More agile, flexible access management

Issue 5 2023 Editor's Choice, Access Control & Identity Management

Efficiency, agility and convenience have become megatrends. They are important drivers across almost every area of global economic activity1. Within security and access management they play a major role in the rapid adoption of cloud infrastructure. Perhaps a third of security end users already use cloud-based software to manage access to their premises, according to one industry report2.

The motivations for cloud adoption are easy to understand. Managers want to operate from anywhere, at any time. This can be especially important in security, where unexpected issues are usually urgent, or at least time-sensitive.

Cloud management simplifies budgeting and reduces IT expenditure; its simple subscription model prevents nasty surprises in the shape of unexpected hardware or support costs. According to Polar Capital Technology Trust, the cloud “allows businesses to save the cost of having to own, maintain and manage their own data centres (servers, storage and networking) while still having the ability to provide full computing capabilities. Cloud computing is a key part of businesses’ digital transformations”.

According to the UK’s National Cyber Security Centre, cloud security services may also encourage good practice and improve resilience3.

In an economic environment where change is a constant, security management must be agile and futureproof. Cloud access control provides this. For a small or medium sized organisation, readiness to expand or pivot the use of space at any time is even more critical. The inherent scalability of a cloud solution offers a huge advantage for these businesses.

The easy way to take control

The key question is, what to look for in a cloud access management solution? The security of the cloud environment is non-negotiable. Whether self- or third-party hosted, the solution must keep data safe and software up to date.

To maximise the benefits from cloud adoption, it is also recommended that customers consider three major factors, to ensure their chosen solution will offer the flexibility benefits they expect.

• Flexible control for different security levels: areas in a building often have different security requirements. Where entrance doors or critical zones need real-time (online) monitoring including alerts, some other parts of a building might have lower demands for physical security. Here, autonomous devices can be installed faster and more cost-efficiently, with no need for network cables or hubs.

• Don’t forget to check the device range: a modern access control solution should offer a wide range of digital locks, helping a business manage their workspaces and workflows with maximum efficiency. Growing organisations require a large and diverse choice of access control hardware. Doors, cabinets, gates, server racks and almost any other opening may need to be locked with a wireless or wired device.

• A broad and futureproof choice of credentials: for user convenience, it makes sense to choose a system which supports all common RFID technologies, including iCLASS and MIFARE. However, the investment should be futureproofed, offering the chance to upgrade later to smartphone keys. Because many organisations still have legacy credentials in circulation, rolling out a shift to mobile access control will be more cost-efficient if mobile and RFID may be used simultaneously.

Boost agility and efficiency

ASSA ABLOY’s Incedo Cloud access control ecosystem was developed to meet these needs. When they choose Incedo, organisations can secure almost any opening with autonomous electronic locks or in real time with online devices. They issue building users with credentials of their choice. And they manage everything from one place, via the flexible, scalable, intuitive Incedo platform.

Building users gain access via smartcards, mobile keys stored on their smartphone, or energy-harvesting smart keys. Incedo Cloud software manages doors and users securely, from anywhere. Installation is easy, with no complex integrations required.

The entire ecosystem is modular, designed for simple adoption and easy expansion at any time and in any direction. An Incedo system can include both wired and wireless locks, all natively integrated and covering almost any application, for a handful of doors or hundreds, a startup or a staff of thousands in multiple locations.

Incedo Cloud adopters can combine online and autonomous management. For example, controlling access to entrances, labs and server rooms in real time, with online management. Adding autonomous devices alongside these adds control for access to areas that previously have been uneconomical due to location, environment, or cost. Switching between online and autonomous management is seamless. The only difference is how credentials are managed, online or via updaters.

Choice of devices and credentials

On the Incedo platform, wireless locking is provided by a range of Aperio devices with built-in readers: the Aperio wireless handle, escutcheon, cylinder, security lock and server rack lock. Aperio devices can secure almost any interior or exterior door, including wooden doors, glass doors and fire doors. Because they are wireless, installation is quick and without disruption to walls or work. They also consume much less electricity during use than equivalent wired locks.

Also deployable within the same cloud-based system, PULSE key-operated digital cylinders are self-powered using energy harvesting technology – no wires, no batteries. They consume no power in use. The PULSE cylinder range includes door locks, cam-locks, furniture locks and padlocks which operate outdoors in any climate. Almost any mechanical or electromechanical cylinder can simply be switched for a PULSE device and connected to Incedo without wires or drilling.

Incedo systems can also include hardwired, high-security doors with ASSA ABLOY Signo readers. These upgrade door and identity security without compatibility worries. Signo readers are powered by Seos, with the highest encryption and authentication standards. Each one supports almost any RFID credential and is mobile-ready when installed – Bluetooth, NFC and Apple Wallet.

A shared Seos backbone ensures all credential types may be deployed together, which makes gradual site upgrading easier. Incedo Mobile Keys work on most smart devices, including phones and watches. They are simpler and safer to administer than fobs or smartcards, sent over the air to employee devices and thereby removing the need to buy plastic cards or schedule time-wasting credential handover meetings. Updating, revoking or adding new access rights is practically instant.

To download an Incedo Cloud solution guide, visit https://www.assaabloy.com/group/emeia/solutions/topics/access-control/incedo/incedo-software-options/incedo-cloud

Resources

[1] https://alanadlevin.medium.com/the-convenience-economy-6f7872df587b

[2] Wireless Access Control Report 2021, campaigns.assaabloyopeningsolutions.eu/wacreport2021

[3] www.ncsc.gov.uk/whitepaper/security-benefits-of-a-good-cloud-service


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...