Industry News

Several major trends in the development of the 2014 entrance guard industry (a)

Several major trends in the development of the 2014 entrance guard industry (a)
Trend 1:
The whole industry will be rapid development, the solution from the proprietary access control architecture static transition to a more secure, open, flexible, these programs will offer new products and technology for customer, in order to promote business development.
With the changing situation and the security industry is becoming more and more complex, with the institutions and decision-making leaders with a new attitude to meet changing, and it is considered of value creation opportunities for improvement and, rather than impede or hamper business development.
In today's society, take the initiative to change helps to ensure that the agency access solutions with future threats, and make full use of the access control domain of other opportunities for development and application functions. High value of the application of the future may include electronic payment, attendance, security printing management and security network login, and become a part of the systems and facilities within the entire firm of interoperability, multi-layer security scheme. By using OSDP two-way communication solution based on industry standard, as well as dynamic rather than a static technology, can make the security function from hardware and media, and the basic framework easier to further development of existing functionality, so as to adapt and respond to changing threats.
This view has not been recognized by all, the whole industry is still in constant development and change. In a survey for integrators and users of HID Global, found that: in the last year, only 50% of respondents to upgrade their systems, more than half in the past three years no upgrade. According to the practice of top technology of the survey respondents, 75% think they are important or very important, half of them think they are not well implemented these techniques, or no implementation. Similarly, 93% of people agree: a series of best practice policy is an important or very important, but there are nearly 40% said they: implementation effect is not good, or not very good. We expect: along with the change of strategy gradually win support among the people, when the industry gradually learn how to grasp the opportunity for change, change the ratio will be.
Trend 2:
Combined with access control and security functions in IT, will change the mechanism operation mode, creating new advantages.
Previously, a mechanism of access control system and IT network login function separate from each other, and both of the groups of different management. But, now, the boundaries between these two groups have become increasingly blurred. All institutions in the hope that the same card (or smart phone) at the same time the implementation of access control system (PACS) and IT identity function, to open the door by it and log on to the computer, and other functions. So the user in the entrance, and cloud safety at the same time, can enjoy smooth user experience, thus through many different applications, organizations can also improve the identity information in intelligent card and the intelligent mobile phone on the creation, use and management of.
Soon users will be able to use single microprocessor smart card or smart phone carry multiple access certificate and disposable (OTP) dynamic password. Therefore, many companies have begun to consider in its equipment and IT access policy, for the card and phone added security access system and desktop login function, including efficiency, complete IT resources and equipment, identity information management desktop login and access control, which can be achieved by way of centralized management certificate. Each institution will be through the unified solution to achieve the real harmony application effect, they can use these programs to access IT resources, and achieve a lot of access control application. Mechanism can be used in the same application configuration and registration of IT and PACS identity information, and can implement unified workflow to a set of complete management of identity information, so as to realize the fusion mechanism.

The trend of 3:
In the IT security threats to rapid changes in the environment background, strong authentication technology is very important, and its application to access management.
Security experts are very clear multi factor authentication (also known as strong authentication) importance, especially has important meaning for the safety of IT industry. The industry is moving rapidly from simple password (the user know information) to some other authentication factors, including user owned information (such as mobile or network dynamic password) and user identity information (biological characteristics or behavioral directive). However, verification of the dual factors of user also gradually tired to hardware OTP, display card, and other equipment inconvenience. Although the industry is to replace the hardware OTP software dynamic password, and the user can use the mobile phone, tablet computer and browser type dynamic password device, but this scheme still vulnerabilities. Strong authentication scheme safer is multi application card, they use data model, can add any type of identity information, and can carry through the smart card or smart phone. The user through carrying access card (or telephone), card in a personal tablet computer or notebook computer, can be verified in a VPN, a wireless network, intranet, and network applications, single sign on (Single-sign-on) client and other IT resources. Do not need to use the other card reader or other equipment for publishing and management, also do not need to enter the password on touch screen devices.
Application of other authentication factors will be gradually increased, including the technology of biological recognition and gesture commands. With the help of custom gesture or action instructions, the user can control a variety of RFID equipment, thereby changing our access control system and interactive way in the very great degree.
Trend 4:
Through multiple strategies to achieve strong authentication.
Strong authentication current solutions will increasingly protection portal, data, cloud and other aspects of security. As part of a multilayered security strategy, they will provide the multi factor for safety verification function. In addition to multi factor authentication is used in the first layer of security in the cloud, in the firewall and have other applications, four aspects, including the verification of equipment, channel, transaction, and the application. The effective application of the five security level, requires a comprehensive, universal verification platform, and has real-time threat detection capability. Threat detection techniques for some time online banking and e-commerce, they are expected to expand into related enterprise in the field of safety protection layer, provides additional VPN or virtual desktop remote access applications, including in the health care industry to access a network record provides safety an extra layer of protection. The current health care ser. The current health care service providers increasingly use digital and mobile technology to patient care - is voluntary. In some cases, some cases were taken at the regulations under the pressure of the measures. With the popularity of these technologies, the security and privacy aspects will have a new challenge, need to use strong authentication mechanism of multilayer scheme.
Trend 5:
Mobile access control function will gradually popular.
In 2014, expects the mobile access deployment scheme will be launched in early stage, the smart phone will have similar card transaction function, but the limited technology and business environment. The subsequent stages, intelligent equipment will give full play to the airborne computing and multimedia function, in order to overcome the limitations, more powerful, more rich user transactions and experience. After that, through the connection function of smart phones will realize the traditional access control system in the majority of task card reader and server or control panel joint implementation of the. This includes according to relevant rules (access time) to verify the identity, and the use of the telephone GPS function (authorized access point). So that you can through a cloud application user authentication and secure communication, through the entrance and exit of the transitive trust news, allowing its access.
Under this new model, by the mobile device (instead of moving control system) to access decision, by the door (not the card) to provide its identity information. Also known as the role of exchange is two yuan, it has changed the way of providing access control solutions. All agencies rely on the high cost of infrastructure required to connect to the server, the control panel and the reader's will decrease, only need to be able to respond to the electronic lock can be mobile device encryption "open" command. With the simplified model of the economy, the industry can be more assets, internal portal, filing cabinets, storage devices, and other areas of the past because too expensive or complicated and cannot provide security protection.