Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Access Control: What’s on the Horizon

door_enews
December 9, 2014

Interoperability, unification and integration are no longer just the buzzwords of the moment. As anyone in the physical security industry knows, these market forces are now driving product development, systems integration, training and even the relationships between manufacturers, integrators and end users themselves.

Historically, changes in access control trends have been slower to occur than in other security sectors, such as video. But change is afoot in the access control market, where integration has become king, wireless access control costs have come down and biometrics is no longer reserved for high assurance facilities.

To find out what’s happening currently and what to expect on the horizon for the access control industry, Jason Ouellette, Tyco Security Products’ Product Line Director for Access Control, answers some questions about whether these general trends toward adaptability, interoperability, unification and integration are infiltrating the access control world and talks about what we can expect to see next in access control.


What are some of the biggest changes you’ve seen in the access control market in the last one to two years?  

“One of the bigger changes has been the move from integrations to unifications, to unified platforms. Unification provides access and video information that lowers the overall cost of ownership with a single server solution along with enhanced feature capabilities.  An example of these capabilities would be the ability to have deeper sets of analytics and reporting capabilities for customers off of the combined datasets.

“Another change is the adoption of wireless locks, which is a significant growth area for access control. These types of products have been around for a few years, but with acceptance of their use increasing and with the price points of electronic locks coming down, access control systems are now adopting wireless locks. They provide the same security of a traditional key-based solution with the added capabilities of accountability and auditing. For example, a traditional door lock can range from $2,500 to $6,000 per entryway. With a wireless lock, you can create specialized access for particular employees. For example, in an IT space where server racks are located or in a hospital pharmacy, the cost can be as low as $500 to $1,000.”


Is the cloud being used in access control today? How and by whom?

“Yes, it is being used in access control today. The how and by whom is based on virtualization and the use of a hyper-visor. A hyper-visor is the platform used for creating and running virtual machines. Most Fortune 500 companies are using virtualized servers today. Their clouds may be outsourced to a cloud provider such as Amazon, Google or another provider. There’s a lot of interest in moving in that direction.

“There are still some concerns regarding data privacy, which is the most prominent concern. Another concern is localized high availability and disaster recovery. For example, what if there is a disaster of some kind in which an operator can’t access the cloud, but needs to operate a system locally? Addressing these specific requirements is definitely on the minds of most manufacturers as they develop new products.

“A recent report by IHS (Information Handling Services) shows that until these specific areas are addressed in access control as a whole, adoption of cloud for access control systems will remain slow. Today, hosted and managed solutions are some of the fast-movers.”


Is enterprise access control a growing trend? Are you seeing any significant growth/increased demand for this in certain vertical markets, i.e. beyond corporate or government use. Are you addressing these needs with the development of new products?

“Enterprise access control is definitely a growing trend. Both scale of economy and single point of contact come into play. Customers want a single source for information, and there are very few brands in the field today that can offer that tight integration of access control and video details in a single database. This single database is easier for the end user to navigate and provides the opportunity to use live and recorded video with efficiency.

“Government and corporate sections are the key interest areas. But we are also seeing growing interest in medium to large sized businesses. Anyone with a WAN system could benefit from using enterprise access control in upgrades and in deployments because the enterprise model is designed to reduce turns on the network and because of its distributed architecture. In many ways, an enterprise approach solves WAN problems. Otherwise, customers are at the mercy of WAN communications, which may be slow.  Reporting is a great example in which a product not designed for the WAN enterprise environment can be piping massive amounts of data across a network in an inefficient manner, resulting in slow performance and application failures.” 


How will access control integration with biometrics look within the next few years? What can we expect to see from the industry in terms of biometrics?

“Biometrics has always been an interesting topic. Higher costs and reliability of biometrics have kept it small in scope thus far. Over the years, both technology and adoption have improved. I see biometrics as an area that will gain momentum and focus. But in government and other high assurance areas, it is currently an absolute requirement. The government sector has launched efficacy and use case studies on both fingerprint and iris technology. One interesting result from a study was that a fingerprint scan is quicker in moving people through a point of entry, as having an iris scan does produce some amount of anxiety for users, which causes them to pause.

“Some manufacturers are providing biometric features natively in their products, which is a key strength for the airport market. In addition, there is a need to form strong biometric partnerships in order to provide the multi-factor access control required to meet government specs for high assurance.

“The new focus in biometrics is frictionless access control — i.e. non-contact. I see the market in general moving in that direction, but there are some reliability issues to be addressed first. What is coming next will be finger/palm vein and face recognition. You’ll likely see technology organizations such as Facebook and Google implement these as early adopters.”


How are standardization organizations impacting the product development of access control solutions?

“On the video side of the business, we’ve seen standards developed by ONVIF for IP cameras in video systems, and now we’re starting to see the migration toward access control standards, most recently with ONVIF’s Profile C. OSDP (SIA Open Supervised Device Protocol) and PSIA (Physical Security Interoperability Alliance) are pushing for interoperability between access control systems, as well.

“These standards will provide a protection of the customer’s investment. Integrators and consultants are driving this, too. Most product developers are looking to adopt these standards to make sure their products have the ability to talk to readers from multiple solution providers.”


What role are IT departments playing in installations of access control systems and how does this impact security systems integrators?

“IT departments are often the leading deciders in access control decisions now. IT personnel are managing servers and they possess knowledge of their existing infrastructures. For example, in an installation, IT staff needs to know what bandwidth is needed for a system so that a manufacturer’s products function reliably.   

“Edge devices, such as readers and door control modules, continue to be installed by integrators, but even in those situations, the integrator still has to work with IT on IP addresses. Overall, IT is playing a significant role.”

KEYWORDS: access management trends biometric security cloud security wireless access control

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Data around the globe

    Growing data privacy enforcement on the horizon

    See More
  • guards responsive default

    The State of Physical Access Control: Impact on the Enterprise

    See More
  • Report says Advances in Surveillance Systems are on the Horizon

    See More

Related Products

See More Products
  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • databasehacker

    The Database Hacker's Handboo

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing