More agile, flexible access management

Issue 5 2023 Editor's Choice, Access Control & Identity Management

Efficiency, agility and convenience have become megatrends. They are important drivers across almost every area of global economic activity1. Within security and access management they play a major role in the rapid adoption of cloud infrastructure. Perhaps a third of security end users already use cloud-based software to manage access to their premises, according to one industry report2.

The motivations for cloud adoption are easy to understand. Managers want to operate from anywhere, at any time. This can be especially important in security, where unexpected issues are usually urgent, or at least time-sensitive.

Cloud management simplifies budgeting and reduces IT expenditure; its simple subscription model prevents nasty surprises in the shape of unexpected hardware or support costs. According to Polar Capital Technology Trust, the cloud “allows businesses to save the cost of having to own, maintain and manage their own data centres (servers, storage and networking) while still having the ability to provide full computing capabilities. Cloud computing is a key part of businesses’ digital transformations”.

According to the UK’s National Cyber Security Centre, cloud security services may also encourage good practice and improve resilience3.

In an economic environment where change is a constant, security management must be agile and futureproof. Cloud access control provides this. For a small or medium sized organisation, readiness to expand or pivot the use of space at any time is even more critical. The inherent scalability of a cloud solution offers a huge advantage for these businesses.

The easy way to take control

The key question is, what to look for in a cloud access management solution? The security of the cloud environment is non-negotiable. Whether self- or third-party hosted, the solution must keep data safe and software up to date.

To maximise the benefits from cloud adoption, it is also recommended that customers consider three major factors, to ensure their chosen solution will offer the flexibility benefits they expect.

• Flexible control for different security levels: areas in a building often have different security requirements. Where entrance doors or critical zones need real-time (online) monitoring including alerts, some other parts of a building might have lower demands for physical security. Here, autonomous devices can be installed faster and more cost-efficiently, with no need for network cables or hubs.

• Don’t forget to check the device range: a modern access control solution should offer a wide range of digital locks, helping a business manage their workspaces and workflows with maximum efficiency. Growing organisations require a large and diverse choice of access control hardware. Doors, cabinets, gates, server racks and almost any other opening may need to be locked with a wireless or wired device.

• A broad and futureproof choice of credentials: for user convenience, it makes sense to choose a system which supports all common RFID technologies, including iCLASS and MIFARE. However, the investment should be futureproofed, offering the chance to upgrade later to smartphone keys. Because many organisations still have legacy credentials in circulation, rolling out a shift to mobile access control will be more cost-efficient if mobile and RFID may be used simultaneously.

Boost agility and efficiency

ASSA ABLOY’s Incedo Cloud access control ecosystem was developed to meet these needs. When they choose Incedo, organisations can secure almost any opening with autonomous electronic locks or in real time with online devices. They issue building users with credentials of their choice. And they manage everything from one place, via the flexible, scalable, intuitive Incedo platform.

Building users gain access via smartcards, mobile keys stored on their smartphone, or energy-harvesting smart keys. Incedo Cloud software manages doors and users securely, from anywhere. Installation is easy, with no complex integrations required.

The entire ecosystem is modular, designed for simple adoption and easy expansion at any time and in any direction. An Incedo system can include both wired and wireless locks, all natively integrated and covering almost any application, for a handful of doors or hundreds, a startup or a staff of thousands in multiple locations.

Incedo Cloud adopters can combine online and autonomous management. For example, controlling access to entrances, labs and server rooms in real time, with online management. Adding autonomous devices alongside these adds control for access to areas that previously have been uneconomical due to location, environment, or cost. Switching between online and autonomous management is seamless. The only difference is how credentials are managed, online or via updaters.

Choice of devices and credentials

On the Incedo platform, wireless locking is provided by a range of Aperio devices with built-in readers: the Aperio wireless handle, escutcheon, cylinder, security lock and server rack lock. Aperio devices can secure almost any interior or exterior door, including wooden doors, glass doors and fire doors. Because they are wireless, installation is quick and without disruption to walls or work. They also consume much less electricity during use than equivalent wired locks.

Also deployable within the same cloud-based system, PULSE key-operated digital cylinders are self-powered using energy harvesting technology – no wires, no batteries. They consume no power in use. The PULSE cylinder range includes door locks, cam-locks, furniture locks and padlocks which operate outdoors in any climate. Almost any mechanical or electromechanical cylinder can simply be switched for a PULSE device and connected to Incedo without wires or drilling.

Incedo systems can also include hardwired, high-security doors with ASSA ABLOY Signo readers. These upgrade door and identity security without compatibility worries. Signo readers are powered by Seos, with the highest encryption and authentication standards. Each one supports almost any RFID credential and is mobile-ready when installed – Bluetooth, NFC and Apple Wallet.

A shared Seos backbone ensures all credential types may be deployed together, which makes gradual site upgrading easier. Incedo Mobile Keys work on most smart devices, including phones and watches. They are simpler and safer to administer than fobs or smartcards, sent over the air to employee devices and thereby removing the need to buy plastic cards or schedule time-wasting credential handover meetings. Updating, revoking or adding new access rights is practically instant.

To download an Incedo Cloud solution guide, visit https://www.assaabloy.com/group/emeia/solutions/topics/access-control/incedo/incedo-software-options/incedo-cloud

Resources

[1] https://alanadlevin.medium.com/the-convenience-economy-6f7872df587b

[2] Wireless Access Control Report 2021, campaigns.assaabloyopeningsolutions.eu/wacreport2021

[3] www.ncsc.gov.uk/whitepaper/security-benefits-of-a-good-cloud-service


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...
A new generational framework
Editor's Choice Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...