“If it ain’t broke, don’t fix it,” is a phrase that I live by – mostly because I don’t have time to deal with anything that isn’t crucial to my existence. And if something does break, I just might find a work-around. But this strategy should not be applied to access control credentials. Technology has changed in order to address security demands, and failure to keep current could negatively impact a facility’s access control system.
Today I’m sharing two new resources on access control credentials. The first is an article from SJA – Security Journal Americas called Are your credentials stuck in the 70s? written by KeShia Thomas of Allegion.
Each organization has different security needs and different pain points that need to be addressed. For example, a larger business with tens of thousands of people moving throughout multiple buildings is going to have vastly different security needs compared to a smaller business with only a few employees. That said, a mobile or smart solution that’s interoperable is a suitable choice for most companies.
When an organization chooses an interoperable mobile or smart card solution featuring custom encryption keys, they are shifting in the direction of a solution that offers a higher level of security, flexibility and convenience. This creates a safer environment for all and gives peace of mind to organizations of all sizes.
Each business should evaluate their needs, such as security, convenience and budget, to
determine their ideal future state. How to get there will depend on your current hardware and technologies that you have in place. Many organizations have found it helpful to conduct a hardware audit upfront to determine what is needed in the future and how to make it happen.
Click here to read the rest of the article.
To aid in the migration from one type of credential to another, Allegion has developed an infographic outlining Four Common Credential Migration Scenarios. This resource breaks down the process for various situations, including:
- Scenario 1 – Organization is using proximity credential technology, but wants something more secure. However, business isn’t currently ready for mobile.
- Scenario 2 – Organization is using proximity credential technology. It wants something more secure, and the management team is eager to offer a digital solution to employees.
- Scenario 3 – Organization is using proximity credential technology. A better balance of security and convenience is important, but budget is limited right now.
- Scenario 4 – Organization isn’t happy with their current proprietary solution. Security is of upmost importance, but the facility manager also wants to understand their choices in electronic access control hardware.
You need to login or register to bookmark/favorite this content.
Lori,
Would love to reprint this Article (full article) in our CSI Newsletter, however, I don’t have a contact info for either you or KeShia Thomas. Can you (1) obtain permission for me to reprint the article and (2) see if you can get a copy of the article that can be put into Publisher (landscape format)?
Thanks for asking! Here is Keshia’s email address: keshia.thomas@allegion.com.
– Lori