Is AC stagnant or evolving? If you look at the industry and the technology in use some areas are stagnant and have been for many years, for example the wiegand interface between readers and controllers. There has been a reluctance within the industry to change and a great deal of the equipment available is similar to what was around years ago. This trend is similar to the intruder and fire industry and it is only in the last few years that we are seeing changes happening.These changes, which are occurring in both the reader and credential arena’s along with the control panels and software can bring significant benefits to both the installer, systems integrator and end user.With the introduction of IP and it’s growing acceptance IT managers are taking more of an interest in the physical security market. In a number of industries the IT Manager is taking overall control and the security manager’s role does not exist anymore. The integration between the physical and IT / logical security systems has also increased the role of the IT department within this arena.I’d say that the Access Control industry is probably where the CCTV and telecoms industry were 5 years ago. Will the speed of change be the same? Only time will tell, but with the current political and terrorist climate security on all levels is only going to increase.There are certainly trends within the industry and these will become apparent throughout this presentation and hopefully by the end you will know what is happening within the industry. I can’t guarantee that I have covered all aspects but the main trends will be covered.
Whilst there isn’t much change in the card market, the biggest move is starting to happen with the introduction of NFC into the mobile phone. The question is why do you need to carry a separate credential when you always have your mobile with you? This is fine until you realise that you need extra authentication to ensure that the phone as a security credential is secure. Whilst PIN is the obvious choice facial recognition will become standard on phones of the future as an authentication method. Whilst already available in tablets I think you will start seeing this in the next generation phones.As mentioned for readers, biometrics is growing in acceptance for authorisation. Whilst they all have their advantages and disadvantages these issues with the technology will disappear over the coming years.
All using hosted providers at some point, for example skype and skydrive
What is the cloudAn approach to computing that’s about internet scale and connecting to a variety of devices and endpoints (source Microsoft®)We all use the cloud now, skype, amazon, bankingDon’t require costly hardware and IT teams to maintainProvides scalability and flexibility
TDSi Open Day
Corps Security Open DayInnovations in Access Control, Standards & Integrated Systems Mike Sussman
Access Control - What is happening? How is IT changingIs access control How can it change the traditionalstagnant or is it to bring benefits to security managersevolving? all? role?Are we playing What are thecatching with other technologicalindustries? trends?
Credentials Secure accessUse of phone as a required – PIN orcredential - NFC facial Facial becomingMulti modal popular – nonbiometrics growing contact
Cloud Based SolutionsWhat is the cloud? Provides faultAre we ready for it? tolerance and DR Provides flexibilityYES as standard and scalability By 2014, 65% of new products to be delivered in cloud
Why cloud based systemsNo IT infrastructureto purchase and Scalability and Available accessmaintain elasticity 24/7 from anywhere Simple licensingNo installation of models – try beforeupdates buy
Why are customers using the cloud?Reduced annualcosts Agility and mobility Simple Increased end userHighly automated implementation productivity
Integrate disparate systems SDK and otherOpen fire doors in integration toolsalarm condition available Display intruder Arm/DisarmView live video on alarms in the intruder usingaccess event access software access credentials
Integration and PSIMConverges physical Analysis andsecurity with reasoning ofautomation computing Integrates Correlate events to unconnected proactively manage systems situations
5 key capabilities Analyse and Collect data from correlate data to disparate systems identify situationPresent in quick Provide standard Provide complianceand easy format to operating practices reports, trainingverify situation to manage situation and investigation
Work with Corps Security and Partners Integration with Remote Immix for management of monitoring events serverWebway One SPT Remote sitesfor secure through secure Integration of Videoconnections Webway interface into Immix
StandardsNot as regulated asthe intruder and firemarkets EN50133 outdated Has some goodIEC 60839-11-1 out points like all … it also hasfor parallel voting standards …. contentious points
Summary Increasing use of Convergence ofShift to IP based web based physical securitysystems platforms and IT Uptake of NFC as a Cloud basedUse of managed credential using solutions willservices mobiles increase