Safe and seamless access control with HID

April 15, 2024

FEATURED

access control

Matt Haynes, Channel Director for PACS at HID explores the ways in which cloud-powered access control solutions are evolving beyond security to play a crucial role in enhanced building experiences.

The way we interact with buildings is evolving, and security systems are no exception.

The modern building is a complex ecosystem, with multiple systems and departments working together to ensure smooth operation and occupant safety.

However, disconnection between these systems, particularly between security and building management, can hinder efficiency and create security vulnerabilities. 

Modern access control systems are evolving beyond security to play a crucial role in enhanced building experiences.

Integrated with digital technologies like tenant experience apps, these systems not only provide granular data on who enters, when, and where (including location within the building if the app supports it) but also ensure data privacy as they just focus on usage patterns and trends to optimize building efficiencies such as lighting and temperature.  

And, thanks to the cloud, these access control systems allow security managers to remotely provision and revoke credentials for users, further reducing physical contact and streamlining administrative processes. 

Enhancing security and streamlining operations  

Cloud-based access control platforms offer a centralised hub for integrating disparate systems, fostering collaboration between departments and streamlining overall management.

Not only that, but they also support multiple security protocols and provide higher data and privacy protection. 

With a comprehensive cloud-based platform, it is possible to bring together physical security with a wide range of building applications, services, and IoT use cases, including: 

  1. Enhanced security: The centralising nature of cloud platforms makes it easier to enforce security policies and monitor access activity across all locations. In case of lost or stolen devices, or physical badges, administrators can quickly revoke access and permissions. Moreover, cloud-based systems facilitate the rapid deployment of new features and security updates. 
  1.  Increased efficiency: Instead of managing physical systems, security managers can easily administer access permissions remotely through a user-friendly online interface. All tasks are automated, freeing up valuable time and resources for other critical activities. 
  1. More flexibility: Modern buildings with distributed locations can be difficult to manage. Through the cloud, it is possible to manage access regardless of where managers or users are located. 
  1. Scalability: Cloud-based solutions are inherently scalable, adapting to an organization’s evolving needs.  
  1. Simplified integration: The end-user experience is always top-of-mind, so integration with existing infrastructure (think HR, IT, HVAC, time attendance, lighting, etc.)  is essential to providing the experience and level of security that’s required. Trusted manufacturers offer open APIs and software development kits (SDKs), free of charge, to simplify integration and enable customers to create an ecosystem of solutions to manage their buildings, whilst avoiding vendor lock-in.  
  1. Data-driven insights: With the power of data analytics, features like remote configuration, predictive maintenance and intent detection can be used to personalise experiences and optimise building operations. 

While cloud platforms provide a robust foundation, they are truly the enabling force for multiple innovative access control solutions.

Few manufacturers today are able to empower partners and developers to unlock the potential of cloud-based access control.  

Unlike traditional access control solutions, which often require custom development for each customer or site, a new way of developing personalised access control solutions has emerged—thanks to the cloud.  

A collaborative approach 

By leveraging an app-based development and furnishing a comprehensive toolkit for developers and partners, it is possible to create and deploy access control solutions faster and more efficiently, benefiting both the developer community and end users.

This translates to significant gains in scalability and efficiency, reducing the time and resources needed to implement robust access control across diverse locations. 

This approach allows the unification of access control within the broader smart building ecosystem, allowing businesses to not only enhance security and streamline operations but also create a more seamless and personalised experience for users.

This highlights how cloud platforms are not just the foundation for access control solutions, but a catalyst for innovation and customisation. 

And because this partnership model is vendor-agnostic, it offers numerous benefits to a wide range of business models, catering to diverse financial structures and operational needs. 

The main advantages of this approach include: 

1. Prioritisation of customer needs: Core to this vendor-agnostic approach is the ability to select partners based on their specific expertise, ensuring the customer’s unique requirements are front and center throughout the entire process. 

2. Cost-effectiveness: Utilising the best-suited partners potentially leads to optimized budgeting and resource allocation. 

3. Reduced risk: Combining varied expertise mitigates potential challenges associated with relying on a single vendor. 

4. Amplified innovation: Collaborative efforts lead to the development of more innovative solutions through combined knowledge and resources. 

5. Efficient project management: Joint planning tackles the challenge of managing numerous sites and partners. Diversified procurement channels and streamlined bureaucracy mitigate logistical complexities associated with extensive project scope. 

6. Enhanced client satisfaction: Full collaboration ensures every decision prioritises the customer’s specific requirements. The result is more satisfied customers, even throughout the project lifecycle.  

7. Shared success: The collaborative spirit fosters adaptability and customer focus, ensuring successful outcomes for all stakeholders. 

A Global Success Story 

As a direct result of this collaborative model, HID and QCIC teams successfully deployed and delivered hardware and a mobile access control experience to a global financial client, all within a one year.

The partnership encompassed the delivery of approximately 5,000 door readers in 100 sites and custom software with the ability to manage about 56,000 mobile credentials. 

The objective was to create a unified global credential solution that could be deployed across all sites.

From an access management and credential perspective, and from a global supply chain perspective, no single solution was able to deliver this project whilst addressing all of this and providing a standardised access management experience—whether in Chennai, Milan or New York City. 

Challenge 

The Security market is changing, under pressure from clients who want solutions unique to their needs. 

They are often under financial pressures and time constraints, so they look for a single solution and one point of contact. 

Additionally, a single contractor couldn’t handle the project across 100 different sites.

In the B2B environment, contractors, distributors, and resellers work on a local level with varied quantities and stocked items tailored to specific regions.

To manage 100 sites, the end user would have to request 100 separate purchase orders.

Through continuous collaboration and sharing contacts, the teams diversified procurement and streamlined bureaucracies. 

Solution 

Through HID’s Origo Technology Partner Program—a platform for organisations to design, test, and market mobile technologies, collaboratively—the HID and QCIC developed a custom app that would integrate into the banking ecosystem seamlessly and securely.

The ability to develop and test integrations with each other’s platforms with the goal of increasing both businesses’ market share was crucial. 

Result 

Beyond direct commercial gains, the partnership fostered the expansion of each company’s international network of connections, paving the way for potential future collaborations.

Additionally, the project has enabled both teams to consider and develop further enhancements to current technology that give them commercial benefits going forward.

Driving from slightly different areas of the security industries has enhanced both businesses’ perspectives. 

HID is a global provider of trusted identity solutions and access control. Its HID Origo Technology Partner Program is the company’s first program dedicated to help technology partners meet their customers needs faster and more efficiently. 

QCIC is a global security engineering firm specialising in designing, building and running security systems, and a trusted partner within the Origo platform. 

This article was originally published in the April Edition of Security Journal United Kingdom. To read your FREE digital edition, click here.

Read Next