Cloud-based access control

Access & Identity Management Handbook 2019 Access Control & Identity Management, Integrated Solutions

One of the most promising, or perhaps challenging aspects of access control has been the slow growth of cloud-based access throughout the world. The acceptance of cloud-based access has taken longer than many vendors would have preferred, some say due to the cost vs. performance ratio, others say due to security issues associated with the cloud, while others say it’s due to the reliability of connectivity options.

Yet, while there are always arguments against cloud access control services, cloud-based systems in their variety of permutations have expanded and are finding increased acceptance in various industries. To find out more about the current state of cloud-based access control, Hi-Tech Security Solutions spoke to Ernest Mallett, regional director of Tyco, the security products division of Johnson Controls.

Hi-Tech Security Solutions: Has cloud-based access control reached the stage where large companies can rely on the solution?

Mallett: Manufacturers such as Tyco, have taken advantage of recent advances in IP network technology to deliver a cloud-based access control system which is robust, reliable and secure. 128-bit AES encryption of data and low bandwidth usage to ensure real-time operation are just two key attributes for a solution which offers significant operational advantages over traditional methods of deploying access control, as well as a lower total cost of ownership.


Hi-Tech Security Solutions: What are the ­benefits of implementing cloud-based access control?

Mallett: There are so many reasons why it makes perfect sense to have a cloud-based access control system, not the least of which is the ability to make best use of human resources. Your Managed Service Provider (MSP) or your security personnel, can be anywhere in the world and yet be able to remotely manage the access control systems operating at any number of your sites, and all from the convenience of a desktop PC, tablet or smartphone. This means a security manager does not need to be on-site in real-time to manage the access credentials of colleagues, contractors and visitors, or control many other important features of an access control system.

A professionally designed and commissioned cloud-based access control solution will provide peace of mind by ensuring access control readers will continue to operate normally during any network disruption and that data related to any access control activity is recorded locally.


Hi-Tech Security Solutions: What can companies do to ensure their internal networks remain secure from hacking or malware when using a cloud service?

Mallett: While no manufacturer can offer a 100% guarantee, a combination of a high-level encryption, anti-virus software and regular software updates which take into account the latest known threats, should help keep a cloud-based solution one step ahead of the hackers.


Hi-Tech Security Solutions: What is your cloud-based solution and how does it work?

Mallett: The Kantech hattrix cloud-based access control solution allows you to manage access control for your entire estate, whether it’s one door, or thousands spread across multiple sites. With ‘hosted’ or ‘managed’ options, you can choose to work with a hattrix Managed Service Provider (MSP) to outsource all or just part of your security activities and management.

Hattrix eliminates the need to incur the capital, running and maintenance costs of utilising a server which you would normally need to do in order to operate a medium- to large-sized access control system. It is supported by the EntraPass web platform and EntraPass Go mobile app which are designed to enhance the user experience by delivering remote and convenient real-time access, to manage common security tasks. These include locking/unlocking doors, managing cards and schedules, requesting reports, viewing live video, monitoring events by floor plan and more.

With minimal training, authorised personnel are able to configure hattrix to deliver customised reports by email or they can view activity in real-time. Scheduled back-ups, audit trails and automated health checks, ensure that security best practice is adhered to at all times.

For more information contact Johnson Controls Security Products, +27 82 566 5274, [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Mines require proof of performance
Technews Publishing Mining (Industry)
The relatively hostile environment and remote locations of mining establishments mean that any electronic/technical implementations have to be easily installed, require little or no maintenance and, once commissioned, require no adjustment.

Read more...
From the Editor's Desk: Something old and something new
Technews Publishing News & Events
      Welcome to the 2024 edition of SMART Security Solutions’ Mining Handbook. Mining is a challenging industry for security professionals, although security is a challenge on this continent, no matter your ...

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Entries to southern Africa OSPA Awards now open
Technews Publishing Securex South Africa Editor's Choice News & Events
The southern Africa OSPAs are part of a global awards scheme that recognises and rewards teams, individuals and organisations for their commitment and outstanding performance within the security sector.

Read more...