Security Business

MAR 2019

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link:

Contents of this Issue


Page 53 of 109

52 Security Business / / March 2019 How to use the cybersecurity angle to pitch customers on making the switch to a hosted solution By Josh Perry Cloud-Based Access Control: The Cyber Pitch Access Control C ustomers who need an updated access control solution are oen most interested in learning about the proposed sys- tem's features and configurability; how- ever, integrators would be wise to make sure the conversation also addresses cybersecurity. Just like any solution that relies on IP devices, today's access con- trol systems are potential cyber targets. Fortunately, while it may seem unin- tuitive, cloud access control is a smart approach to addressing cybersecu- rity concerns. An integrator's ability to explain "why" can help gain customer trust, differentiate their offerings, and ultimately close the deal. Weaknesses of Traditional Systems Until recently, all access control systems had a soware component that dwelled in an on-site physical server or on the client's proprietary network. Most cus- tomers are familiar with this configu- ration; thus, past exposure gives them a false sense of confidence. In reality, local hosting on dedicated servers is oen far from secure. When an access control solution depends on locally hosted, dedicated servers, vulnerabilities can result from lax installation of patches and updates, system interruptions from planned and unplanned maintenance, the failure to make regular and secure data backups

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Business - MAR 2019