At the end of last year, we anticipated that data gathering and analysis would continue to be a strong trend, and that certainly proved to be the case in 2016.

 

More and more organisations are seeing the value of the intelligence provided by diverse systems’ data. The number and variety of networked systems and devices – both security and non-security – continued to grow steadily in the last year, and the data these disparate sources create has proven highly useful in identifying statistical patterns and trends that may indicate the likelihood of incidents occurring. More data leads to more complete intelligence, allowing organisations to more easily identify threats or business opportunities, make more informed decisions and create better outcomes in general.

Another key trend we anticipated in 2016 was the growth of security as a critical component in an organisation. This also proved to be the case in the last year, as the role of security teams continued to take on more relevance related to overall operations. This has largely been possible thanks to the ready availability of strong tools and solutions that allow security departments to lower costs, increase compliance and reduce the risk of insider threat. 

Identifying insider threats

Increased adoption of predictive analysis to identify potential threats and opportunities will continue to be a strong trend in 2017, as will the transformation of security from reactive cost centre to proactive business partner. Additionally, the coming year will see even greater emphasis on the convergence of physical and cyber security, which should come as no surprise given the ever-increasing number and sophistication of cyberattacks we have seen in recent months.

Nearly every organisation’s business strategy includes the critical need to secure networks and digital assets with technologies that apply intelligence to their infrastructures to detect vulnerabilities and improve network security. While these are vital measures, they overlook the role of physical security in protecting digital assets. Consider that many data breaches are actually perpetrated by individuals from within an organisation who are authorised to access sensitive areas of networks or facilities. Many other data breaches are the result of physical break-ins to steal a laptop or backup server.

Organisations are beginning to understand the need for strong physical security and identity management to complement cybersecurity programmes. In considering solutions to bridge the gap between the two, many find that the most effective practices are those that include physical and logical security working in tandem to thwart data breaches from inside and outside of an organisation. There is still a long way to go in making organisations aware of this reality, but we anticipate that education will expand awareness in the coming year.

Another key trend in the security industry for the last several years is mobile capability
Mobile PIAM solutions offer the ability to connect systems that use mobile devices, access control and offline locks

Increasing mobile capability

Another key trend in the security industry for the last several years is mobile capability, which will see even broader and deeper adoption and integration in 2017. A main area of growth will be mobile PIAM (physical identity and access management), which allows organisations to extend their infrastructure to areas that may otherwise be difficult or time-consuming to secure. These include locations such as outdoor or temporary venues, where deploying a traditional solution would be cost-prohibitive and where identity is often verified by consulting physical lists and checking photo IDs.

Mobile PIAM solutions offer the ability to connect systems that use mobile devices, access control and offline locks to deliver strong identity authentication, allowing organisations to more easily control access and extend control wherever there is a need. Given the flexibility, ease of use, effectiveness and cost savings these mobile PIAM solutions, will likely see steady growth in terms of both maturity and adoption in the coming year. 

Closing out another strong year

Following up on a strong 2015, Quantum Secure experienced another high-growth year in 2016. Since becoming part of HID Global in 2015, we have seen a rise in the volume and range of opportunities to deploy SAFE software solutions. Most notable was Quantum Secure’s involvement in the recent International Sporting Event held in Rio de Janeiro, Brazil, where SAFE Sports and Events Manager was deployed to manage and track the identities of approximately 500,000 credentialed individuals to reduce the risk of unauthorised intrusions and prevent potential threats. Using a mobile app, security staff were able to quickly and effectively validate individuals by simply swiping their credentials on handheld peripherals, while also performing an on-site visual verification via a workstation and/or mobile device.

Quantum Secure has led the way in software for identity management, compliance and access provisioning within physical security infrastructures, and we will continue our tradition of innovation in 2017 and beyond. We are continually looking to expand our SAFE portfolio to deliver solutions that simply physical identity and access management and generate actionable intelligence that can identify and eliminate potential risk for growing number of vertical markets and applications.

See the full coverage of 2016/2017 Review and Forecast articles here

Save

Save

Download PDF version Download PDF version

Author profile

Don Campbell Director of Product Management, Quantum Secure, Inc

In case you missed it

How should the security industry promote diversity?
How should the security industry promote diversity?

Diversity in a company’s workforce is arguably more important now than ever. Societal awareness of the importance of diversity has grown, and many people see diversity as an important factor that reflects positively (or negatively) on a company’s culture and image in the marketplace. We asked this week’s Expert Panel Roundtable: What should the security industry do to promote workplace diversity?

