Oiling the wheels of industry

August 2011 Access Control & Identity Management, Industrial (Industry)

Smartcards are allowing oil and gas companies to better safeguard staff and sites.

Oil and gas companies continue to innovate in smartcard technology. Facing risks to the security of their assets and operations, these organisations are pioneering new approaches to identity and access management (IAM) and network security by combining physical and logical access onto a single smartcard. This not only improves security and convenience for the staff, but also allows companies to realise the operational efficiencies that convergence delivers.

In the past, many oil and gas companies relied on multiple credentials and access control systems to fulfil different tasks, resulting in the proliferation of single-purpose systems running in parallel. In addition to being resource-intensive, disparate access control and security systems do not scale and can be costly to integrate.

A consolidated strategy is therefore crucial. Today, converged systems are employed to secure a wide range of sensitive oil and gas assets, including off-shore floating production, storage and offloading (FPSO) units; and on-shore production and transportation facilities such as pipelines, ports, and refineries.

Meeting multiple challenges at scale

Aside from hazardous materials and harsh working environments, numerous factors expose oil and gas companies to significant risk. The remoteness of sites, poor quality of local infrastructure, and geopolitical instability make installations susceptible to malicious attack, and a security breach has the potential to endanger staff, the local environment and, at worst, the stability of national energy grid infrastructures. In addition, these factors are magnified by the scale of the operations entailed.

Embracing all of the policies, processes, and procedures there are two major aspects to consider when managing and controlling access to information and resources:

* Physical access to sites – often delivered via hardware and software components including access control readers, which are autonomous devices performing the single purpose of interfacing with credentials.

* Logical access to computer networks – information technology access control procedures that restrict a user’s ability to interface with computing and networked resources and data. These procedures include secure authentication, data encryption, single sign-on, and remote access.

Logical credentials are virtual or knowledge-based ‘tokens’, such as a password or PIN (personal identification number), although for enhanced security, a physical credential might also be employed for another layer of authentication. Physical credentials include security tokens such as key chains and USB devices, but it is smartcards that have become the most widely deployed. According to Global Industry Analysts (GIA), the global market for smartcards is forecast to reach US$26,3 billion by 2015, driven by security and infrastructure projects and the ongoing shift to replace traditional magnetic-stripe cards in banking/financial institutions with the latest chip-and-pin payment technology.

A pipeline of practical solutions

That being said, there is no one-size-fits-all approach to a comprehensive smartcard- and IAM strategy in the oil and gas industry, and a host of factors surround specific vulnerabilities, the level and type of threats faced, and the physical environment.

For example, in many upstream sites, there are environmental challenges such as heat, dust, and risk of explosions. These may preclude the use of biometric readers, and call for IP-rated solutions. In the office environment, the risk of a physical attack or accident may be lower, but the threat to information security is most likely greater, thus a physical credential may be employed. Combining logical and physical access onto a single smartcard results in significant cost savings because the same credential can be used for multiple applications.

However, consolidated strategies entail much more than simply the credential and the control reader. To ensure a balance between convenience and security, access rights should be centrally managed, calling for a holistic approach that integrates operational support systems, network infrastructure and facility management solutions.

Smartcards have become the solution of choice for oil and gas industry applications because they guarantee higher levels of cryptography and security than that offered by legacy ‘prox’ card solutions, and they drive efficiencies and cost savings by enabling the same credential to be used for many other applications such as cashless vending as well as other mobile applications.

Ian Compton
Ian Compton

For more information contact HID Global, +44 1440 714 840, brabasse@hidglobal.com, www.hidglobal.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Impro announces Primo update
News & Events Access Control & Identity Management Integrated Solutions
Impro Technologies recently held a launch event in which it introduced a series of new products, from new readers through to its updated Primo access management software.

Read more...
If you cannot prove identity, you cannot claim security
Access Control & Identity Management Information Security
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity.

Read more...
Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
Large-scale AI boosts manufacturing efficiency
Hikvision South Africa Surveillance Industrial (Industry) AI & Data Analytics
Video systems, once used mainly for security, are rapidly becoming one of the most valuable sources of operational data in factories and industrial parks, accelerating smart manufacturing process.

Read more...
Schneider Electric appoints Steven Santini as VP
Power Management Industrial (Industry)
Schneider Electric has appointed Steven Santini as vice president of Secure Power for sub-Saharan Africa. The division acts as the architect of digital resilience, delivering intelligent operational technologies and ecosystems that safeguard critical infrastructure.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.