Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementPhysical Security

Turning security into a frictionless experience

By Rick Focke
facial-recognition-access control freepik
July 27, 2021

It’s evident that ease of use has become of growing importance in the security industry. It’s apparent on the system management side, where mobile applications have helped to simplify the ability to remotely manage video and access control solutions. And, desktop security applications have evolved from clunky platforms that required extensive training into an intuitive and graphic-rich user experience.

Now, user experience is at the forefront of the evolution of security technology, with devices being developed that both enhance and simplify the way in which people interact with security solutions.  

One significant advancement for the security industry has been the development and introduction of frictionless access control technology – a solution that alters and simplifies the overall user experience. Once considered science fiction, this capability is now a reality.  Frictionless access control validates an individual and permits access into a defined area without the individual needing to stop and present a credential, radically changing how individuals gain access into a secure area.

In one scenario, a person would simply walk through a predefined area, while a combined surveillance and access control solution would use facial recognition technology to validate that person’s identity and determine if that individual has permission to enter that area.  

This approach is a game changer for the security industry, offering the first ever unobtrusive access control solution that can also accurately manage large volumes of people. How is security becoming a frictionless experience?

Some frictionless access control systems leverage enhanced facial detection technology to differentiate between a real person and a photograph of a person. Two imagers in the surveillance camera help to create a 3D facial topography, which increases accuracy and reduces false positives. When integrated with an access control system, the result is a solution that automatically recognizes an individual in a database and determines whether that person should be permitted to enter.

None of this, however, would be possible without advancements in artificial intelligence, deep learning algorithms and faster processing speed, allowing these systems to accurately process multiple people in the same frame and the ability to detect and recognize individual faces from several feet away. Such high throughput is ideal for large volume areas such as high-rise corporate offices during the busy morning hours, airports to reduce the risk of card sharing and tailgating into security sensitive areas, and the gaming industry, where the system can flag persons of interest for an integrated access control system action, for instance, generating an alert when a VIP is identified.

In markets where hygiene is critical, a frictionless access control solution can eliminate medical professionals from needing to present a badge to enter an operating room after scrubbing up. It can also be used to protect highly sensitive areas, such as the pharmacy and medical drug cabinets and private staff areas.

Frictionless access control is also being incorporated into areas that require a second factor of authentication. Traditionally, multi-factor authentication has brought together two forms of identification to confirm an individual is permitted to enter a specific area. For example, this could include a person presenting an access control credential along with biometric fingerprint technology, or an identification card combined with a unique PIN number. However, having to present two items can impede the flow of traffic in high volume areas because two-factor authentication is typically more time consuming than when a person presents a single credential.

Incorporating frictionless access control for higher security areas accomplishes two things. First, it provides another multi-factor authentication method. And second, facial recognition technology provides an extra level of security and is less time consuming than entering a PIN number, thereby speeding up the process.

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: access control risk management security management touchless access control video management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rick focke
Rick Focke, the Senior Product Manager for Tyco Security Products, is a technical marketing professional with broad experience in all aspects of product marketing, branding, communications and marketing strategy. He has experience in applying integrated building automation and security systems to a wide range of sales opportunities. His specialties include product lifecycle and portfolio management, strategic marketing and competitive analysis, channel communications, new product launch planning.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

Classroom with desks and chairs

School’s Out, But Security’s Not: Preparing for K-12 Summertime Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • JSO1

    Filling the void: turning empty office space into a collaborative training venue

    See More
  • Building a culture

    Security Career or Security Blanket? Turning Fearful Staying into Commitment

    See More
  • key lock

    Building, managing, and transforming security into a business enabler

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • security book.jpg

    Security Investigations: A Professional’s Guide

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing