Security Dealer & Integrator

JUL 2018

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link: https://sdi.epubxp.com/i/1005317

Contents of this Issue

Navigation

Page 105 of 115

S-30 ACCESS CONTROL TRENDS AND TECHNOLOGY 2018 JULY/AUGUST And while many articles under- standably focus on ways to protect organizations against hackers and other off-premise dangers, too few are looking at the more immediate threat: access control. Access control is undergoing a rapid evolution – just look at how the U.S. Department of Defense is exploring the use of biometrics. But how else can organizations leverage the lat- est technology to improve their own security? I'd like to pose some new axioms, best practices and technology capabilities that I believe will act as drivers to improving access control in the immediate future and become the standard in the coming years. 1 Security must encom- pass more than the front door: Most secu- rity checkpoints are located just beyond the front entrance. But today's solutions also need to track what's happening once an employee is inside. To effectively enhance security, we need to know who is doing what, where and when at all times. Ignorance isn't bliss, and it can quickly leave you maimed if you're not careful. 2 Solving lost and stolen badges: Human error can quickly lead to a large break-in if just a single badge is misplaced or stolen. And the RFID badge system is riddled with flaws. In 2015, for example, more than 1,400 security badges went missing from Atlanta's Hartsfield-Jackson International Airport, which could grant access to private baggage areas, tar- macs and other secure locations. Even if they're not physically stolen, most RFID badges can be quickly cloned undetected by the user. Eliminating this challenge requires more than a simple PIN number – we need multiple authentication methods that can- not be counterfeited. 3 Eliminating badge abuse: We like to believe that an employee won't abuse their badge and security clearance – but all it takes is one rotten apple to spoil the whole bunch. A unique PIN can be assigned to prevent the use of stolen badges, but what if an insider decides to sell that infor- mation? There are several ways to be nearly 100 percent sure the person opening the door is who they say they are – and they don't require implants. Biometric authentication – such as retina, fingerprint or facial recognition – is just one way to prevent this type of badge abuse. 4 Preventing tailgating and piggybacking: A badge system can prohibit an intruder from entering, but not if someone on the inside opens the door first. These types of scenarios happen all the time – both intentionally and unintention- ally – and leave otherwise highly secured areas extremely vulner- able. To solve this, it's not enough to just know who scanned the badge – we need to know who (and how many) actually entered with them. 5 Improving emergency response: Unfortunately, the need for emergency response has become an all too common occurrence. And response times have a direct correlation to the severity of damage from a breach. Systems today lack the most critical feature to improving response time – which is identifying and relaying the exact location of the emergency. First respond- ers would benefit greatly if they could verify the authenticity and exact location of an emergency at any time. It's not enough to know which building, but rather which room and which level. 6 Building business intelligence: For good reason, our world is becoming more and more data driven. And by improving the way we monitor employees and access control, we can unlock a huge stream of untapped infor- mation. These insights could range from better understand- ing the routines and processes of staff to improve productivity, to better identifying threats and breaches before they have a chance to strike. Technology is never a cure-all. Implementing the best security for public facilities and commercial busi- nesses still requires effective pro- cesses and people. That said, if an organization integrates the right solu- tions within an effective governance framework, technology can augment and streamline security to be more effective and efficient. • About the Author: Michael Elias, director of business development at Global Net Solutions (GNS), is an experienced technologist, entrepre- neur and inventor with a successful track record in network engineering, healthcare management, satellite communications, and home auto- mation design. With GNS, he was integral to the development of the S-Badge, a smart access card that leverages IoT technology, artificial intelligence and machine learning to enhance security and unlock an entirely new range of functional- ity and data. Michael owns and co-owns multiple corporations. He earned his MBA from the University of Southern California after gradu- ating with a Bachelor of electrical engineering degree, with a minor in telecommunications, satellite GPS research, from the City University of New York.

Articles in this issue

Archives of this issue

view archives of Security Dealer & Integrator - JUL 2018