Page 127 - Security Today, March 2020
P. 127

Open is the Only Choice
Security systems are not always kept up-to- date like technologies in other areas of our lives. Can you imagine not updating your phone or laptop with the latest software ver- sions? Updates automatically occur and we don’t know about it until it’s done. Why aren’t access control or video systems updat- ed as often? Why do organizations choose not to invest in the latest solutions and oper- ate the most recent versions?
With DIY security solutions becoming more affordable and millennials maturing into leadership roles, the security industry is going to see an uptick in organizations upgrading their security solutions, particu- larly their access control systems. End users are going to need to run the most updated software versions to keep their systems oper- ating at peak performance.
As campuses review their technologies, identify operational gaps and understand
they need to upgrade, they will need to install open solutions that will grow with them. When they select their solution pro- vider, they need to ensure they offer open solutions. Open solutions providers are will- ing to share their Application Programming Interface (API) with manufacturers to devel- op integrated solutions.
For example, if a hospital uses access con- trol and video management in its parking structure, but needs to upgrade and install a license plate recognition (LPR) system, they will want to install a LPR system that can integrate with the access control and video system. The result is the security team will be able to view the LPR video via the access control system, eliminating the need to open a second program. This streamlines the pro- cess in the Security Operations Center creat- ing a more efficient security program.
When a company invests in an open sys- tem, they are future proofing their system. Open systems are nimble. They can expand easily, integrate with new technologies and provide the opportunity for an end user to expand when they are ready. There are virtu- ally no limits.
Proprietary systems have limited integra- tions with third party technologies and upgrades or expansions that are expensive. If the proprietary system reaches end of life, the customer will need to perform a com- plete rip-and-replace which is expensive and time consuming. Often companies that offer proprietary systems sell direct to the end user, which means the company is stuck. Open systems are offered by integrators of all sizes, boutique integrators or national inte- grators who can provide alternative solutions and expertise.
Identity Management Integration Helps
Campuses are overloaded with data and inef- ficient processes that impact business opera- tions and continuity. They need better sys-
tems and solutions in place to mitigate risk, meet compliance and save money.
When processes get overcomplicated, or there is pressure to meet rigorous compli- ance requirements, the tendency is to hire more people to resolve these challenges. Implementing an identity management sys- tem can help streamline processes to help mitigate risk and meet compliance, which saves money. An identity management sys- tem can help with these six challenges on any campus:
1. On-boarding. Easily on-board new employees by automating identity and access rights. Assign the correct access levels every time based on employee type.
2. Change requests. Automate access changes for employees, visitor or vendors.
3. Off-boarding. Automatically remove access when no longer needed.
4. Recertification. In environments when employees need to maintain certification, an identity management system can help prove and enforce compliance.
5. Audit. Reduce manual errors, confusion and delay when you implement a standard, automated audit process.
6. Compliance reporting. Ensure compli- ance for HIPAA, SOX, NERC/CIP, etc. and save money.
Your Biggest Threat
Visitors pose the biggest threat to campus environments. Not only do we know nothing about them, but navigating the challenge of maintaining an open and welcoming, yet secure environment is challenging. In a cam- pus environment, where there are many points of entry, you need to determine what risks a visitor brings versus the cost of a visi- tor management system. At how many loca- tions do you need to manage visitors? Rather than hire more people, use technology to automate the visitor process.
First, determine the risk by measuring what
By Kim Rahfaldt
How Integrated Systems
Benefit Campuses
Solution providers need to use a consultative approach
MARCH/APRIL 2020 campuslifesecurity.com 41
alphaspirit/Shutterstock.com


































































































   125   126   127   128   129