The 2021 State of Physical Access Control Report - HID Global
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
The 2021 State of Physical Access Control Report KEY FINDINGS • Industry Responds to the New Normal: Security professionals report overall pandemic response, including touchless solutions, as the key driver to upgrading physical access systems. • Investing in Mobile: Over half of the companies surveyed are in the process of upgrading to mobile access or have plans to deploy mobile access in the near future. This follows last year’s trend predicting mobile as the single most impactful technology-shaping access control. • Relying on Aging Technology in the Short-Term: While companies are marching toward mobile, they are relying on aged access control infrastructure along the way. Most companies still leverage solutions that have vulnerabilities, are inefficient to manage, or don’t integrate with other technology. • Recognizing Opportunities: Security professionals have new opportunities to demonstrate how upgrading access control infrastructure to respond to threats nets positive ROI while improving security, user convenience, and organizational efficiency.
REPORT OVERVIEW “Companies can’t The fundamental responsibilities for organizational security departments were disrupted by make the switch moves to remote working and new regulations for managing access to physical spaces. A recent to new security study finds that access control is shifting to mobile and cloud-based solutions, but the merging of technologies physical and logical access control systems still faces many challenges that impede the journey overnight, but to a truly digital infrastructure experience. neither can they afford to rely for too long on These findings come from a yearly survey of Security and IT professionals on the state of access aging, vulnerable control technology — its use at their organizations, important trends, and future plans. This technology survey, conducted in 2020, compares the results of surveys completed in prior years* to reveal while planning a trends, challenges, and successes over time. transition.” This year’s survey highlights the tension between planning and investing in physical security to -Luc Merredew combat the evolution of known threats in the face of an unprecedented global pandemic that HID Global Regional Marketing Director changed the nature of work. Comparing data between 2020 and prior years, the data indicates that companies are increasingly selecting mobile access as their preferred credential technology, though often in parallel with state-of-the-art smart cards, but still rely on aging legacy and less secure technologies while making the transition. In addition to the current access control system improvements that mobile brings, the top driver to upgrade physical access control was pandemic response.
Industry Trends in 2021 “Many of these older technologies — like 125 kHz and magnetic stripe Access control systems impact everyone in an organization: security professionals, employees, — can be cloned contractors, and visitors. These large systems tend to be static year over year, with changes quickly and with weighed against business needs and risk profiles. This year saw organizations employing new minimal technical technology to make physical access administration easier with digital processes, take advantage knowledge.” of features made possible by new technologies, and deploy touchless solutions in response to the pandemic. -Luc Merredew HID Global Regional Marketing Director M O V I N G T O M O B I L E , B U T S T I L L R E LY I N G O N A G I N G S Y S T E M S Survey results show that over 50 percent of respondents’ companies have already upgraded to mobile, are in the process of upgrading to mobile, or have plans to deploy mobile access in the near future. In 2019, only 31 percent of companies were at the same stages of deploying mobile solutions. The industry continues its move toward adopting mobile IDs as secure, convenient credentialing tools. However, as companies make the transition to mobile, they are still relying on legacy and aging access control technology, such as MIFARE Classic. Just over half of the respondents (52 percent) are using reader technology that is not equipped for today’s threats or the growing interest in creating more intelligent environments that optimize the workplace and deliver a better user experience. Forty-five percent of companies also reported their credentials are three or more years old, and 50 percent stated their controllers are of similar age. Companies are upgrading to newer software to support their systems, with 39 percent of companies now having software that has been in use for three or more years compared to 48 percent in 2019. “Security professionals have recognized the value of mobile security solutions and see how it will shape the future of access control,” says Henrik Hjelte, HID Mobile Access product marketing manager. “Now, with heightened awareness around the health and security benefits of touchless technologies, companies are starting to replace out-of-date infrastructure with Q7 mobile-ready solutions.” Current Age of Physical Access Control Components 52.0% 49.6% 44.9% 39.2% 28.3% 26.4% 23.4% 24.2% 17.9% 17.2% 17.4% 15.8% 15.3% 11.2% 8.7% 8.3% LESS THAN 1 TO 2 YEARS 3 TO 6 YEARS UNSURE/NOT 1 YEAR APPLICABLE Readers Credentials Controllers Software Q6 Efficiency With Which Current Access Control Meets Needs
