Page 22 - Security Today, May/June 2020
P. 22

Government Security
By David Helbock
Finding Flexible Systems In The Age of Converged Security
CWonsiderations for selecting government-grade security solutions
hile access control is an essential consideration for any business, nowhere is it more necessary to main- tain real-time oversight of who is on-premise than in a governmental facility — whether at the federal,
state or local level. Leveraging the proper technology to achieve this goal helps create a space that is safe and secure, but also accessible to authorized individuals. In areas with highly sensitive information, having security measures in place that are cutting-edge, impenetra- ble, and trusted are of the utmost importance.
Considering that government facilities range from basic office space, often in shared buildings, to law enforcement, intelligence, diplomatic, military, judicial, correctional, and research facilities, physical access control and identity management systems must be flexible, reliable, connected, and secure at all times. In particular, there are a few key requirements to keep in mind when selecting a government-grade access control solution.
Federal Identity, Credential,
and Access Management (FICAM)
Since its creation in the fall of 2008, the Identity, Credential, and Ac- cess Management (ICAM) program has focused on addressing chal- lenges, pressing issues, and design requirements for digital identity, credential, and access management.
It also focuses on defining and promoting consistency across ap- proaches for implementing ICAM programs as reflected in the FI- CAM Roadmap & Implementation Guidance (FICAM Roadmap). The FICAM Roadmap was developed to outline a common frame- work for ICAM within the federal government and to provide sup- porting implementation guidance for federal agencies as they plan and execute a segment architecture for ICAM management programs. FICAM compliance is mandatory in all government buildings, so it is crucial to choose a solution that abides by these protocols.
Advanced FICAM solutions will address the typical pain points as- sociated with FICAM compliance through ease-of-use and by planning for future upgrades to PIV reader capabilities as standards evolve. End- users should choose a technology partner that is established and has a portfolio of products dedicated to FICAM compliance; however, they should also select a provider that is well-positioned to develop new so- lutions as the threat landscape continues to evolve.
Trustworthy technology partners will be able to provide a convenient and compliant performance solution that is capable of leveraging existing systems while also being future-proof as new security recommendations are made down the road. Of all the considerations to take into account, FICAM compliance is the most necessary, as it is a federal requirement.
Scalability Potential
One of the most significant needs for flexibility is a result of the ongoing growth and changes an organization experiences. For example, if an end- user reaches out and wants to add a new building with 38 doors that need to be secured to the system, or if they decide to renovate a wing of an existing facility with drastically increased access protocols, they will want the ability to seamlessly add these functions on to their current platform.
Choosing an access control provider that has a mix of on-prem- ises and cloud-based solutions ensures users have the scalability they need. In addition to the flexibility in the previous example, users can also save money on hardware by virtualizing environments.
For example, if a government agency has 60 systems all running on their own network, users can opt to centrally manage all of these locations. This approach allows users to leverage existing systems while simultaneously eliminating the need for 60 different systems, which is costly to maintain. From licensing to administrative costs, partnering with a provider that has the capability to converge the management of multiple solutions into one is necessary when planning for the future.
Cloud-based access control is one way to accomplish this by
GS4
GOVERNMENT SECURITY MAY/JUNE 2020
BestForBest/Shutterstock.com


































































































   20   21   22   23   24