FEATURE
mitigation capabilities while enabling
innovations in workplace experience.
For instance, biometric authentication
adds the ability to unequivocally validate
a person’s identity for greater security
and convenience, without adding
complexity for the employee or customer.
Personal Identity Verification (PIV)
solutions can also be a valuable
addition, giving banks an integrated
solution for standards-compliant identity
and credential management with the
ability to use a single secure credential
for accessing facilities and IT resources.
An example is HID Global’s PIV
Enterprise multi-factor authentication
solution, which encompasses the
entire identity lifecycle – from identity
proofing and secure credential issuance
through the retirement of the trusted
secure credential. HID Global also
offers PIV enablement solutions that
permit financial institutions to meet any
assurance level as defined by the US
Federal Government.
Why access controls?
rooms or facilities using a wide range
of credentials. Credentials can refer
to tangible or intangible objects that
prove the identity of an individual like
a password (something they know), an
access control badge (something they
have) or a biometric feature (something
they are).
Based on the credentials presented, an
ACS determines who is allowed, and
where and when they are allowed to go.
What are the different types of
access control systems?
Once credentials are verified and the
access control systems (ACS) grants
access to the authorised cardholder, an
access control point – which can be a
door, turnstile, or other physical barrier
where access is electronically controlled
– is unlocked and the transaction is
recorded by the system.
Currently, the below types of ACS
are available:
•
•
•
•
Card-based
Biometric
Mobile
Key pad
Intelligent CISO spoke to EPHREM
TESFAI, SALES ENGINEERING
MANAGER FOR THE MIDDLE EAST,
TURKEY AND AFRICA, GENETEC,
to get further insight into access
control systems.
What are the main benefits of
enterprises utilising access
control systems?
Providing a safe and welcoming work
environment is necessary for any
organisation to flourish. But finding
a balance between security and free
movement isn’t always easy. If it is too
restrictive, it hampers the flow of people
and if it is too permissive, your security
is compromised.
Physical access control is about
protecting people and assets. The
primary focus is to keep an area secure
by restricting access of unauthorised
personnel. An electronic access control
system (ACS) controls entry and exit to
50
Physical access
control is about
protecting people
and assets.
facilities or a wide range of important,
private and sensitive information.
In our increasingly interconnected world,
the potential avenues of exploitation
seem greater than ever.
Similarly, the payoffs for gaining
access are also on the rise. According
to Trustwave’s 2015 Global Security
Report, the average cybercriminal can
expect a 1,425% return on investment
(ROI). When you consider the fact that
stolen data can command a high price
on the black market or be used to
extort an organisation, it’s no surprise
that cybercriminals have become more
sophisticated and patient.
For many, a poorly maintained or outdated
access control system (ACS) can be the
gateway that a cybercriminal needs to
look into your network and premises.
Ephrem Tesfai, Sales Engineering Manager
for the ME, Turkey and Africa, Genetec
How do you see the uptake
of these systems changing
and why?
Criminal cyberactivity evolves at an
incredible pace. Today’s cybercriminals
are constantly on the lookout for security
gaps that will give them access to your
Historically, ACS manufacturers focused
on developing solutions that would
secure access as well as manage
access rights and cardholders.
But the security landscape has since
evolved and new cybersecurity threats
have emerged. Now, in addition to
effectively securing your premises from
physical threats, you must also protect
your ACS from criminal cyberactivity. u
Issue 12
|
www.intelligentciso.com