Cloud, data overload and more threats

April 2017 Access Control & Identity Management, Surveillance, Asset Management

When it comes to security, everything has moved to IP, from access control to CCTV systems. Organisations are actively leveraging the advantages – like integration, advanced features and greater intelligence – that digital technologies bring. As technology costs continue to drop, migration from analogue to integrated IP systems is clearly the smart thing to do and the majority of organisations that need it, have done so.

Neil Cameron.
Neil Cameron.

Right now, organisations are looking at two areas – moving into the cloud and better leveraging the intelligence that IP solutions and analytics offer.

IP solutions deliver so much more value in terms of intelligence. Older systems simply send information to a central collection point, newer IP systems are able to talk to one another and make critical decisions. That puts intelligence at the edge of the network.

For example, using rules-based configuration, the access point of an access control system can be programmed to limit access to not just specific cardholders, but to a certain number of people. The access point contains that intelligence, and more, on a chip, so even if the network goes down and it loses access to the server it is able to act autonomously. The server is also more intelligent.

The access control server no longer just opens and closes doors; it is able to integrate with other systems, make decisions about what data to look at, and apply analytics to the data from these systems to identify anomalies or take key actions. It drives intelligence into the network. In an era of data overload this is of tremendous benefit to the organisation.

Smart migration

How are organisations using IP security solutions right now? Some that remain cost bound or do not have a high risk profile are simply putting in a few IP cameras and smartening up the access control system by replacing it with an IP solution. Others, usually larger companies and those with high-risk areas or critical functions to secure, are making use of more advanced solutions. These are platform-based systems that enable integration of facility systems (access control, CCTV, lighting and air conditioning) and backend systems (e.g., HR systems), and which have intelligence built in. These organisations may also have a central control room monitoring and managing security-related events and interactions.

One constant with IP based systems, however, is that they have longevity. They can be upgraded if the risks change. And because everything is now digital, change is constant and threats continually evolve. The cyber threats that IP solutions may expose the organisation – and their customers – to, need to be taken into account.

Any IP-based system should also be the concern of the ICT department. These systems are built to be secure but integration with other systems demands that the ICT department take the necessary steps to ensure patches and virus upgrades are applied.

To the cloud

As cloud solutions and hosting options become more ubiquitous, more organisations are considering them. Among others, they are more cost effective and provide access to more intelligence – that includes analytics functionality and benchmarking, but also access to external information such as weather reports or news reports on strikes or even social media feeds that may alert the organisation to relevant threats.

The future is all-IP. For organisations, how quickly they ramp up depends on their risk profile. What is sure is that there are huge benefits to be had for a low capital outlay.

For more information contact Johnson Controls, +27 (0)11 921 7141, neil.cameron@jci.com, www.johnsoncontrols.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...