Bringing down the walls in the corporate world

Issue 4 2021 Commercial (Industry)

Today, more and more businesses are foregoing the traditional design setup of cubicles and closed-off offices for an open floor plan. Open office layouts are designed to be collaborative, inviting workspaces. These open workspaces, typically for 10 or more people, are suitable for activities that demand frequent communication or for routine activities that need relatively little concentration. While these layouts allow for flexibility, they also create some risks when it comes to security.

Open office spaces have essentially made office cubicles redundant in favour of a more collaborative and creatively engaging workspace environment. Co-working spaces commonly adopt open plan office layouts for increased productivity, flexibility and networking opportunities.

One thing is certain, having an open floor plan tips the balance between private and public and this shift affects how a company protects and safeguards personnel as well as proprietary and sensitive company information. This raises the question: what security threats does the open floor plan expose and how can security professionals manage this potential data security headache?

Access control systems are designed to protect buildings and to safeguard the equipment inside. They keep unwanted people out and give access to authorised individuals. While network and cybersecurity are important, preventing physical security breaches and threats is key to keeping technology and data safe, as well as any staff or visitors who have access to the building. Without physical security plans in place, offices or buildings are left open to criminal activity, physical security threats including theft, vandalism, fraud and even accidents.

Access starts at the front door

An effective access control system for any office, open or traditional, starts at the front door. Is the door locked? Is there a guard or are lobby personnel present? How do authorised personnel gain access? Once inside, how are movements and locations tracked? These are important questions and the requirements of an access control system depend on the answers.

Many open office plans do not have a traditional lobby and may not have a ‘front desk’, so securing the main entrance becomes particularly challenging. Traditional access control that relies on physical credentials (ID card, key fob, even a mobile phone) can solve the main entrance question, but what about once inside the building. A physical credential does little to limit access if there are no other doors or partitions to pass through.

The trend today is to include on an access control list a system that relies on biometrics for both multi-factor authentication and single-factor authentication. Historically, access control used the most reliable biometric measures (fingerprints, eye scans) almost exclusively. Over the last five years the accuracy of facial image extraction has improved and the use of stable biometric templates has elevated facial recognition beyond crowd control. Face recognition has achieved parity with the accuracy of the traditional biometric authentication systems and now meets the requirements of access control applications.

Face-as-a-Credential technology

Facial recognition is a biometric software application capable of uniquely identifying or verifying a person by comparing and analysing patterns based on the person’s facial contours. Facial recognition is considered the most natural of all biometric measurements. Facial biometrics are the preferred benchmark because the technology is easy to deploy and implement. The interaction with a facial recognition system is contactless, frictionless and extremely fast.

Detecting and capturing a face is the first task of a contactless access control system. The next and most crucial step is granting access to authorised personnel. Face-as-a-Credential technology integrates surveillance cameras, facial recognition algorithms and access control points into a powerful and completely contactless access control system. Face-as-a-Credential technology not only offers secure points of entry, but can also track the movement and locations of employees and visitors within the building. Plus, many Face-as-a-Credential systems allow for remote user registration, where visitors, contractors and delivery people can request access from their computer or phone.

While the primary goal of any access control system is the protection of people, protecting data and personal information from prying eyes, hackers is a close second. In many offices, biometrics are being used – via iris or fingerprint scanners – to protect important information from would-be hackers. This way, only authorised users have access to the information. Additionally, IT departments within these facilities are working closely with security leaders to ensure that networks are as secure as possible to protect from ransomware attacks.

Access control and physical security can go a long way to protect sensitive information, but company policies and procedures should dictate what information can be accessed where and when. Employees need to be trained effectively when they start employment and have regular refresher sessions. Communication should be encouraged and proper adherence to the rules should be rewarded. The larger the company, the greater the chance employees will find themselves working alongside different individuals on a daily basis. Physical security and data security need to be complete to mitigate the possible security risks of the open office environment.

One vendor that meets the challenge of securing an open office is Suprema, an innovator in proximity and contactless access control security. It all starts with BioStar 2, a web-based, open and integrated security platform that provides comprehensive functionality for access control. Featuring a modular, flexible framework, the platform provides a customised system depending on system scale, number of users and system structure that was used. The addition of Suprema FaceStation F2, an advanced facial recognition terminal, provides true contactless access control with the added benefits of time and attendance management, offering unrivalled matching speed, accuracy and levels of security.

Source: Suprema blog, Bringing Down Walls in a Corporate World Using Access Control, found at https://www.securitysa.com/*suprema1


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Keeping MICE safe and compliant in a new environment
Issue 3 2021 , Commercial (Industry), IT infrastructure
The meetings, incentives, conferences and exhibitions (MICE) sector has been challenged with massive change over the past year, first Covid-19 and now the Protection of Personal Information Act.

Read more...
Integrated, modularised operations management
Issue 4 2021, Technews Publishing , Editor's Choice, Access Control & Identity Management, Commercial (Industry)
Skycom, along with its mobile solutions partner, Nimbus Solutions, has developed a cloud-based platform that supports a host of integrated, in-house operations management modules, as well as mobile visibility and reporting in real-time.

Read more...
Modernised with the latest access control
Issue 4 2021, Paxton , Commercial (Industry)
Paxton10 provides expandable, cost-effective security solution for newly refurbished and modernised offices using the recently released Paxton10 and Paxton Key app.

Read more...
What you need to know about mobile access control
Issue 4 2021, Suprema , Access Control & Identity Management
Mobile access control moves the access credential from a standalone card onto your mobile phone, replacing RFID cards and employee badges. Suprema summarises the benefits of mobile access control.

Read more...
Secure and healthy access at Shoprite
Issue 4 2021, Turnstar Systems , Commercial (Industry)
Shoprite invested in various physical access solutions from Turnstar for its new head office in the Cape Town suburb of Brackenfell.

Read more...
Wireless, paperless visitor management
Issue 4 2021, SA Technologies , Access Control & Identity Management, Products, Commercial (Industry)
The VISITME scanner solution is a PoPIA-compliant visitor management system based on a wireless handheld device which scans and captures vehicle and occupant information at an access-controlled site.

Read more...
Card-less and carefree
Issue 4 2021, Suprema, neaMetrics , Products, Access Control & Identity Management
Go mobile, using smartphones as credentials with Suprema’s X-Station 2, a versatile terminal for time and attendance, visitor management and access control and offers employees, visitors and other types of users a contactless experience.

Read more...
Automation and AI in security
Issue 4 2021 , Editor's Choice, Cyber Security, Commercial (Industry)
It’s important for businesses to have an internal strategy for automation and AI as these can relate to both cybersecurity and other parts of the business and provide a benchmark for evaluating the security vendor.

Read more...
Smart buildings, start today
Issue 4 2021 , Commercial (Industry), Security Services & Risk Management
A recent article states that 15% of the offices owned by a large South African commercial real estate owner are now standing empty and this will remain the status quo for the foreseeable future.

Read more...
Eagle Eye launches body-worn camera
Issue 4 2021 , Commercial (Industry), Products
Secure 4G and Wi-Fi capabilities, two-way audio, geo-tagging and alarm features combine with Eagle Eye Networks cloud infrastructure for body camera offering for retail, guarding companies, in-home service companies and other commercial entities.

Read more...