Successfully reported this slideshow.
Your SlideShare is downloading. ×

Access Control Segment in Madrid 2022.pptx

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad

Check these out next

1 of 19 Ad
Advertisement

More Related Content

Similar to Access Control Segment in Madrid 2022.pptx (20)

Recently uploaded (20)

Advertisement

Access Control Segment in Madrid 2022.pptx

  1. 1. Marcel Dias
  2. 2. History  Tech developers for electronic security were incorporated into large companies in the field of electrical and electronic products.  Pelco (Clovis – California): high quality equipment for closed circuit television systems > acquired by Schneider Electric in 2007  General Electric (GE) > acquired Casi-Rusco and Infographics.  Bosch (2003) > wide range of self-developed products.  Opening of trade to the Asian market > acceptable quality and reduced cost  Import > Nationalization > Customization
  3. 3. The first devices  Intercoms  Electromechanical lock  Biometrics
  4. 4. Definition  Access Control is the part of security that, through the use of policies, procedures, devices, hardware and software, qualified methods of identification and blocking systems, seeks to control and manage the transit of people, objects and information, in a given physical or logical space.  Purpose: provide protection to facilities, areas, equipment, data, information, goods and people, by preventing unauthorized access to physical or logical environments.  Control: is a noun used to define the domain or power to supervise and administer a certain thing; to have control of the situation is to dominate or have power over what is happening.  Access: refers to the act of entering, transiting, knowing or consulting information, either locally or remotely, as well as the possibility of using the information assets of a body or entity.  Access control can be considered any action, mechanism or system used to restrict and manage access to a certain physical or logical environment.
  5. 5. Main Objective  Protect physical and logical environments against unauthorized access;  Detect, intercept and contain unwanted access from: invaders, contraband, weapons, explosives, drugs, pirated products, viruses, etc.);  Manage access permissions;  Control and record entries and exits of people, objects and information;  Provide complete records of all accesses or attempts to access the organization's physical and logical environment;  Allow traceability of consented accesses.
  6. 6. Safety x Security  Safety (the importance of prevention): always seeking to avoid the accident or at least minimize the damage and losses caused as much as possible, risks of an accidental nature are analyzed. Ex1: environmental hazards, environmental damage, to human health and life. Ex2: in the context of an enterprise, analysis of the reliability of systems, security equipment, early detection, etc. always.  Security (the focus on protection): the risks are usually derived from the actions of an opponent or deliberate attacker, such as sabotage, theft, break-in, vandalism or other explicit attacks. Threats in this case are deliberate and malicious incidents generated by people. Ex: surveillance professionals and electronic security, video analytics, AI, biometric control...
  7. 7. Advantages  Greater security and control of all procedures  Savings in personnel costs.  Reduction in registration and authentication times for people and vehicles.  Monetary valuation of the place where AC is installed.  Real time record of vehicles, pedestrians and passengers.  Cost saving  Integrated departments can be more efficient and avoid security breaches.  AC can improve hospitality.  Adjust the amount of food for catering  Facility management can close off areas that aren't being used to save on utility costs.  Data privacy and update with HR integration
  8. 8. Disadvantages  Pricey > specialized hardware, multiple control boxes, one control box may be required for each entry.  Location-specific > each control box is designed precisely for an area  Requires a lot for installation > electrical power, specific wiring.  Self-contained > integration with other systems and functions is challenging.  Network dependent > network fails, disruptions, outage, backup data  Prone to hacks > hackers > internet > door lock system
  9. 9. How to draw an ACS  Identify the risks to be neutralized  Analyze the risks in the context  Different facilities: size, location, type of activity, flow of people and vehicles, etc.  Control of the exterior perimeter and the interior areas.  Open architecture (hardware/software) > work with possible third-party integrations  Open hardware > allows design to evolve and adapt it to the future risks and needs of an organization  Access control: integrated, on premise, on cloud  Reader types: keyboard, biometrics, multifactorial readers