Why face recognition as a credential is the ideal choice for access control?
Why face recognition as a credential is the ideal choice for access control?

In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of face recognition. However, another reason the technology is gaining traction is due to the swiftly rising demand for touchless access control solutions that can help mitigate the spread of disease in public spaces. Effective for high volumes Face recognition eliminates security risks and is also virtually impossible to counterfeit Modern face recognition technology meets all the criteria for becoming the go-to solution for frictionless access control. It provides an accurate, non-invasive means of authenticating people's identities in high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. Typical electronic access control systems rely on people providing physical credentials, such as proximity cards, key fobs, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks and is also virtually impossible to counterfeit. Affordable biometric option Although there are other biometric tools available, face recognition offers significant advantages. Some technologies use hand geometry or iris scans, for example, but these options are generally slower and more expensive. This makes face recognition a natural application for day-to-day access control activities, including chronicling time and attendance for large workforces at construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual is wearing a facial covering in compliance with government or corporate mandates regarding health safety protocols. Beyond securing physical locations, face recognition can also be used to manage access to computers, as well as specialised equipment and devices. Overcoming challenges with AI So how did face recognition become so reliable when the technology was once dogged by many challenges, including difficulties with camera angles, certain types of facial expressions, and diverse lighting conditions? Thanks to the emergence of so-called "convolutional" neural network-based algorithms, engineers have been able to overcome these roadblocks. SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces One joint effort between New Jersey-based Intelligent Security Systems (ISS) and tech giant Intel has created the SecurOS FaceX face recognition solution. FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces and facial expressions, including those captured under changing light, at different resolution levels, and varying distances from the video camera. Secure video management system A common face recognition system deployment begins with IP video cameras that feed footage into a secure video management system connected to a video archive. When the software initially enrolls a person’s face, it creates a "digital descriptor" that is stored as a numeric code that will forever be associated with one identity. The system encrypts and stores these numeric codes in a SQL database. For the sake of convenience and cost savings, the video server CPU performs all neural network processes without requiring any special GPU cards. Unique digital identifiers The next step involves correlating faces captured in a video recording with their unique digital descriptors on file. The system can compare newly captured images against large databases of known individuals or faces captured from video streams. Face recognition technology can provide multi-factor authentication, searching watchlists for specific types of features, such as age, hair colour, gender, ethnicity, facial hair, glasses, headwear, and other identifying characteristics including bald spots. Robust encryption SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 To support privacy concerns, the entire system features an encrypted and secure login process that prevents unauthorized access to both the database and the archive. An additional layer of encryption is available through the use of Self-Encrypting Drives (SEDs) that hold video recordings and metadata. SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 (short for Advanced Encryption Standard). Anti-spoofing safeguards How do face recognition systems handle people who try to trick the system by wearing a costume mask or holding up a picture to hide their faces? FaceX from ISS, for example, includes anti-spoofing capabilities that essentially check for the "liveliness" of a given face. The algorithm can easily flag the flat, two-dimensional nature of a face mask, printed photo, or image on a mobile phone and issue a "spoof" alarm. Increased speed of entry Incorporating facial recognition into existing access control systems is straightforward and cost-effective Incorporating facial recognition into existing access control systems is straightforward and cost-effective. Systems can operate with off-the-shelf security cameras and computers. Users can also leverage existing infrastructure to maintain building aesthetics. A face recognition system can complete the process of detection and recognition in an instant, opening a door or turnstile in less than 500ms. Such efficiency can eliminate hours associated with security personnel checking and managing credentials manually. A vital tool Modern face recognition solutions are infinitely scalable to accommodate global enterprises. As a result, face recognition as a credential is increasingly being implemented for a wide range of applications that transcend traditional access control and physical security to include health safety and workforce management. All these capabilities make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.

What are the challenges and benefits of mobile access control?
What are the challenges and benefits of mobile access control?

There is a broad appeal to the idea of using a smartphone or wearable device as a credential for physical access control systems. Smartphones already perform a range of tasks that extend beyond making a phone call. Shouldn’t opening the door at a workplace be among them? It’s a simple idea, but there are obstacles for the industry to get there from here. We asked this week’s Expert Panel Roundtable: What are the challenges and benefits of mobile access control solutions?