Security Business

JUL 2019

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link:

Contents of this Issue


Page 68 of 108

S8 ACCESS CONTROL Trends And Technology | JULY/AUGUST 2019 It's in this current environment that PACS now operate—with functions that are core to risk management and mitigation and focusing on interoperability—using open platforms as a building block to ongoing integration. Image Courtesy of The Next Great Phase of Physical Access Control Interoperability forges a critical connection to loT devices and peripherals By Per Björkdahl, Bob Dolan Proprietary systems, closed operating platforms and integrations that require extensive software reprogramming or modifications are finally falling out of favor in the physical security industry. A new horizon based on network-connected and IP-based products is in sight, with the promise of leveraging billions of devices soon. The digital transformation is here, and an industry that embraces and plans for seamless connectivity will be well-poised to take advantage of this rapidly changing landscape. End users are vying for ease of operation and the ability to select and upgrade products without expensive rip-and-replace scenarios, thus forcing siloed systems and proprietary technologies into things of the past. Hardware and software organizations are working together, partnering in technology and implementation. New cybersecurity processes are becoming embedded in security, surveillance and automated processes—from product conception to final commissioning. Customers want to pick and choose among appropriate technologies—ones that work best for the application and not those simply dictated as a result of the existing infrastructure. They also want to be able to handle every security task they deem critical or essential from

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Business - JUL 2019