Access control for both physical and cyber systems are critical, but many organizations rely on outdated technology and communication protocols. These can leave them exposed to data breaches, potential theft of intellectual property, and compliance violations. The problem goes beyond outdated credentials.
Physical access control systems(PACS) are made up of card readers that communicate with a controller via an access control protocol. Older systems are difficult and costly to maintain, limited in functionality and distance, and cannot be updated remotely.
A glaring weakness of older-technology PACS involve the use of proprietary software that is bound to specific hardware. This type of vendor lock-in limits an organization’s ability to turn to alternative suppliers, which could improve security, reduce costs, and enhance the user experience.
Convergint partnered with HID Global access control systems allow users to eliminate vulnerabilities, add multi-application capabilities, and pave the way for user-friendly mobile credentials.
Don’t Make Physical Access The Weak Link
Physical security and logical security management have often evolved along separate tracks, but over the past decade some physical access security products have been incorporated into IT networks, and IT has become increasingly ingrained in the procurement, evaluation, and maintenance of physical security products.
Likewise, risk mitigation through the convergence of physical and logical access is rising to the forefront, and technology is delivering the necessary security. Second-generation smart cards from HID such as Seos® are architected to enable virtually unlimited applications and allow organizations to manage the credentials independent of the underlying hardware.
These newer credentials can be used to manage secure identities not only for cards, but on mobile devices, wearables, and other form factors, and to connect via NFC, Bluetooth, and other communication protocols. Mobile devices and wearables are less likely to be left at home or to go unreported for days or weeks when missing, as is often the case with physical cards.
Replacing physical credential management with a digital process enables organizations to respond quickly to security issues, such as deactivating devices and deprovisioning a user’s credentials over the air. Similarly, mobile credentials can be issued and updated electronically while eliminating the costs and time lags of reissuing plastic cards.
Take Advantage of Upgrade Opportunities
Implementing new, more dynamic access control technologies provides many benefits over maintaining older, more static ones. The business case for an upgrade can be built around three key benefits: increased usability and support for mobile credentials now or in the future; operational efficiencies in reducing card management issues, such as massive re-carding; and greater security.
With a solid business case, security teams can seize on specific events and circumstances to implement HID recommended upgrades:
Overcoming Obstacles
Security teams face a number of challenges when it comes to upgrading PACS without disrupting day-to-day operations. An essential element of any upgrade plan is a complete site survey to determine what is installed where, and what it is meant to protect.
HID recommends the following key steps in the migration process:
Most organizations have determined that a best practice for upgrades is establishing a standard for a multi-technology credential that supports older and new access systems in order to accelerate transition. However, some organizations may realize reduced costs with a wholescale transition to new single-technology cards and related infrastructure.
The Sooner The Better
While many organizations today are aggressively improving their cyber strategies and defenses, physical access controls are often overlooked. Criminals and malicious insiders will always attempt to find the weak link in an organization’s security defenses.
Organizations need a platform that is flexible enough to support multiple applications for managing not only physical access to buildings and spaces, but for managing logical access such as computer login.
Adding new applications such as time and attendance, secure print management, biometrics, cashless vending, and more, creates opportunities to implement improved credential technology. The freedom to move access control to phones, tablets, wristbands, watches, and other wearables offers choice and convenience to end users.
The sooner an organization begins the transition away from legacy systems and devices, the sooner it can close security gaps. A well-planned transition strategy can reduce organizational resistance and build management support.