  10. 10. 10 biggest AC providers in Spain 2171 1599 439 412 298 291 263 176 168 Distribution Madrid Barcelona Valencia Sevilla Murcia Málaga Alicante Zaragoza Pontevedra
  11. 11. AC Worldwide Demand  Construction - building projects require access control systems  Manufacturing - prevent theft of technological equipment  Financial institutions - valuable monetary assets, safes and ATMS  Hotels and Food/Beverage - digital systems for card-key access  Law firms and government agencies - sensitive and confidential documents  Healthcare facilities - medical records
  12. 12. AC World Growth
  13. 13. Some competitors and what they said  EnTTia: the demand is mostly for services, it comes from factories, chemical industry, special machinery, high risk materials. They predicted growth after covid.  GeoVictoria: biometrics growth during the pandemics, went back to normal. The priority was to identify the source of na outbreak and contact all co-workers from the same plant. Biometrics avoided vírus spread for a while, but were replaced by digital panels due to cost. Mines will also require AC because of legal issues related to accidents.  2N: Spanish law (work shift control), mobile integration is a must
  14. 14. Trends for 2022  Remote management  Cloud-based system  Integrations for smart automation  Seamless mobile experiences  Touchless technology  Multi-factor authentication and biometrics  Combining video and access control  Leveraging analytics  Smart buildings  Converging IT, cybersecurity, and PACS  Key takeaways
  15. 15. Madrid x Control Access  Most of the demand comes from industrial polygons.  Since the city is a magnet for tourism, hospitality, fairs and crowd events, an indefinite increment on demand is expected.  There are specific AC programs designed for “ocio” (leisure)
  16. 16. Madrid Map – Providers Distribution
  17. 17. Sell arguments  Cyber-awareness and user-experience are driving new purchases  Digitized systems increase productivity and convenience with smartphone-compatibility  All-in-one hub systems > smart ecosystems  Hank Monaco, VP with Johnson Control Building Solutions > cloud management > customers certainly like that  Reduce the risk associated with a lost or stolen key  Better safety and security  Control of the occupation and spaces in parking areas > minimize risks of crowds  Control the evacuation in case of emergencies  Internet security threats to businesses have been rising  The access control market grew from $7.5 billion in 2018 to $12.1 billion > crime rates globally, widespread technological advancements in security systems and across all business technology, and the prevalence of cloud-based security systems as a trend.  North America is expected to be the largest market for access control systems by 2024.  Moving into the access control market > lucrative business opportunity in the coming years and beyond.  Cost to adapt to biometrics is expected to decline, making it a potentially very profitable opportunity.
  18. 18. Investment Considerations  AC investment does not refer only to the organization, it will be directly linked to the importance of its assets, always observing the cost/benefit ratio.  Effective access control policy > management of the whole security process, not just the use of technology.  Analyze the security risks of the organization > define a control policy that meets your particular needs.  The more an actor invests in preventive insurance, the less damage it will have in case of undesirable events.  Understand investment not only as control technology, but also managing employers and service providers.  Converge efforts where the organization's risk is concentrated.  Research, development, sales and CPD must have access restricted to those who work, and a specific access control system.  The Technique of Defense in Depth > to be efficient, the access control must be addressed in the perimeter of the installations: fence, wall.
  19. 19. Source  https://www.360connect.com/supplier-blog/access-control-industry-trend/  https://study.com/academy/lesson/access-control-types-implementation.html  https://elblogdesecuritas.es/tecnologia/disenar-un-sistema-de-control-de-acceso/  https://www.securityforward.com/what-are-the-advantages-and-disadvantages-of-physical- access-control-in-security/  https://www.openpath.com/blog-post/access-control-security-trends  https://www.fortinet.com/resources/cyberglossary/access-control  https://www.nedapsecurity.com/es/insight/que-es-el-control-de-acceso-y-por-que-es- fundamental/  https://www.accesor.com/soluciones/control-de-accesos/  https://www.2n.com/es_ES/productos/control-de-accesso-ip

×