Migration to match company needs

Access & Identity Management Handbook 2011 Access Control & Identity Management

Johnson Controls supports paced migration that matches organisational risk.

Access and ID management systems are continually evolving, with increasingly advanced functionality built into the software adding immense value to organisations. And because some of these systems are now modular and built on open systems, they enable organisations with non-integrated, limited functionality access and identity management systems to migrate to more sophisticated solutions at their own pace – as risk demands and budgets allow.

The key issues confronting businesses are asset protection, protection of data and intellectual property, and the safety and well-being of staff and customers. However, access and ID management systems, if integrated to HR, building management and other enterprise systems, can add significant value. The question is when, how and how fast to migrate to fully integrated solutions.

Format, software and hardware

For users, access and ID management systems are primarily distinguished one from another by the types of access devices used – a smartcard, proximity reader, biometrics or keyless cards. These ID format types can mostly be retained by organisations with updates to software, enabling enhanced functionality.

A consideration in the selection of software, which continues to rapidly advance, is to ensure that it interfaces to leading systems like SAP and Oracle whose HR suites are widely adopted. A quick solution to this is to look at which security solutions SAP, for example, interfaces to, and select from these ranges.

Primarily, organisations need to be able to add more sophisticated options for high risk areas – eg, have a standard format type (say a smartcard) for everyday personnel but added security in the form of biometrics for access to a data centre or an area where important or high value assets are kept.

The software is generally acquired in a standard version and configured to the needs of the organisation. And since most ID and access systems are modular, offering CCTV, guard tours and HR system integration as add-ons to the standard system, for instance, organisations can integrate these features easily.

The hardware that makes up these systems (the readers, controllers and locks), on the other hand, comprises possibly the most expensive part of any security solution. It thus makes sense to re-use as much of the infrastructure – down to the wiring – as possible when upgrading. Happily, some ID and access systems are today built on open systems using standard protocols like BACnet, OPC, XML and MIS that offer new and more efficient ways of communicating data and can even be interfaced to Web services.

Organisations can thus re-use much of their existing hardware.

Different strokes

In South Africa, and globally, ID and access management solutions vary broadly with myriad proprietary, off the shelf (local and international) solutions being implemented. How these solutions are configured and integrated into the enterprise solutions of the company depends entirely on the profile of the organisation.

In a mine, where high value assets are taken out of the ground and the operating environment is hazardous, security systems are integral to the operation of facilities. They can also play an important role in ensuring health and safety regulations are met if they are linked to HR systems. For instance, staff access to specific areas may be denied if they have not attended a mandated training course or have worked a maximum number of hours.

And where ID and access management is critical, organisations often develop proprietary systems. One company that made such an investment is platinum producer Lonmin. When it recently decided to update and upgrade its security, extending its investment by retaining its proprietary readers and identifiers, which did not use standard protocols or ID solutions, was a major consideration. Johnson Controls won the contract due to its ability to embed the drivers for this system in its hardware and incorporate it into its standard rules-based technologies.

Other organisations, like Rhodes University, need to ensure fast and complex registration of individuals whose status will change throughout the academic year. Johnson Controls assisted here too. Approximately 7 500 new students are registered annually using an online solution. It takes a mere 20 seconds to issue students with smartcards that allow them to access university faculties, residences and services (e.g., library and canteen). And these cards are dynamically updated so if there is an incident or the status of the individual changes, access is immediately removed or adjusted.

Yet other global organisations, are driven by the need to standardise systems and policies in order to enable consistent responses across all their branches or facilities.

Integration value

The returns provided by an investment in security can today be measured not only in terms of mitigation of the company's risk – integration and the use of specialised functionality can add significant value.

For example, in a commercial building linking a basic access control system to utility controls via the building management system can provide energy management capabilities that can cut costs for the organisation as well as enhance its eco-sustainability.

Other solutions like RFID will assist in tracking expensive equipment. And interfacing to HR systems can enable automatic updating of timesheets. There are also advantages to be had from integration of access control with health and safety rules. And, of course, limitations can be placed on access to IT systems or information depending on the role or status of individuals.

However, whatever the needs of the organisation, a key factor to ensure the longevity of an ID and access management solution is the incorporation of best practices and standards – in the solution itself and in any development or integration work required.

For more information contact Johnson Controls, +27 (0)11 921 7141, Neil.Cameron@jci.com, www.johnsoncontrols.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Simple steps to protect yourself against identity theft
November 2019 , Access Control & Identity Management
Are you doing enough to reduce the risk of having your identity stolen?

Read more...
Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Read more...
Mobile access is more secure than card systems
Access & Identity Management Handbook 2020 , Access Control & Identity Management
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.

Read more...
This is the future. This is what we do.
Access & Identity Management Handbook 2020, ZKTeco , Access Control & Identity Management
ZKTeco has created a unique range of visible light facial recognition products combined with a flexible Android platform.

Read more...
The security of biometrics
Access & Identity Management Handbook 2020, ViRDI Distribution SA, IDEMIA , Technews Publishing, Suprema , Access Control & Identity Management
Hi-Tech Security Solutions asks whether your personal biometric data is safe from prying eyes.

Read more...
A picture spoofs a thousand cameras
Access & Identity Management Handbook 2020, NEC XON, Hikvision South Africa, Technews Publishing , Access Control & Identity Management
Hi-Tech Security Solutions looks into the reliability and effectiveness of facial biometrics as well as the concerns about privacy.

Read more...
IoT and behavioural authentication
Access & Identity Management Handbook 2020, CA Southern Africa , Access Control & Identity Management
IoT represents an increasing security risk to individuals in the form of pervasive, always-on monitoring of your personal activity with a potential compromise of your most personal security credentials.

Read more...
Border crossing and national identification
Access & Identity Management Handbook 2020 , Access Control & Identity Management
Amidst a choice of technologies, diversity of policy frameworks, and emergent priorities, countries that intend to upgrade their identification systems today find themselves drawn into a complex vortex.

Read more...
T&A by biometrics in the cloud
Access & Identity Management Handbook 2020 , Access Control & Identity Management
Time and attendance solutions have evolved from punch cards to cost-effective and more accurate cloud-based biometric systems.

Read more...
Scalable access solution
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Integrated Solutions
Bosch Building Technologies makes access management simple, scalable and always available with Access Management System 2.0.

Read more...