Bringing down the walls in the corporate world

Issue 4 2021 Commercial (Industry)

Today, more and more businesses are foregoing the traditional design setup of cubicles and closed-off offices for an open floor plan. Open office layouts are designed to be collaborative, inviting workspaces. These open workspaces, typically for 10 or more people, are suitable for activities that demand frequent communication or for routine activities that need relatively little concentration. While these layouts allow for flexibility, they also create some risks when it comes to security.

Open office spaces have essentially made office cubicles redundant in favour of a more collaborative and creatively engaging workspace environment. Co-working spaces commonly adopt open plan office layouts for increased productivity, flexibility and networking opportunities.

One thing is certain, having an open floor plan tips the balance between private and public and this shift affects how a company protects and safeguards personnel as well as proprietary and sensitive company information. This raises the question: what security threats does the open floor plan expose and how can security professionals manage this potential data security headache?

Access control systems are designed to protect buildings and to safeguard the equipment inside. They keep unwanted people out and give access to authorised individuals. While network and cybersecurity are important, preventing physical security breaches and threats is key to keeping technology and data safe, as well as any staff or visitors who have access to the building. Without physical security plans in place, offices or buildings are left open to criminal activity, physical security threats including theft, vandalism, fraud and even accidents.

Access starts at the front door

An effective access control system for any office, open or traditional, starts at the front door. Is the door locked? Is there a guard or are lobby personnel present? How do authorised personnel gain access? Once inside, how are movements and locations tracked? These are important questions and the requirements of an access control system depend on the answers.

Many open office plans do not have a traditional lobby and may not have a ‘front desk’, so securing the main entrance becomes particularly challenging. Traditional access control that relies on physical credentials (ID card, key fob, even a mobile phone) can solve the main entrance question, but what about once inside the building. A physical credential does little to limit access if there are no other doors or partitions to pass through.

The trend today is to include on an access control list a system that relies on biometrics for both multi-factor authentication and single-factor authentication. Historically, access control used the most reliable biometric measures (fingerprints, eye scans) almost exclusively. Over the last five years the accuracy of facial image extraction has improved and the use of stable biometric templates has elevated facial recognition beyond crowd control. Face recognition has achieved parity with the accuracy of the traditional biometric authentication systems and now meets the requirements of access control applications.

Face-as-a-Credential technology

Facial recognition is a biometric software application capable of uniquely identifying or verifying a person by comparing and analysing patterns based on the person’s facial contours. Facial recognition is considered the most natural of all biometric measurements. Facial biometrics are the preferred benchmark because the technology is easy to deploy and implement. The interaction with a facial recognition system is contactless, frictionless and extremely fast.

Detecting and capturing a face is the first task of a contactless access control system. The next and most crucial step is granting access to authorised personnel. Face-as-a-Credential technology integrates surveillance cameras, facial recognition algorithms and access control points into a powerful and completely contactless access control system. Face-as-a-Credential technology not only offers secure points of entry, but can also track the movement and locations of employees and visitors within the building. Plus, many Face-as-a-Credential systems allow for remote user registration, where visitors, contractors and delivery people can request access from their computer or phone.

While the primary goal of any access control system is the protection of people, protecting data and personal information from prying eyes, hackers is a close second. In many offices, biometrics are being used – via iris or fingerprint scanners – to protect important information from would-be hackers. This way, only authorised users have access to the information. Additionally, IT departments within these facilities are working closely with security leaders to ensure that networks are as secure as possible to protect from ransomware attacks.

Access control and physical security can go a long way to protect sensitive information, but company policies and procedures should dictate what information can be accessed where and when. Employees need to be trained effectively when they start employment and have regular refresher sessions. Communication should be encouraged and proper adherence to the rules should be rewarded. The larger the company, the greater the chance employees will find themselves working alongside different individuals on a daily basis. Physical security and data security need to be complete to mitigate the possible security risks of the open office environment.

One vendor that meets the challenge of securing an open office is Suprema, an innovator in proximity and contactless access control security. It all starts with BioStar 2, a web-based, open and integrated security platform that provides comprehensive functionality for access control. Featuring a modular, flexible framework, the platform provides a customised system depending on system scale, number of users and system structure that was used. The addition of Suprema FaceStation F2, an advanced facial recognition terminal, provides true contactless access control with the added benefits of time and attendance management, offering unrivalled matching speed, accuracy and levels of security.

Source: Suprema blog, Bringing Down Walls in a Corporate World Using Access Control, found at https://www.securitysa.com/*suprema1


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The promise of mobile credentials
Technews Publishing Suprema neaMetrics HID Global Editor's Choice Access Control & Identity Management IoT & Automation
SMART Security Solutions examines the advantages and disadvantages of mobile credentials in a market dominated by cards and fobs, in which biometrics is viewed as a secure alternative.

Read more...
Eliminate privacy concerns and enhance security
Suprema Access Control & Identity Management IoT & Automation
Suprema’s Template on Mobile enables secure access to corporate facilities and assets using facial recognition biometric devices, while protecting users’ privacy.

Read more...
Unleash the full potential of AI at the edge
Suprema AI & Data Analytics Access Control & Identity Management
Efficient AI algorithms, when embedded in edge access control devices, enable companies to optimise their use of AI and edge processing to deliver reliable and fast authentication.

Read more...
Securing easy access
Suprema neaMetrics Access Control & Identity Management
Securing access to hospitals and healthcare institutions presents a unique set of challenges, because these facilities operate 24/7, have highly ‘open’ access in public areas and require a strict level of security.

Read more...
New T&A terminal features revolutionary AI technology
Suprema News & Events Access Control & Identity Management AI & Data Analytics
Suprema has launched BioStation 2a, the world’s first deep learning-based fingerprint recognition solution, providing powerful access control features and an improved ability to extract templates from low-quality fingerprints.

Read more...
Access to data centre secured
Suprema Access Control & Identity Management Infrastructure
GBM required a modern access control system to increase the security of its facilities in a productive environment without affecting the operation of the offices and the data centre, which are carried out 24/7/365.

Read more...
Mobile access to multiple locations
Suprema Access Control & Identity Management Products & Solutions
A central security network was used to link multiple sites across VPN connections to allow the Suprema CoreStations installed at various locations to talk to the remote server.

Read more...
Your face is the key
Suprema Editor's Choice Access Control & Identity Management Security Services & Risk Management
FaceStation 2, Suprema’s newest facial authentication terminal, is an access control, time and attendance terminal, featuring a better user experience with Android 5.0 Lollipop and Suprema’s latest algorithm, hardware, and software.

Read more...
Going beyond the gate
Suprema Residential Estate (Industry)
Restricting access to the facilities available to residents may have been a daunting task in the past, with registers, keys, tokens, and other manual procedures, and on top of that PoPIA, but this is no longer the case.

Read more...
Access to nuclear plants
Suprema Access Control & Identity Management
Korea Hydro & Nuclear Power was in need of a fully redundant access control system that should provide enhanced performance while still being able to interoperate with existing equipment.

Read more...