Download PDF version Contact company
It is far less likely that an individual will loan or share mobile phone credentials than a redundant or temporary badge
PIAM solutions ensure that credentials are onboarded to all the right systems

The number of credentials people are carrying is on the rise. At any given time, an individual may be carrying badges, cards or other ID devices for their office, the gym, public transit and more, not to mention credit cards and government-issued identification. The more credentials people carry, the greater the challenge of managing and tracking these credentials poses, and the more likely that they will be lost, stolen or misused.

The way organisations handle lost badges contributes to the high number of active credentials. When an individual’s card or badge is reported as misplaced, they are typically issued an inexpensive credential that is meant to be active only until the original badge is found. If it is not found, and has not been deactivated, there are two active credentials associated with that particular identity.

Smartphones as mobile credentials

Utilising smartphones as credentials greatly reduces the probability of this happening. Given the key role they play in everyday life, people are likely to notice right away if they have lost their phone – and the mobile credentials it contains – and will quickly attempt to find it. Additionally, if a phone cannot be located, it is more likely to be (correctly) reported as lost and deactivated almost immediately. Additionally, the ability to network phones allows security to better control and manage identities in a single location, enabling stronger reporting, easier management and greater clarity into how credentials are being used.

PIAM benefits

The use of smartphones as mobile credentials is greatly facilitated with the adoption of a Physical Identity Access Management (PIAM) solution. With the ability to tie together multiple disparate security and non-security systems into a single platform, PIAM solutions ensure that credentials are onboarded to all the right systems, including access control, mobile, human resources and other disparate networked security and non-security systems. PIAM solutions streamline the processes of issuing or reissuing credentials to make sure lost badges are deactivated immediately. Policy updates and changes can be automated to maintain consistency and reduce time and effort required.

Organisations can capture and monitor data relating to how badges are used, to reduce badge sharing and other misuse. This misuse is further reduced since it is far less likely that an individual will loan or share mobile phone credentials than a redundant or temporary badge. Because the solution also captures data from access control and other systems, the organisation can apply predictive analysis to mobile devices to provide that larger picture necessary to ensure better management of identities and control of access.

 

With PIAM, any and all assets are associated to one identity record
PIAM solutions streamline the processes of issuing or reissuing credentials
for lost badges, and monitor for credential sharing

PIAM with predictive analysis capabilities

With PIAM, any and all assets are associated to one identity record. Meaning, even though John Doe has a mobile credential and a badge, the two will be associated with his single identity within the system. Should both credentials be used in different locations simultaneously, predictive analysis can determine whether this is an acceptable occurrence based on a job change, special project or other factor – or if it is an anomaly that must be investigated and/or mitigated. In this case, the system can automatically deactivate both identities and alert management, security staff and other appropriate parties. The quick response this enables will reduce the organisation’s overall risk posture while still providing excellent customer service and providing end users with the mobile capabilities they desire.

We live in a mobile world and have come to expect mobile capabilities in virtually every facet of life. Access control is no exception, as the day is coming when mobile credentials will become standard for many organisations. To date, the challenges of mobile access control have limited its adoption but that is no longer the case thanks to PIAM solutions with predictive analysis capabilities. When deployed through a PIAM platform, mobility is brought to a higher level of intelligence by provisioning access based on each individual identity and the person’s authority and access privileges within the organisation. By extending predictive analysis from enterprise systems to mobile devices, organisations gain improved management and greater control and awareness of credentials, resulting in stronger security and significantly reduced risk.

Download PDF version Download PDF version

Author profile

Don Campbell Director of Product Management, Quantum Secure, Inc

In case you missed it

What about electronic door locks with remote control?
What about electronic door locks with remote control?

Most consumers are enjoying the convenience brought by electronic locks. With the existence of electronic locks, people no longer need to be restricted by keys. There are a variety of unlocking methods and more convenient remote control unlocking options. Suppose, you are going on vacation, and with the presence of an electronic lock, you can easily enter your house with your babysitter, without a spare key. Of course, not only smart homes, but also some infrastructure and commercial buildings are enjoying the convenience, brought by electronic locks. Passive electronic lock access control system This article will introduce a smart electronic lock used in the infrastructure industry, named passive electronic lock access control system. In traditional manufacturing, mechanical locks are commonly used in all walks of life, to protect the safety of property and facilities. However, the mechanical lock has caused many practical problems in the long-term application. For example, the keys are duplicated randomly, the unlocking authority cannot be controlled, the user's operation records cannot be known, and the remote control is not possible. Imagine that if you are in a remote telecom base station, it happens that you have the wrong key in your hand and cannot open the front door. In such a situation, this lock, maybe the worst scenario. In some industries, with a wide scope and large working area, more attention must be paid to access control systems Therefore, in some industries, with a wide scope and large working area, more attention must be paid to access control systems. In some outdoor scenarios, such as base stations and electric power cabinets, the requirements for access control systems are quite strict. Due to the particularity of its environment, ordinary power-based access control systems will no longer be applicable. Therefore, the emergence of passive access control systems has solved these problems. Electronic locks offer intelligent management function Based on years of in-depth field research, Vanma has developed the Vanma passive electronic lock access control system, based on the current situation of the industry. This system is different from other electronic lock systems, as it integrates the advantages of both mechanical locks and electronic locks. It not only has the simplicity of mechanical locks, but also has the intelligent management function of electronic locks. The term ‘passive’ of passive electronic locks means that no power is needed. Passive electronic locks have the same appearance as ordinary mechanical locks, so they can be installed anywhere, just like common mechanical locks. They also have a variety of practical functions of electronic locks. Authorised remote access control The Vanma management software allows security managers to assign access rights to specific areas, for different technical personnel. In order to facilitate real-time access control, the electronic key can be used in conjunction with the mobile phone app, in order to send information about its access rights to the technicians, in real time. Vanma management software can provide access to all operations performed by technicians Vanma management software can provide access to all operations performed by technicians, including complete audit reports. Access attempts outside the specified time range or outside the specified area can be obtained through the report, so as to analyse any abnormal situations. Access control in extreme weather conditions In the access control system, the lock (lock cylinder) maintains an extremely high standard and its protection level is IP67, to ensure the greatest degree of protection. Infrared induction technology is used in the electronic key, even if the surface of the lock is wet, the electronic key can also transfer the access authority to the lock cylinder. Ensure stable exchange of information between the key and the lock cylinder. In other words, a poor connection cannot prevent the transmission of information between the key and the lock. At present, this kind of passive electronic lock is widely used in many fields, such as telecom, electric power, water utilities, public utilities, medical emergency and so on in Europe.

Is hybrid working a red flag for business security?
Is hybrid working a red flag for business security?

The ‘new normal’ was all we heard about when it came to the working model shift after the pandemic hit. Businesses worldwide adopted working from home, and then the hybrid model: a balance of remote work and office work. And according to a recent survey by 451 Research, nearly 80% of organisations surveyed said they have implemented or expanded universal work-from-home policies as a result of COVID-19, whilst 67% expect these policies to remain in place either permanently or for the long-term. With more vacant office spaces, the question is: is hybrid working a red flag for business security? Empty-office days When buildings and office spaces are still active with advanced technology, equipment and assets on show, yet footfall is not as busy as it once was, opportunistic criminals are closely watching and taking note. But what are they learning? Security systems provider, Expert Security UK, investigates our new normal. Offices are nests for expensive, valuable equipment, with maybe the latest technology Instead of a packed, busy office five or six days a week, hybrid working means more empty-office days, which is music to the ears of burglars. Offices are nests for expensive, valuable equipment, with maybe the latest technology and safes sitting there, or potential stacks of cash or company cards. You may be thinking, well, who leaves company cards or cash out? You’d be surprised, especially when business owners think they’ll never be a victim, or sometimes, staff make mistakes. Hybrid working model And don’t forget, burglars don’t always know what’s been left and will take their chances. And when a hybrid working model is the ‘new normal’, that means a lapse in security - at least in a thief’s mind. So how worried should business owners be? Well, the latest figures are pretty worrying, but also, not massively shocking. Reiterating the temptation and lure the working model shift has on robbers, Statista recorded a 12-year high for robbery offences in the UK in 2019/2020. When more businesses either shut up shop or sent staff away to home offices, it’s not hard to make a connection. These figures reflect how, when given the opportunity, thieves will strike and take advantage. Handing vital information Whether you’ve decided to go fully remote, it’s crucial to review and rethink your business security However, it’s worth noting that the lockdowns and empty streets would also have played a part in this spike, and now that we’re out of lockdowns with a world back to flipping its sign to ‘open’, many businesses will be carrying on working from home, but towns, shops, and streets are busy again. Whether you’ve decided to go fully remote, or have adopted the hybrid model, it’s crucial to review and rethink your business security, starting with your social media presence. It’s a good idea to review your social media channels. We forget how open we can be on social media, and how our digital presence can actually work as a perfect guide and insight for criminals. All they have to do is follow your channels to pick up on clues. And if you’re not giving it a minute’s thought about what you're putting out there, you may even be just handing them vital information and helping their plans. Remote working shift Of course, there is information readily available such as your opening times, location etc. But, do you really want/need to show off the new, state-of-the-art tablets you’ve just kitted your office out with? It can be hard as a business, or even as a social person, to not want to share positive news on social media, but we really do have to stop and think, especially if people know a lot about the company and its remote working shift. It’s also a good idea to have a meeting with your staff about a social media policy Maybe share a post about that new, intelligent security system you've installed instead. It’s also a good idea to have a meeting with your staff about a social media policy or maybe just a casual chat about best practices, e.g. not to tag the business in a post about their new office gadget etc. Improving business security With fewer office days, you probably won’t need to take up as much work space anymore. Maybe some equipment has become more ornamental. Anything you don’t use or need, you could sell or donate. If you do have expensive equipment lying around that’s not being used, try and make money back from it or store it elsewhere. If you are keeping a lot of expensive equipment in vacant premises, especially fixed equipment and technology, then consider installing bars and shutters over the windows. Whatever your budget, you can improve your business security tenfold with key security measures. One of them being access control. Security gates with access control are incredibly effective at stopping unauthorised people from gaining entry. There are also car park barriers and bollards that are highly effective at keeping any potential getaway vehicles out. Easily portable technology High-quality CCTV is a best friend to any business, but you need to be reviewing it frequently High-quality CCTV is a best friend to any business, but you need to be reviewing it frequently, especially if you’ve done a perimeter check and noticed any signs of forced entry or damage. Don’t forget those signs either, let visitors or trespassers know they’re on camera. To fit in with the hybrid working model, static fixtures are becoming redundant. For instance, companies are switching to laptops instead of computers, so that workers can transport them easily to and from the office. This is not only more efficient and convenient, but it means assets are more guarded. It’s the same for any other gadgets. Having easily portable technology is good for business, hybrid working, and security. Don’t forget about your deterrents. Simple signs to warn people of alarms, CCTV, and even the fact that you don’t leave equipment inside overnight can go a long way. Best security technology Thieves are famous for taking their chances. Some will meticulously plan, and many strike at a convenient, opportune time. So having signs in place that show you have high-quality, intelligent security in place can work wonders, making them think twice. It’s also worth noting that you may not have the best security technology in place at the moment, but those on the outside don’t need to know that; they can be fooled. However, having the best physical security in place is vital, as criminals lurk and will take chances. Keep reviewing your security, especially as your business adapts and reshapes - whether you return back to full office days or carry on the hybrid working model. This guest post was contributed by Danny Scholfield, Managing Director of Expert Security UK.

How soon will access control cards become extinct and why?
How soon will access control cards become extinct and why?

Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why?