Security Dealer & Integrator

JUL 2018

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link: https://sdi.epubxp.com/i/1005317

Contents of this Issue

Navigation

Page 27 of 115

28 Security Dealer & Integrator / www.SecurityInfoWatch.com July 2018 I n 2017, a Wisconsin-based company specializing in "micro" markets – think small- scale grocery stores – made the news by announcing it was offering to implant its own employ- ees with RFID chips. A microchip the size of a grain of rice inserted under the skin would enable employees to make purchases at their on-site micro market, open doors, log into comput- ers and access other IT infrastructure. It is bold thinking, to be sure. But is it the future? Unlikely. e sentiment itself is excellent: pro- vide individuals with a convenient, unique and secure credential that is uniquely specific to them. But given how quickly technology changes, it is a stretch to begin implanting individuals with a technology that may not have a long-term shelf life. All that said, the question the com- pany raised by offering the implant is also excellent: what does the future of access control look like? e latest and greatest technologies, such as mobile access solutions and intelligent keys, are being integrated in facilities today, but are they truly the future? e real- ity is that we are on the precipice of defining what could be described as "truthful identity." Single Solutions are no Longer Enough Another news-making incident in 2017 was a massive data breach at a leading credit check provider. More than 100 million individuals now have sensitive data – personally identifying data – out in the wild. In a world where social security numbers and passwords are available online, how do we really prove iden- tity? Consider a solution that combines three different components: Credential: e credential is still a critical component of verifying access control. It might not identify the individual per se, but with advance- ments in technology, it does enable administrators to manage, provide and revoke access to individual accounts. e reality of today's tech-savvy society is that nearly every individual now carries a cellular phone or con- nected wearable device. Using these devices – which tend to be very per- sonal for the user – the security market can now more closely tie a credential to an individual. Biometric: Adding a biometric component to the solution helps fur- ther confirm identity when it comes to access on doors, computers, or even for payment. Traditional biometrics have relied on hand readers and iris scanners at physical checkpoints, which will still exist at sensitive locations such as data centers or critical facilities; however, for day-to-day use, the simplicity of having phones and wearables with fin- gerprint readers and facial recognition will be key to implementing an addi- tional check in the system. By adding this layer of security to a phone, credentials can be authorized and activated – be it for door control The Future of Credentials Combining security layers is the key to creating the elusive "truthful identity" By Peter Boriskin Access Control The security market can more closely tie a credential to a person by leveraging smartphones or connected wearable devices.

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Dealer & Integrator - JUL 2018