Security Dealer & Integrator

JUL 2018

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link:

Contents of this Issue


Page 28 of 115

environment. We will get there by plan- ning ahead and working together. ■ » Peter Boriskin is VP of Commercial Product Management for ASSA ABLOY Americas. Request more info about the company at July 2018 / Security Dealer & Integrator 29 or credit card payment – only if the correct user is physically in control of the device. Inherent information: is is where things get a bit more unique. e credential of the future will likely add a component of inherent informa- tion or knowledge that is kept only by the person with access. is is infor- mation that does not live with the bank or on credit reports. ere is no database that keeps this information besides the access con- trol system. It could be something like a passphrase – a unique sentence that you would not forget. It could be something we have yet to implement. A Holistic Approach Combining these three areas provides a more holistic approach to iden- tity. While a far-reaching solution to completely thwart the most motivated hackers is unlikely, this will help keep individuals beyond the reach of a stan- dard attempt at identity the. By outlining such an aggregate approach, we start to see how we can make it much more difficult for mali- cious individuals to breach a future credential. e next steps are to find a way to get there. If we agree that the desire is to move to a consolidated identity, and that identity is comprised of a number of different aspects, then as an industry we need to focus on two things: First, we need to be the very best at what it is that we create. Be it smart cards, mobile devices, biometrics, anomaly detection or access control readers, we need to guarantee that we are providing not only the best phys- ical product but also ensuring it is a digitally secure product. Second, we need to ensure that we coexist peacefully with technologies that are not necessarily in our standard lane of expertise. Working together to blend technologies makes for a better security solution for the integrator and the end-user. Understand how Inovonics wireless allows you to offer your customers more. It's time to up your game and sell more, learn how: it just works UP YOUR GAME WITH WIRELESS Request information: For integrators and end-users, it is important to find companies that work toward those two ideals and partner with them. Seek out manufacturers who are willing to talk about the next steps. e goal for all of us should be to provide users with simplicity while using the most advanced credential in the most secure and interoperable

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Dealer & Integrator - JUL 2018