While designing security systems, we are especially attracted to projects which consist of access control systems (ACS) – because only the discerning customer considers access control as a ‘security requirement’ rather than a ‘time & attendance’ requirement. In many premises, the convenience of recording attendance is given precedence to the necessity of preventing unauthorized entry at all times. This leads to the continued use of obsolete access control technology, making the entire campus vulnerable to intrusion, albeit unknowingly. Due to the lack of clear understanding of and expectation from an ACS, vendors often make the most of the situation, installing systems that have gaping loopholes.
The entry and movement of persons and/ or vehicles in a campus is of the utmost criticality for any security manager and a sound ACS must be the first step towards managing the same. Surveillance cameras may be the most visible element within security systems; however, they are reactive (mostly used after an incident has happened) – whereas an ACS has the ability to prevent that very incident.
Since all security systems are now IP or IP based, ACSs have also gravitated towards Internet Protocol. This is a great news for both the security and network administrators; however, it does open up possible vulnerabilities, especially if there is an intersection of the data and security networks. Security managers have to be tuned into the IT security demands of their organizations and have to ensure that their ACS over IP poses no risks of virtual intrusion.
Esta historia es de la edición November 2019 de Security Link India.
Comience su prueba gratuita de Magzter GOLD de 7 días para acceder a miles de historias premium seleccionadas y a más de 9,000 revistas y periódicos.
Ya eres suscriptor ? Conectar
Esta historia es de la edición November 2019 de Security Link India.
Comience su prueba gratuita de Magzter GOLD de 7 días para acceder a miles de historias premium seleccionadas y a más de 9,000 revistas y periódicos.
Ya eres suscriptor? Conectar
The Frictionless Future Of Face Recognition
The new way for travelers to get from their gate to destination by using their face
Forces Network Helps Military Personnel Transition To A Corporate Career
Forces Network, a professional network of the military veterans incorporate, conducted a full day Military to Corporate (M2C) Transition Workshop at Holiday Inn, Aerocity, New Delhi on 20 October 2019.
Don't Miss Out on the Business Potential of Network Audio
IP network cameras bring many advantages – and while seeing is believing, adding audio to the mix takes security to the next level. Axis’ audio equipment uses an open technology that makes installation easy, helping installers to grow their business.
Chiang Mai City Upgrades Security With Bosch Video Systems
Bringing an ancient city into the 21 st century
Access Control Systems Its Time To Move With The Times!
An access control system (ACS) is an ultra-critical component in the chain of electronic security – however in India, even many large organizations do not give access control the credit that is due. This article enumerates ten must-have features that any modern access control system should possess
2nd leg of Hikvision expo Organized at Hyderabad, Bengaluru, Coimbatore and Kochi
20 Policemen Honoured with Bravery Awards
TB150 Crash Rated Portable Bollard Stops 15,000 Pound (6,804kg) Vehicle Going 50mph (80.4kph)
Provides ASTM M50, P3 Rating
Supporting Expansion Protecting University in Turin with Public Address and Voice Alarm System
With a history dating back to the year 1859, the Polytechnic University of Turin is Italy’s oldest technical university.
Securing ATMs 24/7 with Intelligent Security Technology
ATMs have become a cornerstone for the day-to-day life of millions, but they are vulnerable to attacks.
Conducting the Third Chapter of 4 City CISO Security Symposium
The Delhi chapter of the Enterprise IT World and Infosec Foundation’s Security Symposium and Awards 2019 has been successfully concluded.