Despite the march toward mobile access, survey respondents indicated that less secure credential technologies are still prevalent in the industry. Thirty-six percent of respondents reported using 125-kHz low-frequency proximity cards, legacy products that offer convenience and reliability but extremely limited security and privacy. Some companies still rely on even older and less secure technology. Twenty-three percent reported using magnetic stripe cards and 17 percent reported using barcode technology. Their continued use exposes organizations to the risk of credential spoofing and cloning, which has been demonstrated widely, and is simple for even the least sophisticated of bad actors. Q4 Less Secure Credential Technolgy Currently in Use Q5 Access Control System Features Currently in Closed loop payment (vending, cafeteria, other payments, public transportation) 36.3% License plate registration Secure Print/Follow-Me Printing Biometrics (fingerprint, facial recognition, other) Security guard tour applications 22.9% Time & Attendance Parking/Gate control 17.3% Visitor Management Logical Access (secure computer/network login, access to cloud and web resource) Identification (photo ID badge) Controllers and readers 0 100 200 300 400 500 600 700 INCLUDED BUT UNUSED ACTIVELY USED PLANNED UPGRADE UPGRADE IN PROGRESS UNSURE DO NOT H 125 kHz Low Frequency Prox Magnetic Stripe Bar Code Most Impactful Threat Relating to Access Control Systems Obstacles to Upgrading Physical Access Control 24.2% Overall, the industry has seen only incremental improvement with the adoption of more secure Q19 40.9% Q22 technologies. In 2020, 58 percent of reported credentials in use comprise an assortment of encrypted, more secure credential technology such as mobile IDs, Seos®, MIFARE DESFire, 19.4% 19.2% 17.6% iCLASS SE®, biometrics, and other solutions. This is a three percent increase from 2019 and a 12 percent increase from 2017. Most security departments continue to have several access control19.7 technologies % in use at any given time. With anticipated budget constraints in 2021 and operational challenges from the pandemic, security professionals will be pressed to justify the 9.1% 11.4% to more secure solutions. benefits of upgrading 9.3% 8.9% 6.2% Q4 Variant 6.1% 4 3.7% More Secure Credential Technolgy Currently in Use st s em ss ) ts y ify rit em en Co ne ec st io st m si sy pr sp sy re bu es r t es ) y w ss d ea te lic ui e cy re ne ch ch ily as ne as q hr po 24.8% ga % no re da le ea a is a rt si re le Sp of (p ig D ts bu g br de 23.9% to yb in e/ ith ee l ck er ra I/ si ity n rn m rit th m RO w La io u In a ur o at cu O pt Le n n rs ec N tio ng io ru e be t/ y/ ut ls rs ra is lli en um nc ol be D pe ca g eet em te s ge Cy i m (c ys nt In ts ag er co s Ph rre ie m an of ic cu /E m ol ck ic o yp ge La N m an an de Ch m n Pa o To Q16 Challenges Security Faces Working With IT Q6 12.4% 11.8% 37.0% 11.0% 10.9% 43.9% 7.8% 36.3% 1.5% SS s os c c a V2 ) ID IC iC si ri Se et LA as /E 17.0% l TW Fe ile om Cl 1 iC 15.7% ob EV ny C, Bi E 14.4% M AR So CA re g in Fi IF V, ud ES M PI l D nc l( tia E ri AR 7.9% en 7.6% e 7.1% 6.4% 6.1 th IF ed % O M Cr rd da an specify) Satisfies essential Meets all current Meets or exceeds Exceeds current Does no St Project prioritization Technical acumen Project Conflicting objectives Conflicting budgets Other (please specify) requirements requirements current and planned requirements requirem 01 and alignment ownership/division of requirements -2 PS labor FI “Companies can’t make the switch to new security technologies overnight, but they neither can they can they afford to rely for too long on aging, vulnerable technology while planning a transition” said Luc Merredew, HID Global regional marketing director. “Many of these older technologies — like 125 kHz and magnetic stripe — can be cloned quickly and with minimal technical knowledge. When companies consider upgrading physical security platforms, they should look to interoperable, future-ready solutions that accommodate any legacy technologies that must be supported during an upgrade. Many companies investing in mobile share this mindset.”
