Smart Access: The Next Security Evolution?

Smart Access: The Next Security Evolution?

Smart access and automated entry could become a common feature of smart-building infrastructure over the next five years. This is due to smart credentials and contactless technology enhancing how people enter buildings and grant access.

The invention of the humble lock and key dates back to the 6th century, and in its simplest form, it served societies as the earliest version of access control. Traditional locks and keys are a functional solution to the root problem of securing property and identifying an individual before allowing or denying entry. 

Devices continued to evolve throughout the 20th century, and the way residential and commercial spaces were secured vastly improved due to precision engineering and the advancement of computer technologies. In the 2010s, the evolution of access control began its next stage due to the mass production of smart devices, which today are carried by an estimated 3.6 billion people globally. This mass-scale adoption has created the infrastructure and tools needed for security developers to create innovative updates, taking access control to the next level in enhanced functionality and end-user experience.

Smart phones and smart watches create an opportunity for new innovations, and the security industry—like many others—is being upended. There is rapid advancement happening right now, such as new cloud-based and web browser technologies, as well as technology that helps us to connect things wirelessly. 

These tools are helping security manufacturers create seamless building solutions for the future.

People are becoming increasingly familiar with using multiple apps on smart devices to identify themselves and manage daily tasks. These can range from accessing social media or bank accounts to streaming content to paying bills. These services have set the bar with the level of functionality expected for a seamless experience when using smart devices for personal verification. They have prompted the security industry to follow suit when developing new products for their markets. 

From an access control perspective, we are utilizing many different ways of identifying people. Central to this is an individual’s smart device and biometric information. An example of this already happening in other industries is cashless payments. Since the pandemic began, cashless payments have accelerated at a rate that may have normally taken five years. Access control and smart credentials are next, but they are still in the early stages of development.

Smart credentials, a form of digital access control token, allow a system user to enter a secured building without a traditional key or physical card/fob. They are administered by whoever manages a given security system, and some of them are completely free to allocate and use. This makes them a more cost-effective and scalable option than physical tokens. 

Once a smart credential has been issued, a secondary layer of security can be implemented that requires the user to log into their device using their chosen security method (PIN, fingerprint or facial recognition), before using the digital token. 

Using smart credentials is convenient, secure, and particularly useful for unmanned sites; they can be issued to the user by email ahead of time, allowing him or her easy access on arrival. They can also be effective on sites where permission is granted to lots of people for short periods of time at varying intervals. 

For smart credentials and automated entry systems to become a mainstream product in people’s everyday lives, a simple system setup that uses basic PC literacy is key to mass-scale distribution. The user experience needs to run cost-effectively in the background, as security systems of the past have come with fundamentally complicated infrastructure, expensive setup costs and ongoing maintenance. 

The latest system from Paxton aims to change this, with a simple plug-and-play solution suitable for any building, anywhere with an internet connection: Paxton10. Paxton, a forward-thinking security manufacturer that distributes their technology to 63 countries worldwide, is at the forefront of this emerging market. 

We should be able to breeze seamlessly through a door with security and convenience. This is paramount in all our decisions around our newest system, Paxton10. It combines video management and access control on a single, user-friendly platform.

This article originally appeared in the January / February 2022 issue of Campus Security Today.

About the Author

Adam Stroud is the CEO of Paxton. Joining the company 25 years ago, Adam has been instrumental in transforming the business from a small local company to an international market leader in technology and security systems, employing many hundreds of staff. During his tenure, he has been directly involved in all aspects of the business, giving him a detailed understanding of how every part of the company works.

Featured

  • Transformed Yale Peabody Museum Reopens in Stunning Style

    Emerging from a major four-year renovation, the reimagined Yale Peabody Museum of Natural History has reopened its doors to the delight of the citizens of its longtime home in New Haven, Connecticut and the many visitors, students, and researchers who come to explore and learn about its breathtaking collections and fascinating exhibitions. Read Now

  • CISA Releases Anonymous Threat Response Guidance and Toolkit for K-12 Schools

    The Cybersecurity and Infrastructure Security Agency (CISA) recently released the Anonymized Threat Response Guidance: A Toolkit for K-12 Schools, a new resource to help kindergarten through grade 12 (K-12) schools and their law enforcement and community partners create tailored approaches to addressing anonymous threats of violence, including those received on social media. The toolkit outlines steps school leaders can take to assess and respond to anonymous threats, better prepare for and prevent future threats, and work in coordination with law enforcement and other local partners when these threats arise. It is co-sealed with the Federal Bureau of Investigation (FBI), which provided expert feedback on the toolkit’s key principles and strategies. Read Now

  • How Hospitals are Using Modern Technology to Improve Security

    Workplace violence is a serious and growing challenge for many organizations — including those in the healthcare industry. According to the U.S. Bureau of Labor Statistics, workers in healthcare and social services experience the highest rates of injuries caused by workplace violence and are five times as likely to suffer a workplace violence injury than workers overall — and aggressive incidents are rising. Read Now

  • Father of Georgia School Shooting Suspect Charged in Connection With Attack

    Colin Gray, the father of the 14-year-old Georgia school shooting suspect, has also been charged in connection with the attack. The 54-year-old father was charged with four counts of involuntary manslaughter, two counts of second-degree murder and eight counts of cruelty to children. Read Now

Webinars