SlideShare a Scribd company logo
1 of 12
▪ The mobile is becoming more and more the natural tool for regular users of doors
▪ Place requests, get notifications and interact with the operator
▪ Receive/loose permissions dynamically
▪ The mobile is becoming more and more the natural tool for visitors
▪ Manage the interaction required for the visit
▪ Receive/loose permissions dynamically
Mobile first strategies and its impacts
▪ What does “mobile first” mean
▪ The UI design is first optimized for a mobile use
▪ But has to adapt to desktop use
▪ The use cases are optimized for a mobile user and so are expecting
▪ Higher availability to interact but more limited interaction
▪ Ideally guided interaction
▪ Data are stored centrally and so always access to the real situation
Mobile first strategies and its impacts
▪ What does “mobile first” mean
▪ The smartphone combines multiple capabilities
▪ The user Interface for the application and for notification
▪ The element to get access
▪ Ideally guided by the phone
▪ Ideally OnDemand and instantly
(the beauty of the mobile and connected world)
Mobile first strategies and its impacts
All fine ? - Security in mobile credentials
The mobile phone should be considered unsecure as such
▪ BLE connectivity paired / unpaired
▪ No harmonized/accessible SE in the phone´s
▪ No harmonized /accessible access to the SE on the SIM´s
▪ “Unprotected” mobiles involved (rooted, 3rd party
stores;…)
Major risks out of this
▪ Threat of a “mass” remote attack on physical doors
▪ Threat of an “invisible” attack on physical doors
Recommendation - Security to be ensured
▪ Security is key - encryption able to use of public transport
▪ Mobile to be only the carrier of the permission
Applicaton
Trust Center
▪ GDPR is a challenge when it comes to
The GDPR Challenge
▪ forcing supplier and User to handle
data appropriately
▪ allowing insight into the own data
stored and used
▪ Reaction times in case are limited
▪ In several countries the location of
data storage is regulated as
additional challenge for OnDemand
solutions
▪ GDPR is an opportunity when it comes to
The GDPR Opportunity
▪ Forcing supplier and User to handle
data appropriately
▪ Clean systems and responsible data
handling
▪ Allowing insight into the own data
stored and used
▪ Systems can actively support to
retrieve the information's efficiently
▪ Reaction times in case are limited ▪ Have easy access and clear
understanding on where data are
▪ In several countries the location of
data storage is regulated as
additional challenge for OnDemand
solutions
▪ The cloud offering should have to
offer the option to select where data
are stored
The OnPremise to OnDemand journey
Drivers for the change in the infrastructure
▪ ERP systems moving and so most of the customers IT
infrastructure
▪ A general desire for managed systems by the customers
▪ The ability to provide a significant higher level of supplier services
▪ The supplier of Support and BPO is not intruding local IT structure
▪ The OnDemand system can address resistance against attacks
on a much higher level as local deployments could usually afford
Recommendation
▪ Integrate into the OnDemand or hosted ERP wherever possible
▪ Expect and plan the transition from OnPremise to OnDemand
OnDemand
Solutions
Support
and BPO
OnPremise
Solutions
Support
and BPO
Questions
Thank you
If you have any further questions
please feel free to contact
Thomas.Herling@dormakaba.com
Or to learn more at our booth B4
How Access Control is impacted by cloud, mobile and GDPR

More Related Content

Similar to How Access Control is impacted by cloud, mobile and GDPR

Enterprise app security management 2014 and beyond
Enterprise app security management 2014 and beyondEnterprise app security management 2014 and beyond
Enterprise app security management 2014 and beyondTroy C. Fulton
 
So why do you need a Mobile Strategy
So why do you need a Mobile StrategySo why do you need a Mobile Strategy
So why do you need a Mobile StrategyNaeem Arif
 
Enabling Software Technologies for Mobile Healthcare Solutions
Enabling Software Technologies for Mobile Healthcare SolutionsEnabling Software Technologies for Mobile Healthcare Solutions
Enabling Software Technologies for Mobile Healthcare SolutionsSoftServe
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowRochester Software Associates
 
Cloud: Should I Stay or Should I Go?
Cloud: Should I Stay or Should I Go?Cloud: Should I Stay or Should I Go?
Cloud: Should I Stay or Should I Go?Marcelo Martins
 
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUD
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUDSOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUD
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUDOpen Networking Summits
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya
 
Choosing the right mobile architecture
Choosing the right mobile architectureChoosing the right mobile architecture
Choosing the right mobile architectureLonneke Dikmans
 
Advantages and disadvantage
Advantages  and disadvantageAdvantages  and disadvantage
Advantages and disadvantageBrilliant21
 
