Axis Communications calls for accelerated adoption of smarter access control in IoT era
Share this content
Axis Communications, the global provider of network video, has announced its latest whitepaper, The digitization and cyber security of physical access control, to highlight the many benefits of implementing rapidly evolving, cloud-enabled physical access control systems (PACS) and to present a new vision of how such systems should be deployed and utilised in the Internet of Things (IoT) era. The whitepaper also explains that, while these technologies have the ability to help with many of the challenges faced by modern businesses regarding the security of their premises and safe flow of people, many businesses are missing out on these benefits due to barriers that are preventing adoption.
The whitepaper will be launched as part of a series of insightful online events hosted in conjunction with IFSEC Global this autumn looking at topical subjects being discussed in the physical security industry. The Exploring New Paths to Success events will begin on 9 September 2020 with a focus on Frictionless Access Control, a topic that has seen a dramatic increase in interest resulting from the recent global pandemic. The event will explore the benefits of a frictionless access control system in an increasingly contactless society and consider the four core pillars that are essential to a successful design, with viewpoints from a global retailer.
Converging security technologies commonly utilising ageing, traditional infrastructure, present a real challenge for vendors who not only need to adapt their hardware offering to connect to existing corporate networks, but also to realise the importance of evaluating the cyber maturity of systems to guard against the many risks posed to an enterprise. As criminals become more sophisticated and the threat landscape continues to evolve, the challenge lies in preventing the risk of cloned access credentials, insider threats or remotely launched cyber-attacks.
Most new systems make use of network connectivity, even if only for communication to alarm points, or for audit purposes. Therefore, cybersecurity considerations should be a key factor. As an integral part of any physical security solution, access control technologies should be manufactured according to recognised cybersecurity principles, incident reporting and best practises. It is important to acknowledge that the cyber integrity of a system is only as strong as its weakest link. A system which cannot be deemed secure impacts negatively on its ability to provide the necessary high levels of physical security for which it has been deployed.
In addition, while businesses seek smart physical security solutions, many vendors and installers are simply not familiar with the new technology and its requirements and still follow business models set around rigid, proprietary designs. A refusal to move away from traditional models threatens to see many manufacturers left behind, unable to deliver the added value that businesses are now demanding.
John Allen, Business Development Manager, Access Control at Axis Communications and co-author of the new whitepaper commented: “Suppliers have built up a strong business model around their expertise, service and knowledge of physical security. Yet, network connectivity and the IoT present a constantly shifting landscape, requiring the traditional physical security vendor and installer to learn the language of IT; of open platforms, IP connectivity and software integration, in order to adapt to market changes and remain relevant. Our latest whitepaper creates awareness of the challenges being faced and looks at how these issues can be remedied. The paper places emphasis on the necessary cyber hygiene requirements and provides a checklist for those considering a move to hosted access control solutions.”
Further Axis online events
In addition to Axis’ frictionless access control event, taking place on 9 September 2020, the second event in the series will focus on the subject of analytics. Axis will explore the power of deep learning and AI, its ability to influence edge-based intelligence and potential to transform the world of video-based security applications. Events on perimeter protection and cybersecurity will follow in October and November.