Physical and logical access control convergence that goes beyond finding a happy medium

September 2007 Access Control & Identity Management

There is a growing interest in the convergence of physical and logical access control as more companies and organisations realise the importance of securing not only physical access to computers, but also the data-sensitive information contained within. The convergence market is expected to grow at a phenomenal rate over the next five years as enterprise risk management points more companies to greater security efficiencies and effectiveness.

As logical and physical access control systems begin to converge, the ability to identify individuals within an organisation has become critically important. The requirements for a holistic security solution and the adoption of new access control technologies are driving dramatic and necessary changes to integrate both security measures.

The most secure means of ensuring successful convergence of physical and logical access control is through integrated biometric applications. Through fingerprint-based biometric technology, the problems of both unauthorised physical and logical access can be negated through a single technology. As southern Africa's sole distributor of fingerprint technology company Sagem, Ideco provides Sagem Xelios' logical access control solutions to secure access to companies' PCs and networks. These logical access control solutions lend themselves to a wide range of applications including single-sign-on (SSO) for corporate networks, authentication for Internet banking, encryption and decryption of files and folders and other password replacement applications.

Of key importance to companies is the interchange of data between logical and physical access systems. For example, by using fingerprints to control access to the physical workplace as well as for PC login, all requests for access are monitored across the physical and logical platforms by one central system. The central system can therefore detect if a computer is still logged in after a person has exited the workplace and the system can then automatically log the computer off to prevent unauthorised use.

And it is not only system integrity that is secured through integrated fingerprint solutions, companies are expecting bottom line savings in return for a fully integrated biometric access control system. According to Gary Jones, manager of Ideco Biometric Security Solutions, "Companies can expect major cost savings by converging IT and physical security into one biometric solution. By integrating all company-related security solutions onto one fingerprint system, companies will improve efficiency, save money and improve all-round security at the same time."

By consolidating all company processes, ease of use is also guaranteed. For example, physical access control is secured through Sagem's MorphoAccess range of readers, which operate in identification mode to grant the right people entrance onto the premises. No keys, cards, remotes or PINs are required, only a person's fingerprint is presented and identification occurs in 1,8 seconds or less. The systems are also linked to time and attendance packages, which are further linked to payroll systems, making wage payment easier and more reliable. "Issues of buddy-clocking are completely negated. Since cards are no longer used, colleagues can no longer clock in for one another. The person has to be present in order to register time of arrival," says Jones.

The integration of physical and logical access control systems not only strengthens overall security, fingerprint solutions also provide password reset savings, provision of full audit trails of entries and changes to company networks, as well as provide the basis for an overall risk management system.

However, despite the growing popularity of this 'convergence', modern enterprises continue to underestimate the risks involved in haphazardly integrating physical and logical security. The problem with reaching true convergence remains the acknowledgement of firms that integration is required, and then making a real effort to implement it. The lack of overlapping knowledge of physical and logical control in the IT profession remains limited. Historically, due to their different responsibilities in the organisation, logical and physical access control functions have been separate domains managed by different departments.

"What many companies fail to realise is that if unauthorised physical access to a facility is achieved, and the PC itself is not secured through logical access control, then the entire system is compromised as the person now has easy access to the data. Physical and logical access control needs to be seen in its entirety, and not as two opposing solutions that one needs to choose between," Jones concludes.

For more information contact Ideco, +27 (0)11 745 5600, [email protected], www.ideco.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...