OneNeck Private Equity Solutions
OneNeck Private Equity SolutionsOneNeck Private Equity Solutions
OneNeck Private Equity SolutionsScott Fitzgerald
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
 
Taking Control of SharePoint in the Cloud
Taking Control of SharePoint in the CloudTaking Control of SharePoint in the Cloud
Taking Control of SharePoint in the CloudSherWeb
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User InformationDenodo
 
Taking Corporate Banking Mobile
Taking Corporate Banking MobileTaking Corporate Banking Mobile
Taking Corporate Banking MobileACI Worldwide
 
Ensuring a successful implementation of your MNP projects
Ensuring a successful implementation of your MNP projectsEnsuring a successful implementation of your MNP projects
Ensuring a successful implementation of your MNP projectsBSP Media Group
 
Is your digital transformation driving customer experience?
Is your digital transformation driving customer experience?Is your digital transformation driving customer experience?
Is your digital transformation driving customer experience?James Crawshaw
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellAMD Developer Central
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices Troy C. Fulton
 

Similar to How Access Control is impacted by cloud, mobile and GDPR (20)

Enterprise app security management 2014 and beyond
Enterprise app security management 2014 and beyondEnterprise app security management 2014 and beyond
Enterprise app security management 2014 and beyond
 
So why do you need a Mobile Strategy
So why do you need a Mobile StrategySo why do you need a Mobile Strategy
So why do you need a Mobile Strategy
 
Enabling Software Technologies for Mobile Healthcare Solutions
Enabling Software Technologies for Mobile Healthcare SolutionsEnabling Software Technologies for Mobile Healthcare Solutions
Enabling Software Technologies for Mobile Healthcare Solutions
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
 
Cloud: Should I Stay or Should I Go?
Cloud: Should I Stay or Should I Go?Cloud: Should I Stay or Should I Go?
Cloud: Should I Stay or Should I Go?
 
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUD
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUDSOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUD
SOFTWARE DEFINED NETWORKING: FROM CAMPUS TO CARRIER, TO CLOUD
 
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
Kaseya Connect 2012 - TO ALLOW BYOD OR NOT, THAT IS THE QUESTION!
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
 
Joseph Witt
Joseph WittJoseph Witt
Joseph Witt
 
Choosing the right mobile architecture
Choosing the right mobile architectureChoosing the right mobile architecture
Choosing the right mobile architecture
 
Advantages and disadvantage
Advantages  and disadvantageAdvantages  and disadvantage
Advantages and disadvantage
 
OneNeck Private Equity Solutions
OneNeck Private Equity SolutionsOneNeck Private Equity Solutions
OneNeck Private Equity Solutions
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Taking Control of SharePoint in the Cloud
Taking Control of SharePoint in the CloudTaking Control of SharePoint in the Cloud
Taking Control of SharePoint in the Cloud
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User Information
 
Taking Corporate Banking Mobile
Taking Corporate Banking MobileTaking Corporate Banking Mobile
Taking Corporate Banking Mobile
 
Ensuring a successful implementation of your MNP projects
Ensuring a successful implementation of your MNP projectsEnsuring a successful implementation of your MNP projects
Ensuring a successful implementation of your MNP projects
 
Is your digital transformation driving customer experience?
Is your digital transformation driving customer experience?Is your digital transformation driving customer experience?
Is your digital transformation driving customer experience?
 
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 

More from Doreen Loeber

The growth of young professionals into the security industry (a live case study)
The growth of young professionals into the security industry (a live case study)The growth of young professionals into the security industry (a live case study)
The growth of young professionals into the security industry (a live case study)Doreen Loeber
 
Burnout: When bad things happen to good security professionals
Burnout: When bad things happen to good security professionalsBurnout: When bad things happen to good security professionals
Burnout: When bad things happen to good security professionalsDoreen Loeber
 
The New APP Certification
The New APP CertificationThe New APP Certification
The New APP CertificationDoreen Loeber
 
How to Secure an Open Campus
How to Secure an Open CampusHow to Secure an Open Campus
How to Secure an Open CampusDoreen Loeber
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity AssessmentDoreen Loeber
 
True or False in the Age of Fake News
True or False in the Age of Fake NewsTrue or False in the Age of Fake News
True or False in the Age of Fake NewsDoreen Loeber
 
Sharing is caring: Duty of Care and the Sharing Economy
Sharing is caring: Duty of Care and the Sharing EconomySharing is caring: Duty of Care and the Sharing Economy
Sharing is caring: Duty of Care and the Sharing EconomyDoreen Loeber
 
Video Surveillance in Marine Environments
Video Surveillance in Marine EnvironmentsVideo Surveillance in Marine Environments
Video Surveillance in Marine EnvironmentsDoreen Loeber
 
Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...Doreen Loeber
 
Vendor Partnering. The A to Z of Developing Great Relationships
Vendor Partnering. The A to Z of Developing Great RelationshipsVendor Partnering. The A to Z of Developing Great Relationships
Vendor Partnering. The A to Z of Developing Great RelationshipsDoreen Loeber
 
The competitive advantage of holding a professional certification
The competitive advantage of holding a professional certificationThe competitive advantage of holding a professional certification
The competitive advantage of holding a professional certificationDoreen Loeber
 
Career Development Workshop
Career Development WorkshopCareer Development Workshop
Career Development WorkshopDoreen Loeber
 
The ESRM Skills Cocktail
The ESRM Skills CocktailThe ESRM Skills Cocktail
The ESRM Skills CocktailDoreen Loeber
 
Research revealed on access control challenges for multinationals
Research revealed on access control challenges for multinationalsResearch revealed on access control challenges for multinationals
Research revealed on access control challenges for multinationalsDoreen Loeber
 
Artificial Intelligence and Automation in Mobility Risk Management
Artificial Intelligence and Automation in Mobility Risk ManagementArtificial Intelligence and Automation in Mobility Risk Management
Artificial Intelligence and Automation in Mobility Risk ManagementDoreen Loeber
 
Your building is talking. Are you listening?
Your building is talking. Are you listening?Your building is talking. Are you listening?
Your building is talking. Are you listening?Doreen Loeber
 
The weakest link in today’s physical security … and no, it’s not people
The weakest link in today’s physical security … and no, it’s not peopleThe weakest link in today’s physical security … and no, it’s not people
The weakest link in today’s physical security … and no, it’s not peopleDoreen Loeber
 
Why a Unified Approach to Critical Event Management Improves Operational Resi...
Why a Unified Approach to Critical Event Management Improves Operational Resi...Why a Unified Approach to Critical Event Management Improves Operational Resi...
Why a Unified Approach to Critical Event Management Improves Operational Resi...Doreen Loeber
 
Data-driven crime prevention using AI
Data-driven crime prevention using AIData-driven crime prevention using AI
Data-driven crime prevention using AIDoreen Loeber
 
Case Study: Digitalization of Systems Brings Smarter Buildings
Case Study: Digitalization of Systems Brings Smarter BuildingsCase Study: Digitalization of Systems Brings Smarter Buildings
Case Study: Digitalization of Systems Brings Smarter BuildingsDoreen Loeber
 

More from Doreen Loeber (20)

The growth of young professionals into the security industry (a live case study)
The growth of young professionals into the security industry (a live case study)The growth of young professionals into the security industry (a live case study)
The growth of young professionals into the security industry (a live case study)
 
Burnout: When bad things happen to good security professionals
Burnout: When bad things happen to good security professionalsBurnout: When bad things happen to good security professionals
Burnout: When bad things happen to good security professionals
 
The New APP Certification
The New APP CertificationThe New APP Certification
The New APP Certification
 
How to Secure an Open Campus
How to Secure an Open CampusHow to Secure an Open Campus
How to Secure an Open Campus
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
 
True or False in the Age of Fake News
True or False in the Age of Fake NewsTrue or False in the Age of Fake News
True or False in the Age of Fake News
 
Sharing is caring: Duty of Care and the Sharing Economy
Sharing is caring: Duty of Care and the Sharing EconomySharing is caring: Duty of Care and the Sharing Economy
Sharing is caring: Duty of Care and the Sharing Economy
 
Video Surveillance in Marine Environments
Video Surveillance in Marine EnvironmentsVideo Surveillance in Marine Environments
Video Surveillance in Marine Environments
 
Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...Insurance and security: finding common ground in a volatile security risk env...
Insurance and security: finding common ground in a volatile security risk env...
 
Vendor Partnering. The A to Z of Developing Great Relationships
Vendor Partnering. The A to Z of Developing Great RelationshipsVendor Partnering. The A to Z of Developing Great Relationships
Vendor Partnering. The A to Z of Developing Great Relationships
 
The competitive advantage of holding a professional certification
The competitive advantage of holding a professional certificationThe competitive advantage of holding a professional certification
The competitive advantage of holding a professional certification
 
Career Development Workshop
Career Development WorkshopCareer Development Workshop
Career Development Workshop
 
The ESRM Skills Cocktail
The ESRM Skills CocktailThe ESRM Skills Cocktail
The ESRM Skills Cocktail
 
Research revealed on access control challenges for multinationals
Research revealed on access control challenges for multinationalsResearch revealed on access control challenges for multinationals
Research revealed on access control challenges for multinationals
 
Artificial Intelligence and Automation in Mobility Risk Management
Artificial Intelligence and Automation in Mobility Risk ManagementArtificial Intelligence and Automation in Mobility Risk Management
Artificial Intelligence and Automation in Mobility Risk Management
 
Your building is talking. Are you listening?
Your building is talking. Are you listening?Your building is talking. Are you listening?
Your building is talking. Are you listening?
 
