imagined in China’s planned implementation of a pervasive system of algorithmic surveillance. According to an article in The Atlantic, the government will harness advances in artificial intelligence and data mining and storage to construct detailed profiles on all citizens.

Apparently, a vast accompanying network of surveillance cameras will constantly monitor citizens’ movements, purportedly to reduce crime and terrorism. The security organs of the communist party-state will filter, collect, and analyse staggering volumes of data. This poses a grave threat to the freedom of the Chinese populace and is likely to filter down to other countries in the world, albeit in a perhaps less severe fashion.

Cloud and serverless computing

Cloud and serverless computing, like Hattrix, means that clients need not worry about data security, deployment or backup, allowing them to focus solely on their clients. According to the RightScale 2018 State of the Cloud report, serverless computing is the number one growing cloud service, with a growth rate of 75%.

“To a lesser and more real extent we can see the advances in computing and sensor technology already benefitting the industry, with larger user databases and faster, more accurate identification on biometric readers. In addition, there is an increasing number of higher resolution cameras with deeper and richer analytics and metrics, together with longer storage periods, capturing the market,” says Lelicanin.


“Here we see security robotics and AI at play and we can also lump drones into this category as well. A classic example of this is the robot developed to serve as a security guard at train stations in the run-up to the 2020 Tokyo Olympics and Paralympics. The robot is equipped with a security camera powered by artificial intelligence and it can detect and report suspicious persons or objects at stations,” says Lelicanin.

Perseusbot, as it is known, can avoid obstacles and travel over uneven pavement during patrols. It can send alerts to the smart phones of security staff if it discovers objects left unattended for a long time or if it captures aggressive movements by individuals that could lead to conflict.

Access control technologies

Three areas need mention here. Low-energy Bluetooth or near field communications (NFC) where one uses one’s smartphone as an edge device or as a credential with an edge device to gain access to premises.

Self-learning fingerprint algorithms provide improved accuracy over time and require less computational resources. Finally, iris scanning will become increasingly useful for voter registration and as a passport replacement tool.

“In general I don’t think we’re going to see any ground-breaking new technology, just closer integration of existing systems,” says Lelicanin.


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Platforms and community lead the future
May 2019, Milestone Systems , Editor's Choice, CCTV, Surveillance & Remote Monitoring, News, Integrated Solutions
Milestone Systems took a look into the future of open platforms and the power of community at MIPS EMEA in Copenhagen in March this year.

The consequences of false alerts
May 2019, Leaderware , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Craig Donald discusses the impact of false alarm rates on the utility of intelligent security technology systems.

The enemy within – insider ­security threats
May 2019, Wolfpack Information Risk , Editor's Choice, Cyber Security, Financial (Industry)
Insider threats in today’s financial world are insidious and destructive and your defence against insiders should start long before the person assumes his/her position.

Protecting people’s money, and their data
May 2019, Cathexis Technologies, CA Southern Africa, IDEMIA , Editor's Choice, Integrated Solutions, Financial (Industry)
The temptations inherent to the banking sector, and financial institutions more generally, pit them in an eternal and increasingly high-tech battle to secure themselves against threats from within and without.

Access authentication with a wave
May 2019, IDEMIA , Editor's Choice, Access Control & Identity Management, Integrated Solutions, Financial (Industry), Commercial (Industry)
Financial organisations are making the move to contactless fingerprint biometrics in order to meet the increasing burden of regulatory and compliance demands.

Does your control room add value?
May 2019, Fidelity Security Group, G4S South Africa, Progroup , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure, Commercial (Industry)
Whether on- or offsite, control rooms are a critical aspect of security today and care must be taken in the design and rollout of these nerve centres.

Intruder detection is becoming smarter and more mobile
May 2019, Elvey Security Technologies , Regal Distributors SA , Editor's Choice, Perimeter Security, Alarms & Intruder Detection
Alongside the new technologies continually being developed, existing technologies are being co-opted into not only performing an intrusion detection role, but combatting that bane of the electronic security industry: false alarms.

Face to face with Suprema FaceLite
May 2019, Suprema , Editor's Choice, Access Control & Identity Management, News, Products
Suprema has announced the launch of FaceLite, the new generation compact face recognition terminal designed for enterprise access control as well as time and attendance applications.

ASSA ABLOY showcases latest digital access solutions
May 2019, ASSA ABLOY South Africa , Editor's Choice, Access Control & Identity Management, News
ASSA ABLOY hosted a breakfast at the Country Club Johannesburg in Woodmead on 2 April, to showcase the company’s latest and greatest digital access solutions.

Keyless access control launched in Africa
May 2019, FS-Systems , News, Access Control & Identity Management, Agriculture (Industry)
FS-Systems launches a cutting-edge keyless access control solution for the critical infrastructure environment across the African market.