Page 18 - Campus Security & Life Safety, May/June 2023
P. 18
Access Control
"Hybrid cloud architecture helps you optimize your physical security system by leveraging both on-premises solutions and the cloud."
systems unlock the potential for intelligent solutions that can streamline operations, improve employee and customer satisfaction, and increase efficiency. For example, you can turn on lights for certain floors when a specific person badges in or automatically adjust access control permissions when an employee changes roles.
In hybrid systems, sometimes the cloud portion of the solution is used mainly for data aggregation. The cloud system communicates over the internet to the on-premises solution but isn’t part of the hardwired, closed network. Intrusion management, for example, can be an on-premises system that communicates via the cloud to an access control solution that is either on-premises, hybrid, or cloud- based.
Enhanced Cybersecurity through the Cloud
Cybersecurity fears still hold some organizations back from embracing cloud technologies. Although there are more points of connection to the internet in a cloud-based or hybrid deployment, a modern system can be configured to be resilient to cyber threats.
In an on-prem system, the responsibility is entirely on the person or team managing the system to ensure cybersecurity. Updating and patching software, changing passwords, and other cybersecurity chores are time-consuming. They are easy to put off or forget when you’ve got so many other important things to do.
A cloud software provider can take care of many of these tasks more efficiently and effectively. They have the resources to assign dedicated staff to monitor and respond to cyber threats and can push updates to connected devices automatically.
In the event of a breach, response time is much faster with a cloud system. When a security risk is flagged, cloud software providers are
Ad Index
contractually obliged to dedicate resources to deal with the concern immediately. They are also motivated to ensure they have dedicated staff with the right skills to move swiftly to fix any issues.
The leaner your IT team is, the more helpful it is to outsource some of the responsibilities for enhanced cybersecurity. Even if you have in-house expertise, it is good to rely on trusted vendors to offer support and collaboration.
Tips for Successful Implementation
of a Hybrid Access Control System
Hybrid cloud architecture helps you optimize your physical security system by leveraging both on-premises solutions and the cloud. A hybrid security system won’t look the same for every business. That’s because you have the freedom to optimize your physical security installation in ways that best fit your organization.
If you’re considering implementing a hybrid access control system, begin by realistically assessing your goals, resources, and constraints. Do you have the resources to host, maintain, and secure your servers and hardware? What are you trying to connect? Are those systems cloud-ready? How many of your systems can you bring to the cloud?
The strength and resilience of your network is also a big factor to consider. Cloud-based systems require internet access to operate. If the internet in your area isn’t reliable, you may want to maintain critical systems on-prem to ensure continuity of operations.
Hybrid-cloud solutions give you an opportunity to be more strategic in your physical security deployments. You can choose which installations would benefit from on-prem solutions versus those for which a cloud option would be a better fit. Overall, a hybrid system can reduce the strain on your budget and your team’s time while providing a cybersecure, scalable solution.
Kris Houle joined Genetec in 2021 as a Product Line Manager for Access Control. As the global commercial lead, he is responsible for roadmap development and commercialization of Genetec’s access control offering. Houle also provides support for the APAC and Latin America regions, including Mexico and Brazil.
18
campuslifesecurity.com | MAY/JUNE 2023
Advertiser..........................................................Page...................URL
Aiphone Corporation.................................................. 23.............................www.aiphone.com
Allied Universal ............................................................ 3 ...............................www.aus.com
CEIA USA .................................................................... 11.............................www.ceia-usa.com
Delta Scientific ............................................................ 9 ...............................www.deltascientific.com
Gallagher North America, Inc................................... 7 ...............................https://security.gallagher.com/en/Industries/Education i-PRO Americas Inc. .................................................. 2 ...............................www.i-pro.com
IP Video Corporation.................................................. 13.............................www.ipvideocorp.com Mission 500.................................................................. 17.............................www.mission500.org NAPCO Security Technologies, Inc. ...................... 24.............................www.savischool.com Paxton Access, Inc. .................................................... 5 ...............................www.paxton.info/5412 Traka............................................................................... 15.............................www.traka.com
Viking Electronics........................................................ 19.............................www.vikingelectronics.com