It is not unreasonable to compare the evolution of the access control industry with the development of the automotive market: imagine the best car in the seventies. Comfortable, convenient, superior to many, the best in its range.

By Gustavo Gassmann *

That classic today, at 2017, could continue to provide basic services without any problem, bringing and bringing passengers. However, safety studies over the past forty years have led to awareness and awareness of the risks associated with driving. Consequently, the car and auto parts manufacturers constantly develop functionalities that minimize the risks: disc brakes, airbags, safety belts, alarms, etc.

- Advertising -

Now, if we transfer this example to the access control market, we could say that the technological evolution from the seventies to the present is much greater and vertiginous thanks to the computer development.

However, with the technological development the risks also grow. Along with technology, risks evolve, mutate, improve, become "immune" to the "cures" of the moment. For this reason, large technology companies such as HID Global go a step further, not only facing the current dangers, but also anticipating potential vulnerabilities. Hence, to acquire an awareness of migration and a culture of constant technological updating is highly recommended.

In the corporate world it is very common for companies to allocate high budgets for the updating, every three or five years, of their technological equipment (computers, tablets, cell phones). However, when it comes to technology for security, access control and secure identification, many times it is committed to maintaining obsolete systems that, although they continue to provide basic services, are ineffective against risks that are updated and renewed on a daily basis. Not to mention that updating the company's IT equipment can be significantly more expensive than migrating to current security and access control solutions.

These decisions are made even knowing that a crack in the security processes of the company can trigger situations such as flight of money, theft of personal or corporate information, intrusion, fraud and major crimes, consequences even more serious than those that may be if a computer is not updated. This is evidenced by a study published in 2012 by the Kroll agency in which it is ensured that the 61% of the companies suffered financial fraud and the 55% suffered information theft. The losses associated with this type of fraud are substantial.

Four generations in more than 25 years

The immediate advantage of technological migration is to be at the forefront, to keep pace with global progress. But this is not the only benefit: being as protected as possible is the true value, and in that HID Global is a specialist. The quality of the solutions offered is undeniable and this is demonstrated by the users who still continue to operate with equipment that corresponds to the first technology created and marketed by the company in 1991. But despite its quality and functionality, we must be clear: from that moment until today, a period that coincides with an explosive, accelerated and diverse technological growth, thousands of novel and complex ways of harming, of violating the corporate systems and committing crimes by trespassing security systems. At this point it is worth remembering the analogy of the automotive industry that was raised at the beginning.

During this time HID Global has developed several new technologies. In 2014, it launched HID Mobile Access, which works thanks to SEOS technology, and represents a generational leap against other company proposals. HID Mobile Access is a digital identification solution that enables the use of smartphones and other devices to open doors safely, both close (in "touch" mode) and remotely (in "twist and go" mode), or as a supplement to traditional card access. In addition, it allows to manage secure identities.

Currently it is very common to forget or lose your wallet, keys or physical card to access somewhere, but without the cell phone we feel we are missing a part of our body. With that single device we schedule appointments, communicate with others, work, receive and send information, and have fun. So what better tool to identify us and access physical and digital spaces and services safely, comfortably and conveniently than the mobile phone?

HID Mobile Access is a solution compatible with devices based on iOS and Android, operates via Bluetooth and opens doors without the need to start the application. The issuance, administration and revocation of secure mobile identities is managed through the HID Mobile Access portal and identities can be protected by blocking the device's screen.

The update is the way for companies to take advantage of these new solutions: initially replacing the previous readers with multi-technology readers with integrated bluetooth. With these equipments it is possible to read technologies without and with standard, technologies with proprietary encryption key and Mobile Access technology. The next step is, as the need arises, to replace the old cards with the latest technology cards, whether physical or digital. In this process, not a single day of operation is lost.

Today the world has its bets in the mobile universe and access control technology is no exception. The technological migration towards this scenario is inevitable and necessary: ​​it is much safer, convenient, reliable, comfortable and the experience is unique.

* Gustavo Gassmann is the director of the Access Control Business Unit for HID Global in Latin America.

Santiago Jaramillo
Author: Santiago Jaramillo
Social communicator and journalist with more than 15 years of experience in specialized digital and print media for Latin America. Currently Editor of the Security Sales, Building Management and Academic Coordinator of the TecnoEdificios Congress.


article thumbnailArcules The SaaS video surveillance solution from Arcules allows access to any camera from any device at any time, with ...
article thumbnailHID Global The new tool HID AR Reader Tool innovates the way in which integrators, installers and consultants implement and use the products ...
article thumbnailISS The v.10 version of the SecurOS video management system has the facial recognition FaceX solution that extends ...
article thumbnailDahua Technology The new series of XVR recorders with artificial intelligence XVR5000-I / XVR7000-4KL-I, have intelligent detection of ...
article thumbnailSony The network camera SNC-VB770 4K has high levels of minimum illumination, less than 0.004 lx, to capture videos to 4K / 30 fps ...
article thumbnailInternational. The Top 100 Latin American Integration of the Industry of ... report is now available for sale in English and / or Spanish.
article thumbnailU.S. The ninth edition of the ALAS Management Summit (June 26 and 27 in Miami) is up to date with the needs of professionals and ...
article thumbnailInternational. A cardboard sign with a colorful pattern. All the researchers from the Faculty of Technology Engineering of KU Leuven ...
article thumbnailInternational. The Open Source Security and Risk Analysis (OSSRA) report indicates that most organizations still work for ...
article thumbnailInternational. A forensic team in the United Kingdom is using a new mass spectrometry technology that could help solve ...