02.02.2016 Views

GSN January 2016 Digital Edition

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Access Control<br />

The continuing evolution of Access Control<br />

technologies<br />

By Robert Laughlin, President<br />

Galaxy Control Systems<br />

In the last year, the role of access<br />

control has grown and expanded,<br />

due in large part to the<br />

continued evolution of network<br />

technologies and solutions. We<br />

live in a connected world where<br />

more and more devices of all<br />

types are being added to networks,<br />

so it makes sense that networked<br />

and software-based access control<br />

solutions have been key drivers of<br />

growth within this segment. Enhanced<br />

features and functions have<br />

enabled advanced systems that improve<br />

both security and operations<br />

while fitting within the often tight<br />

budgetary restrictions nearly all<br />

governments and agencies face today.<br />

The evolution of access control<br />

systems and applications is interesting<br />

to watch, and as these systems<br />

become more advanced, they will<br />

change the way government agencies<br />

choose, install, deploy and use<br />

these solutions. With that in mind,<br />

there are a number of trends to<br />

watch that will have the greatest impact<br />

in <strong>2016</strong> and beyond.<br />

24<br />

Integration<br />

The network has<br />

transformed access<br />

control systems<br />

from standalone<br />

solutions<br />

into a vital part<br />

of a more robust,<br />

highly integrated<br />

system that allows<br />

users to utilize a single control<br />

platform to monitor the state<br />

of a location or facility. Today’s advanced<br />

access control solutions can<br />

be integrated with human resources,<br />

identity management, video surveillance,<br />

parking and other security<br />

and non-security systems, all<br />

of which provide information and<br />

intelligence in the form of data that<br />

contributes to the emerging model<br />

of predictive analytics. The actionable<br />

intelligence that results from<br />

this analysis helps move security<br />

from a reactive to a more proactive<br />

function.<br />

With more complete information,<br />

advanced access control solutions<br />

enable better management of<br />

access control policies and procedures.<br />

By integrating these solutions<br />

with human resources, agencies can<br />

use personnel data to automatically<br />

populate and program identity card<br />

data fields to create access credentials.<br />

Compatibility<br />

As access control technologies<br />

evolve, end users must protect their<br />

previous investments while ensuring<br />

that they can implement more<br />

advanced solutions in the future.<br />

This is especially important for government<br />

applications, which can<br />

comprise a large number and variety<br />

of security and non-security<br />

systems across multiple locations<br />

and buildings. Additionally, a single<br />

system, such as access control, may<br />

include both new and legacy solutions<br />

from a variety of manufacturers,<br />

which may or may not be able to<br />

communicate with each other.<br />

Software-based controllers and<br />

other technologies excel at providing<br />

backward compatibility and enabling<br />

best-of-breed systems, allowing<br />

for uniformity in new or existing<br />

deployments. By making it possible<br />

for legacy and new solutions to coexist<br />

within the same system, these<br />

technologies enable custom systems<br />

that standardize an array of diverse<br />

solutions into a single system that

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!