21-23 Aug 2024
ICC, Sydney

Location Services: The Shape of Things to Come

There is little doubt that security technology is evolving rapidly. One area that seems to be experiencing significant change is that of access control. The introduction of newer and more effective biometrics, mobile access and data analytics has seen a myriad of interesting products emerge.

In order to better understand where the industry is heading, John Bigelow (Security Solutions Magazine Editor) spoke with Serra Luck, Vice President, End-User and Consultant Business for HID Global.

John Bigelow: From the point of view of HID and access control, there have obviously been some significant changes in the last few years. What is HID’s vision for access control?

Serra Luck: At HID, we focus on powering trusted identities. We know and we’re thankful that millions of users are using HID every day for physical and digital access around the world. We also have more than two billion things that are identified, verified and connected with HID technology around the world. We have a large and trusted install base in education, critical national infrastructure, healthcare, utilities, transportation and financial services. I think it’s important to mention that we work with some of the most innovative companies around the world. That is quite important for us because it means we need to innovate to remain attractive to the installers and systems integrators that we are serving today.

In the few last years, we have seen a lot of changes happening in the access control market that are reflected in the evolution of HID as a business. We are seeing the emergence of trends such as artificial intelligence and the Internet of Things connected to smart buildings. We see a growth in robotics and changes in demographics happening around the world, so we are very much aware of the macro-trends that are impacting the global workplace as well as the security industry.

The introduction of mobile access back in 2014 was a turning point for HID and the broader access control market. HID, as a business, began to move from its traditional business model involving reader controllers installed on site, requiring the use of a card, to a cloud based model which enabled users to issue a virtual identity in a matter of seconds to a person’s smartphone. That is a completely new concept for the end-user with a new level of convenience, without hampering the trusted identity use in security.

As a natural extension to this, HID is now moving ahead with more innovations – location services being the latest. Location services will enable people to know at a glance things like which rooms are currently available for a meeting, or how to get to a meeting. This sort of functionality allows building owners, facility managers and enterprise security managers to optimise the use of the building.

Connected to that, we also envision that if, during an emergency, you are able to determine where people are in your building, it is much more efficient, and again, more user-friendly for security staff and facility owners while enabling better risk management.

John Bigelow: In 2014, HID introduced mobile access which, at the time was seen as a significant disruption to the traditional access control market. At this year’s Security Conference & Exhibition, we saw HID launch Location Services, but you’ve also spoken at this event about things like artificial intelligence, the Internet of Things, and robotics. What do you envision the next major disruption will be for the access control market?

Serra Luck: While the Cloud is not new in the traditional IT space, it is definitely an area that is still new to traditional physical access control security. However, making services like those available in the IT space available on the cloud for physical security is something that takes time but it is an area HID are putting a lot of effort into.

I think we will also see a move from the traditional capital expenditure model for access to control more of an operational expenditure model. This will mean that companies do not necessarily have to pay upfront to fit out an entire building but rather, can manage expenses through a user pays type of system. Combine with this will be a challenge around how we combine the trusted identity in IT space with the trusted identity in the physical access control space. How do you make this convergence seamless for the user?

John Bigelow: So between mobile access, biometrics and data analytics, is HID moving away from traditional physical access control measure such as cards in favour of virtual credentials?

Serra Luck: With mobile access, we have already brought the idea of using a virtual credential. Our mobile access products are being used in 58 different countries, with more than 130 different phones supporting mobile access at present. However, we believe that cards, readers, and controllers will continue to be a significant part of the industry for many years to come. When we work with our large corporate clients; we see time and again, how different mobile phones bring differing complexities to access control because the devices are manufactured by a third party and don’t necessarily all possess the same capabilities. We also see sites where employees and contractors work side-by-side along with people who come for temporary visits, in this scenario, how do you manage the technology when only some people have mobile access capable devices. To that end, we believe physical access card and virtual credentials will continue to reside next to each other for some time to come.

However, with the launch of our HID Location Services, virtual credentials and mobile access are areas they we expect to see significant growth in across the access control industry in the next few years.

To understand more about HID Location Services: https://www.youtube.com/watch?v=sZjdJdro2TI

For more articles like this, subscribe to the Security Newsletter

Story credit: Security Solutions Magazine

Source: http://www.securitysolutionsmagazine.biz/2017/11/10/shape-of-things-to-come/

This article was originally published by Security Solutions Magazine, Media Partner for the Security Exhibition & Conference.

  • Bring your security needs into focus
  • Register
Your browser is out-of-date!

Update your browser to view this website correctly. Update my browser now