Controlling access in the cloud

Access & Identity Management Handbook 2019 Access Control & Identity Management, Integrated Solutions

Cloud-based services have become an integral part of our digital lives, allowing us to access our important information from any smart device, anywhere in the world. The convenience afforded extends to organisations too, and they further stand to gain from operational and cost benefits. In the access control arena, hosted or managed services have been around for a few years, and the adoption of cloud-based access control only continues to grow as companies become more and more open to the idea of relying on it to perform such a vital function within their business. We spoke to representatives at Excellerate Services and SALTO Systems to find out more about the benefits cloud-based access control can offer.

Glenn Allen.
Glenn Allen.

Depending on the end user’s requirements, Internet connectivity can be an obstacle since the overall solution relies heavily on connection outside of the local network, says Glenn Allen, director of Excellerate Services’ technical division. “The current climate for information communications systems in South Africa are often unreliable/temperamental (unless cost for deployment is not a factor). Multiple connection channels, such as wireless, GSM, fibre or satellite would need to be made available to each of the end points for redundancy. Obviously, this depends on the end user’s requirements as some end users would accept a period of potential downtime,” he says.

Owing to this potential issue, some clients will choose to implement a solution that can continue to run locally if the external connection is lost. “Depending on the solution the client wants to implement, technicians will ensure that the system can function to a certain degree on the local server should communication be lost to cloud-based servers, and once the communication is back up and running, will push database updates to update the cloud-based backup,” Allen continues.

“Cloud-based solutions provide the benefit of economies of scale, where hosting is in the form of a rental from a third-party supplier’s server, meaning that local infrastructure costs are diminished. An example can be drawn from remote areas where there is no wireless connectivity and no fibre infrastructure, where this situation would require a locally hosted solution,” he explains.

Wouter du Toit.
Wouter du Toit.

According to SALTO Systems’ Wouter du Toit, in terms of uptime the company’s cloud-based access control solution, SALTO KS (Keys as a Service) has close to 100% reliability. “Even if your Internet connection and therefore your link to the cloud services platform fails, the system is still self-contained locally, so there’s no risk – the cloud is just there to ensure you’ve got live communication to those doors, and that you can manage them online,” he says.

The SALTO KS solution was a world-first when it was launched some four and a half years ago, and was initially regarded with some trepidation in the marketplace. In the time since its introduction, other companies have got in on the act and are offering similar solutions, and du Toit says the technology has matured to the point where it is now very well accepted.

“Not just internationally, but in South Africa, we have a lot of cloud-based sites deployed, ranging from the more ‘standard’ access control requirements to the more demanding hospitality environment,” says du Toit. “So there is no concern for us as a manufacturer to push this to even large companies, and we have already done that.

“For organisations that have to control access across multiple sites, the fact that SALTO KS is cloud-based makes it easy to manage people’s credentials regardless of their location, through their mobile phone, one-time PIN or other mechanism. This is highly cost-effective since the only hardware that needs to be installed at the site is one of our IQ units.”

Going wireless

Wireless technology has been a key enabler for the proliferation of cloud-based systems, and SALTO’s solution takes advantage of wireless for local networking as well as communication with the cloud. The local networking is enabled by a device called the IQ as referred to by du Toit above, which can be plugged into a physical network point via an Ethernet cable, or communicate wirelessly, or a combination of both.

The IQ also uses proprietary radio frequency (RF) or Bluetooth signals to speak to the locks, and to a controller that can drive an output, if one is required. The IQ essentially acts like an access point, establishing a communication path for up to 16 devices in a radius of 10 to 15 metres. The overall solution therefore eliminates the need to run cables to every door, and is expandable to any number of doors at a site.

On the cloud side, the IQ can have a physical network connection to the outside world, or it can additionally be fitted with a SALTO SIM card for 4G cellular connectivity as a failover or as the primary communication medium. The combined flexibility provided by these wireless capabilities allows end users to better control their IT infrastructure costs.

Addressing cybersecurity

To address the ever-present issue of cybersecurity, du Toit explains that SALTO takes great care to ensure its clients’ data is secure. “The data we transmit to the cloud is encrypted, and we comply with ISO standards to ensure our clients’ information is not vulnerable or shared with third parties. The only people that can access that information are those who the client explicitly allows to access it – even our technical resources department cannot access privileged information without the client’s permission,” he says.

Allen further recommends that the implementation of VLAN and firewall technology ensures that all traffic is monitored, securing the entire network. “Using a VLAN as well as firewalls would ensure that the data gets to where it is intended, however you’d also have to deploy some sort of encryption of the traffic between the client and the server to make sure that even if the data is eavesdropped it is unusable, which we cater for using SSL and the ability to deploy signed certificates to the web server.”

For more information contact:

Excellerate Services, +27 31 573 7600, [email protected], www.excellerate.co.za

SALTO Systems Africa, +27 87 701 5858, [email protected], www.saltosystems.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From the Editor's desk: The good, the bad, and the victims
Technews Publishing News & Events
When the Internet first arrived, everyone was expecting amazing things from it, well, everyone who knew what it was and how it worked. We had the dotcom boom and bust, and it’s fair to say that if we ...

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Rethinking access control in high-risk logistics environments
ATG Digital Access Control & Identity Management Transport (Industry) Logistics (Industry) Facilities & Building Management
South Africa’s logistics sector is under constant pressure, not only from external threats like hijackings and cargo theft, but also from internal vulnerabilities, operational blind spots, and limited support.

Read more...
Directory of suppliers
Technews Publishing SMART Security Solutions Fire & Safety
The Directory of Product and Solution Suppliers for the fire safety industry includes details of companies that provide security and risk mitigation products, advice, and services within this market.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
From the editor's desk: Regulations, standards and skills, but poor enforcement
Technews Publishing SMART Security Solutions Fire & Safety
South Africa depends on the carrot approach to fire safety; in other words, businesses choosing to do the right thing, as the stick (or enforcement of regulations) is unfortunately lacking.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.