Integration is the name of the game

Access & Identity Management Handbook 2009 News & Events

Welcome to the 2009 edition of the Access Control Handbook. Although it has been released somewhat later than is usual, this year’s handbook will offer an interesting selection of thoughts, technology and case studies.

The topic of this year’s handbook is integrated identity and access management. When we decided to focus on this area, we were not sure how far South African companies were going in integrating their security and business processes. Naturally there would be some leaders in the field, but were the majority still stuck with their proprietary, standalone solutions?

It is refreshing to see how many companies have started on the integration road. There is still a long way to go before we reach any ideal level of integration between the logical and physical worlds, but the trend is there. As you will see from the large selection of case studies we have, some companies are happy with integrating time and attendance with access control and leaving it at that, others have seen benefit in going further and hooking up their ERP software to allow centralised control over their employees identities and permissions.

It is a matter of value. As companies realise the value delivered from integration, we can expect them to take further steps, as long as budgets and vendors permit. Sadly, the proprietary nature of much of the security world makes it harder to integrate disparate products into a centralised solution.

Manufacturers of proprietary systems think they are forcing customers to stick to their brand, guaranteeing revenues for the long term. This was a solid business model in the past and still is if you are a large multinational corporation offering complete solutions, but for smaller players all you are doing is chasing your customers into the already well-greased hand of the multinationals. Future solutions are going to demand open standards that allow for integration with whatever best-of-breed systems the client requires. If you cannot provide everything, you may not be providing anything.

It is also rather refreshing to see that global corporations and cheaper Chinese products are not squeezing local manufactures out. The margin pressures are definitely there, but local quality seems to be holding its own and even beating the supposedly better international products.

As our first foray into integrated access control, we have put together a balanced publication that looks at where technology can take us in the future, but also focusing on what is happening in the real world right now. We hope you enjoy the opinions and trends as much as the case studies we have collected from a variety of companies and industries.

Comments and criticisms are welcome, as always, at [email protected].

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Gallagher Security’s Integrate Roadshow
Gallagher News & Events
Gallagher Security recently teamed up with nine technology partners to showcase the latest integrated security capabilities at the Integrate Roadshow in Durban, bringing together about 60 attendees, including end users, channel partners, consultants, and other industry professionals.

Read more...
Ransomware impersonates employees and self-spreads
News & Events
Following a recent incident, the Kaspersky Global Emergency Response team is shedding light on an attack where adversaries crafted their own variant of encryption malware equipped with self-propagation capabilities.

Read more...
Level of RDP abuse unprecedented
Sophos News & Events
Cybercriminals abused Remote Desktop Protocol (RDP) in 90% of attacks handled by Sophos Incident Response in 2023, Sophos’ newest Active Adversary Report finds. External remote services were the number-one way attackers’ initially breached networks.

Read more...
Hexagon rebrands Qognify
News & Events
Hexagon’s Safety, Infrastructure & Geospatial division announced that Qognify has officially adopted the Hexagon corporate identity and fully integrated into the division as the physical security business unit.

Read more...
Five efficiency strategies for your security installation business
Securex South Africa News & Events
A recent conversation with one Securex South Africa 2024 exhibitor, led to the event organisers being able to share some advice on helping security installers make their businesses more efficient.

Read more...
Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...