The weakest link in today’s physical security … and no, it’s not people
The weakest link in today’s physical security … and no, it’s not peopleThe weakest link in today’s physical security … and no, it’s not people
The weakest link in today’s physical security … and no, it’s not people
 
Why a Unified Approach to Critical Event Management Improves Operational Resi...
Why a Unified Approach to Critical Event Management Improves Operational Resi...Why a Unified Approach to Critical Event Management Improves Operational Resi...
Why a Unified Approach to Critical Event Management Improves Operational Resi...
 
Data-driven crime prevention using AI
Data-driven crime prevention using AIData-driven crime prevention using AI
Data-driven crime prevention using AI
 
Case Study: Digitalization of Systems Brings Smarter Buildings
Case Study: Digitalization of Systems Brings Smarter BuildingsCase Study: Digitalization of Systems Brings Smarter Buildings
Case Study: Digitalization of Systems Brings Smarter Buildings
 

Recently uploaded

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
 

Recently uploaded (20)

Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
 

How Access Control is impacted by cloud, mobile and GDPR

  • 1.
  • 2.
  • 3. ▪ The mobile is becoming more and more the natural tool for regular users of doors ▪ Place requests, get notifications and interact with the operator ▪ Receive/loose permissions dynamically ▪ The mobile is becoming more and more the natural tool for visitors ▪ Manage the interaction required for the visit ▪ Receive/loose permissions dynamically Mobile first strategies and its impacts
  • 4. ▪ What does “mobile first” mean ▪ The UI design is first optimized for a mobile use ▪ But has to adapt to desktop use ▪ The use cases are optimized for a mobile user and so are expecting ▪ Higher availability to interact but more limited interaction ▪ Ideally guided interaction ▪ Data are stored centrally and so always access to the real situation Mobile first strategies and its impacts
  • 5. ▪ What does “mobile first” mean ▪ The smartphone combines multiple capabilities ▪ The user Interface for the application and for notification ▪ The element to get access ▪ Ideally guided by the phone ▪ Ideally OnDemand and instantly (the beauty of the mobile and connected world) Mobile first strategies and its impacts
  • 6. All fine ? - Security in mobile credentials The mobile phone should be considered unsecure as such ▪ BLE connectivity paired / unpaired ▪ No harmonized/accessible SE in the phone´s ▪ No harmonized /accessible access to the SE on the SIM´s ▪ “Unprotected” mobiles involved (rooted, 3rd party stores;…) Major risks out of this ▪ Threat of a “mass” remote attack on physical doors ▪ Threat of an “invisible” attack on physical doors Recommendation - Security to be ensured ▪ Security is key - encryption able to use of public transport ▪ Mobile to be only the carrier of the permission Applicaton Trust Center
  • 7. ▪ GDPR is a challenge when it comes to The GDPR Challenge ▪ forcing supplier and User to handle data appropriately ▪ allowing insight into the own data stored and used ▪ Reaction times in case are limited ▪ In several countries the location of data storage is regulated as additional challenge for OnDemand solutions
  • 8. ▪ GDPR is an opportunity when it comes to The GDPR Opportunity ▪ Forcing supplier and User to handle data appropriately ▪ Clean systems and responsible data handling ▪ Allowing insight into the own data stored and used ▪ Systems can actively support to retrieve the information's efficiently ▪ Reaction times in case are limited ▪ Have easy access and clear understanding on where data are ▪ In several countries the location of data storage is regulated as additional challenge for OnDemand solutions ▪ The cloud offering should have to offer the option to select where data are stored
  • 9. The OnPremise to OnDemand journey Drivers for the change in the infrastructure ▪ ERP systems moving and so most of the customers IT infrastructure ▪ A general desire for managed systems by the customers ▪ The ability to provide a significant higher level of supplier services ▪ The supplier of Support and BPO is not intruding local IT structure ▪ The OnDemand system can address resistance against attacks on a much higher level as local deployments could usually afford Recommendation ▪ Integrate into the OnDemand or hosted ERP wherever possible ▪ Expect and plan the transition from OnPremise to OnDemand OnDemand Solutions Support and BPO OnPremise Solutions Support and BPO
  • 11. Thank you If you have any further questions please feel free to contact Thomas.Herling@dormakaba.com Or to learn more at our booth B4