More agile, flexible access management

Issue 5 2023 Editor's Choice, Access Control & Identity Management

Efficiency, agility and convenience have become megatrends. They are important drivers across almost every area of global economic activity1. Within security and access management they play a major role in the rapid adoption of cloud infrastructure. Perhaps a third of security end users already use cloud-based software to manage access to their premises, according to one industry report2.

The motivations for cloud adoption are easy to understand. Managers want to operate from anywhere, at any time. This can be especially important in security, where unexpected issues are usually urgent, or at least time-sensitive.

Cloud management simplifies budgeting and reduces IT expenditure; its simple subscription model prevents nasty surprises in the shape of unexpected hardware or support costs. According to Polar Capital Technology Trust, the cloud “allows businesses to save the cost of having to own, maintain and manage their own data centres (servers, storage and networking) while still having the ability to provide full computing capabilities. Cloud computing is a key part of businesses’ digital transformations”.

According to the UK’s National Cyber Security Centre, cloud security services may also encourage good practice and improve resilience3.

In an economic environment where change is a constant, security management must be agile and futureproof. Cloud access control provides this. For a small or medium sized organisation, readiness to expand or pivot the use of space at any time is even more critical. The inherent scalability of a cloud solution offers a huge advantage for these businesses.

The easy way to take control

The key question is, what to look for in a cloud access management solution? The security of the cloud environment is non-negotiable. Whether self- or third-party hosted, the solution must keep data safe and software up to date.

To maximise the benefits from cloud adoption, it is also recommended that customers consider three major factors, to ensure their chosen solution will offer the flexibility benefits they expect.

• Flexible control for different security levels: areas in a building often have different security requirements. Where entrance doors or critical zones need real-time (online) monitoring including alerts, some other parts of a building might have lower demands for physical security. Here, autonomous devices can be installed faster and more cost-efficiently, with no need for network cables or hubs.

• Don’t forget to check the device range: a modern access control solution should offer a wide range of digital locks, helping a business manage their workspaces and workflows with maximum efficiency. Growing organisations require a large and diverse choice of access control hardware. Doors, cabinets, gates, server racks and almost any other opening may need to be locked with a wireless or wired device.

• A broad and futureproof choice of credentials: for user convenience, it makes sense to choose a system which supports all common RFID technologies, including iCLASS and MIFARE. However, the investment should be futureproofed, offering the chance to upgrade later to smartphone keys. Because many organisations still have legacy credentials in circulation, rolling out a shift to mobile access control will be more cost-efficient if mobile and RFID may be used simultaneously.

Boost agility and efficiency

ASSA ABLOY’s Incedo Cloud access control ecosystem was developed to meet these needs. When they choose Incedo, organisations can secure almost any opening with autonomous electronic locks or in real time with online devices. They issue building users with credentials of their choice. And they manage everything from one place, via the flexible, scalable, intuitive Incedo platform.

Building users gain access via smartcards, mobile keys stored on their smartphone, or energy-harvesting smart keys. Incedo Cloud software manages doors and users securely, from anywhere. Installation is easy, with no complex integrations required.

The entire ecosystem is modular, designed for simple adoption and easy expansion at any time and in any direction. An Incedo system can include both wired and wireless locks, all natively integrated and covering almost any application, for a handful of doors or hundreds, a startup or a staff of thousands in multiple locations.

Incedo Cloud adopters can combine online and autonomous management. For example, controlling access to entrances, labs and server rooms in real time, with online management. Adding autonomous devices alongside these adds control for access to areas that previously have been uneconomical due to location, environment, or cost. Switching between online and autonomous management is seamless. The only difference is how credentials are managed, online or via updaters.

Choice of devices and credentials

On the Incedo platform, wireless locking is provided by a range of Aperio devices with built-in readers: the Aperio wireless handle, escutcheon, cylinder, security lock and server rack lock. Aperio devices can secure almost any interior or exterior door, including wooden doors, glass doors and fire doors. Because they are wireless, installation is quick and without disruption to walls or work. They also consume much less electricity during use than equivalent wired locks.

Also deployable within the same cloud-based system, PULSE key-operated digital cylinders are self-powered using energy harvesting technology – no wires, no batteries. They consume no power in use. The PULSE cylinder range includes door locks, cam-locks, furniture locks and padlocks which operate outdoors in any climate. Almost any mechanical or electromechanical cylinder can simply be switched for a PULSE device and connected to Incedo without wires or drilling.

Incedo systems can also include hardwired, high-security doors with ASSA ABLOY Signo readers. These upgrade door and identity security without compatibility worries. Signo readers are powered by Seos, with the highest encryption and authentication standards. Each one supports almost any RFID credential and is mobile-ready when installed – Bluetooth, NFC and Apple Wallet.

A shared Seos backbone ensures all credential types may be deployed together, which makes gradual site upgrading easier. Incedo Mobile Keys work on most smart devices, including phones and watches. They are simpler and safer to administer than fobs or smartcards, sent over the air to employee devices and thereby removing the need to buy plastic cards or schedule time-wasting credential handover meetings. Updating, revoking or adding new access rights is practically instant.

To download an Incedo Cloud solution guide, visit https://www.assaabloy.com/group/emeia/solutions/topics/access-control/incedo/incedo-software-options/incedo-cloud

Resources

[1] https://alanadlevin.medium.com/the-convenience-economy-6f7872df587b

[2] Wireless Access Control Report 2021, campaigns.assaabloyopeningsolutions.eu/wacreport2021

[3] www.ncsc.gov.uk/whitepaper/security-benefits-of-a-good-cloud-service


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
Gallagher Security expands Digital Badge Programme
News & Events Access Control & Identity Management Training & Education
Following a successful launch and roll out across Australia and Papua New Guinea in 2023, Gallagher announced its Digital Badge programme is now available to channel partners and end users across the rest of APAC IMEA.

Read more...
Integrated Control Technology and Ingram Micro sign distribution agreement
News & Events Access Control & Identity Management
Integrated Control Technology, a global manufacturer of intelligent electronic access control and security solutions, announced it has extended its presence in the Middle East and Africa region by entering a distribution agreement with Ingram Micro.

Read more...
Historic Collaboration cuts ATM Bombings by 30%
Online Intelligence Editor's Choice News & Events Security Services & Risk Management
Project Big-Bang, a collaborative industry-wide task team, has successfully reduced ATM bombings in South Africa by 30,7% during the predetermined measurement period of November, December and January 2024/5.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...