Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementPhysical Security

Turning security into a frictionless experience

By Rick Focke
facial-recognition-access control freepik
July 27, 2021

It’s evident that ease of use has become of growing importance in the security industry. It’s apparent on the system management side, where mobile applications have helped to simplify the ability to remotely manage video and access control solutions. And, desktop security applications have evolved from clunky platforms that required extensive training into an intuitive and graphic-rich user experience.

Now, user experience is at the forefront of the evolution of security technology, with devices being developed that both enhance and simplify the way in which people interact with security solutions.  

One significant advancement for the security industry has been the development and introduction of frictionless access control technology – a solution that alters and simplifies the overall user experience. Once considered science fiction, this capability is now a reality.  Frictionless access control validates an individual and permits access into a defined area without the individual needing to stop and present a credential, radically changing how individuals gain access into a secure area.

In one scenario, a person would simply walk through a predefined area, while a combined surveillance and access control solution would use facial recognition technology to validate that person’s identity and determine if that individual has permission to enter that area.  

This approach is a game changer for the security industry, offering the first ever unobtrusive access control solution that can also accurately manage large volumes of people. How is security becoming a frictionless experience?

Some frictionless access control systems leverage enhanced facial detection technology to differentiate between a real person and a photograph of a person. Two imagers in the surveillance camera help to create a 3D facial topography, which increases accuracy and reduces false positives. When integrated with an access control system, the result is a solution that automatically recognizes an individual in a database and determines whether that person should be permitted to enter.

None of this, however, would be possible without advancements in artificial intelligence, deep learning algorithms and faster processing speed, allowing these systems to accurately process multiple people in the same frame and the ability to detect and recognize individual faces from several feet away. Such high throughput is ideal for large volume areas such as high-rise corporate offices during the busy morning hours, airports to reduce the risk of card sharing and tailgating into security sensitive areas, and the gaming industry, where the system can flag persons of interest for an integrated access control system action, for instance, generating an alert when a VIP is identified.

In markets where hygiene is critical, a frictionless access control solution can eliminate medical professionals from needing to present a badge to enter an operating room after scrubbing up. It can also be used to protect highly sensitive areas, such as the pharmacy and medical drug cabinets and private staff areas.

Frictionless access control is also being incorporated into areas that require a second factor of authentication. Traditionally, multi-factor authentication has brought together two forms of identification to confirm an individual is permitted to enter a specific area. For example, this could include a person presenting an access control credential along with biometric fingerprint technology, or an identification card combined with a unique PIN number. However, having to present two items can impede the flow of traffic in high volume areas because two-factor authentication is typically more time consuming than when a person presents a single credential.

Incorporating frictionless access control for higher security areas accomplishes two things. First, it provides another multi-factor authentication method. And second, facial recognition technology provides an extra level of security and is less time consuming than entering a PIN number, thereby speeding up the process.

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: access control risk management security management touchless access control video management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rick focke
Rick Focke, the Senior Product Manager for Tyco Security Products, is a technical marketing professional with broad experience in all aspects of product marketing, branding, communications and marketing strategy. He has experience in applying integrated building automation and security systems to a wide range of sales opportunities. His specialties include product lifecycle and portfolio management, strategic marketing and competitive analysis, channel communications, new product launch planning.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Half open laptop

4 Data Security Incidents to Know About (February 2026)

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Job interview

Why Security Teams Can No Longer Ignore Recruitment Fraud

Woman in suit

Can the Industry Do More for Women in Security?

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • JSO1

    Filling the void: turning empty office space into a collaborative training venue

    See More
  • key lock

    Building, managing, and transforming security into a business enabler

    See More
  • Chaim Mazal-Chief Security Officer-Gigamon

    Chaim Mazal — Growing into a Security Career

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • security book.jpg

    Security Investigations: A Professional’s Guide

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing