How do you know access control in the cloud is secure?
Access Control as a Service (ACaaS) has grown into a mainstream product offering from many access control manufacturers and the product offering is gaining significant growth in the market. With the adoption of this technology, end users and integrators need to ask several pertinent questions.
This White Paper explores several important factors which must be understood in order for end users and integrators to make a sound decision when selecting an Access Control as a Service provider.
- Overall structure
- Perimeter security
- Internal security
- Data protection
- Redundancy & load balancing
- Support philosophy