Security Dealer & Integrator

JAN 2014

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link: http://sdi.epubxp.com/i/246277

Contents of this Issue

Navigation

Page 37 of 69

ACCESS CONTROL vide the convenience of using a mobile device today. This secure peer-to-peer solution provides several advantages. Importantly, it lets organizations use Android NFC-enabled phones regardless of carrier, creating a universal solution that even works on unlocked phones. Apple iPhone users would continue using a special case. But, for many, its most important advantage is that it lets customers across multiple market segments deploy now. For those customers already using aptiQ multi-technology readers, there is no need to replace readers. These readers can work with magnetic stripe, proximity and smart cards as well as the NFC-enabled mobile phone credential all in one reader, providing an easy migration path to upgrade credentials NFC ALTERNATIVES By Paul Bodell Wi-Fi and Bluetooth technologies can also enable mobile credentialing Using a smartphone for access control is clearly more convenient since users no longer have to carry badges, keys or FOBs — also making the choice more eco-friendly. Smartphone-based access control and visitor management systems are also more secure because: • An encrypted smartphone based system is virtually impossible to hack; • Unlike prox cards, each phone has its own unique number so you won't run into duplicates in the field; • You no longer have to mount readers on the nonsecure side of the door where vandals can get to them because most smartphone technologies are long range; and • People take ownership of their smartphone and are much less likely to lend it to someone. There are four communication technologies available in smartphones besides the cellular connection — Wi-Fi, Bluetooth, Bluetooth SMART (aka Bluetooth Low Energy or Bluetooth 4.0) and NFC. A typical non-smartphone like a flip phone will only have Bluetooth. All smartphones have Wi-Fi and Bluetooth, and more phones have NFC or Bluetooth Low Energy every year. Aftermarket NFC "wrappers" can attach to a smartphone for those without the technology. Products 36 between any of those versions at their own pace. It is simply a matter of downloading the credentials to the users' phones and they are ready to go. If non-smart access technology is being used, multi-technology readers can be installed to help ease into the transition by reading both the ID badges and the smartphones. This also makes it easy for customers to continue to operate in a hybrid world of cards and mobile if needed. ❚ Jeremy Earles is Readers and Credentials Portfolio Manager for Allegion (formerly Ingersoll Rand Security Technologies). To request more info about Allegion, visit www.securityinfowatch.com/11248017. that rely on Wi-Fi or cellular can be problematic if the Wi-Fi network is down or the phone is not in cellular coverage, such as in a basement or in a remote area. Make sure that the system you select only requires a point-to-point connection between the phone and the reader. All the communication technologies in the phone have long read range except for NFC, which is limited to a few inches. Bluetooth can operate at up to 30 feet away and Wi-Fi can go even farther. Long read range allows the mounting of readers on the secure side of the door — away from vandals and the weather. Mounting the readers inside also saves a lot of money on installation costs and allows a lot of options in an architecturally or historically sensitive area. Today's hackers are pretty sophisticated and even though smartphone systems are more secure than traditional credentials, you should still pay attention to how data is transmitted. Transmitting PIN numbers is a risky proposition, so look for a system that has sophisticated encryption and does not transmit PIN numbers or other information that could easily be hacked. ❚ Paul Bodell is the president and chief executive officer of ECKey. To request more information about the company, visit www.securityinfowatch. com/10215929. www.SecurityInfoWatch.com | SD&I; | January 2014

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Dealer & Integrator - JAN 2014