The past year has certainly been an interesting one with regards to technology innovations on the access control front – from an American-based company offering RFID implants to its employees for both physical and logical access to Apple making the long-anticipated announcement that it would finally open its NFC chip for third-party developers beginning with the iPhone 7 and iPhone 7 Plus. However, unlike other product segments in the industry where early adopters are willing to serve as beta test sites for bleeding-edge products in exchange for the ancillary benefits they may provide, access control remains the security backbone for most organizations and as such, end-users are much more hesitant to deploy what they see as unproven technologies.
It is clear though that many businesses are ready and willing to migrate from legacy systems to newer, more proven solutions, such as hosted and managed access control offerings, which have garnered increasing interest across the industry in recent years. So, what technologies and trends stand to gain the most traction in 2018 and beyond? SecurityInfoWatch.com (SIW) recently convened a panel of industry experts to get their thoughts on the current state of access control and where the market is headed moving forward.
Brandon Arcement, Director of Product Marketing, HID Global
Peter Boriskin, VP of Commercial Product Management, ASSA ABLOY
Robert Gaulden, Director of Aftermarket and Electronic Sales, Allegion
Mitchell Kane, President, Vanderbilt
Robert Laughlin, President, Galaxy Control Systems
What trend do you expect will influence the access control market the most in 2018?
Kane: 2018 will see a shift in access control management from a siloed system within a security department to the inclusion of technologically advanced teams in charge of network security. Trained IT specialists and CIOs offer valuable input when it comes to security decisions. A strong relationship between access control and network security professionals is invaluable as interconnectivity between devices continues to progress and cybersecurity threats grow in severity and complexity.
Boriskin: It has grown slowly over the last few years, but the use of mobile as a security credential will receive a lot of attention in 2018. From the integrator’s perspective, they look at mobile and see the opportunity in that expensive piece of hardware already in their possession. In this case, the question becomes why not use this as a tool to configure, update, monitor and deploy devices? It becomes a powerful tool that they can only benefit from by leveraging it.
From a technology perspective, we can look to the residential market as an example. This is where we now see technologies that allow a homeowner to control lighting, heating, cooling, and more from a mobile device. The question we start to ask is if we can do this in our homes, why can’t we do it in our office where we spend eight or more hours a day?>
Source : http://www.securityinfowatch.com/article/12389628/access-control-evolution-spotlights-high-tech-and-cybersecurity-advancement-in-2018