Intelligent CISO Issue 12 | Page 50

FEATURE mitigation capabilities while enabling innovations in workplace experience. For instance, biometric authentication adds the ability to unequivocally validate a person’s identity for greater security and convenience, without adding complexity for the employee or customer. Personal Identity Verification (PIV) solutions can also be a valuable addition, giving banks an integrated solution for standards-compliant identity and credential management with the ability to use a single secure credential for accessing facilities and IT resources. An example is HID Global’s PIV Enterprise multi-factor authentication solution, which encompasses the entire identity lifecycle – from identity proofing and secure credential issuance through the retirement of the trusted secure credential. HID Global also offers PIV enablement solutions that permit financial institutions to meet any assurance level as defined by the US Federal Government. Why access controls? rooms or facilities using a wide range of credentials. Credentials can refer to tangible or intangible objects that prove the identity of an individual like a password (something they know), an access control badge (something they have) or a biometric feature (something they are). Based on the credentials presented, an ACS determines who is allowed, and where and when they are allowed to go. What are the different types of access control systems? Once credentials are verified and the access control systems (ACS) grants access to the authorised cardholder, an access control point – which can be a door, turnstile, or other physical barrier where access is electronically controlled – is unlocked and the transaction is recorded by the system. Currently, the below types of ACS are available: • • • • Card-based Biometric Mobile Key pad Intelligent CISO spoke to EPHREM TESFAI, SALES ENGINEERING MANAGER FOR THE MIDDLE EAST, TURKEY AND AFRICA, GENETEC, to get further insight into access control systems. What are the main benefits of enterprises utilising access control systems? Providing a safe and welcoming work environment is necessary for any organisation to flourish. But finding a balance between security and free movement isn’t always easy. If it is too restrictive, it hampers the flow of people and if it is too permissive, your security is compromised. Physical access control is about protecting people and assets. The primary focus is to keep an area secure by restricting access of unauthorised personnel. An electronic access control system (ACS) controls entry and exit to 50 Physical access control is about protecting people and assets. facilities or a wide range of important, private and sensitive information. In our increasingly interconnected world, the potential avenues of exploitation seem greater than ever. Similarly, the payoffs for gaining access are also on the rise. According to Trustwave’s 2015 Global Security Report, the average cybercriminal can expect a 1,425% return on investment (ROI). When you consider the fact that stolen data can command a high price on the black market or be used to extort an organisation, it’s no surprise that cybercriminals have become more sophisticated and patient. For many, a poorly maintained or outdated access control system (ACS) can be the gateway that a cybercriminal needs to look into your network and premises. Ephrem Tesfai, Sales Engineering Manager for the ME, Turkey and Africa, Genetec How do you see the uptake of these systems changing and why? Criminal cyberactivity evolves at an incredible pace. Today’s cybercriminals are constantly on the lookout for security gaps that will give them access to your Historically, ACS manufacturers focused on developing solutions that would secure access as well as manage access rights and cardholders. But the security landscape has since evolved and new cybersecurity threats have emerged. Now, in addition to effectively securing your premises from physical threats, you must also protect your ACS from criminal cyberactivity. u Issue 12 | www.intelligentciso.com