H E A LT H A N D S A F E T Y R A I S E N E W I N D U S T R Y C O N C E R N S The most common use cases for access control applications shifted slightly in 2020, with respondents citing identification, including photo badges (74 percent in 2020, 80 percent in both 2019 and 2017), logical access to IT resources (70 percent in 2020, 68 percent in 2019, 71 percent in 2017) and visitor management (60 percent in 2020, unmeasured in previous years), which replaces parking and gate control as a top three use case this year. Less frequently used applications, such as closed loop payment (28 percent in 2020, 27 percent in 2019, 24 percent in 2017) and license plate registration (28 percent in 2020, 27 percent in 2019, 25 percent in 2017), remained consistent. When asked about the top drivers to upgrade physical access control, survey respondents highlighted pandemic response and touchless solutions. Also expressed is a desire to take advantage of applications available in new technologies and make physical access administration easier with digital processes. These drivers converge at mobile technology in access control systems. Mobile access promises convenience, advanced security, and flexibility with the added benefits of enhanced touchless experiences and broader read ranges. Staff, contractors, and visitors are likely to have a personal smart device that is compatible with mobile-based access control technology. Security professionals can provision and revoke credentials over the air, limiting physical contact and improving access control administration with a digital, cloud-based platform. e Q5 Access Control System Features Currently in Use Q20 Closed loop payment (vending, cafeteria, other payments, public transportation) License plate registration Secure Print/Follow-Me Printing Biometrics (fingerprint, facial recognition, other) Security guard tour applications Time & Attendance Parking/Gate control Visitor Management Logical Access (secure computer/network login, access to cloud and web resource) Identification (photo ID badge) Controllers and readers 0 100 200 300 400 500 600 700 800 900 INCLUDED BUT UNUSED ACTIVELY USED PLANNED UPGRADE UPGRADE IN PROGRESS UNSURE DO NOT HAVE THE FEATURE Most Impactful Threat Relating to Access Control Systems Changes to work and physical spaces introduced new challenges for security professionals. 24.2% Mobile infrastructure allowed companies that already had deployed the technology to quickly Access Control Q22 change their security workflows and further encouraged other companies to adopt Q25 mobile solutions. 19.4% 19.2% 17.6% 9.1% 6.2% 4.3% % 10.3% es r at es ) g y d te lic fin re re ch ch as po oo th no a a is re re Sp er of ig D yb yb e/ id al ck s ur m it rit La In ur o at cu rs ec /N e be ls rs cy um be ca n Innovator – risk taker, ge Cy i (c ys er has the resources and s s Ph ie Em ic desire to try new n ol c/
“When companies consider upgrading physical security Industry Challenges platforms, they should look to interoperable, The industry trends observed in this year’s Physical Access Control survey have their roots in future-ready the challenges facing the industry. Emerging threats, vulnerabilities, infrastructure demands of solutions that aging technologies, and changes to physical spaces to comply with physically distanced work are accommodate pushing organizations to find relevant solutions while overcoming hurdles associated with cost. any legacy technologies FROM AGING SYSTEMS TO MEETING CURRENT NEEDS that must be supported during This year’s survey asked security directors to choose their top three motivators for upgrading an upgrade. physical access control solutions. The need for touchless solutions topped the list with 41 Many companies percent of security directors citing it as a motivator. Few companies were fully prepared for the investing in mobile sudden demand for touchless solutions. Remote credential issuance and a move away from share this mindset.” in-person provisioning have encouraged the adoption of cloud-based credential management solutions. And organizations are doubling down on mobile access solutions since the technology -Luc Merredew leverages an individual’s own devices, rather than just a physical badge option or card that must HID Global Regional Marketing Director be purchased, distributed, collected, and sanitized. While pandemic response has risen to be the chief access control challenge for security directors, taking advantage of features in new technologies remains a top three challenge from last year to this year. Thirty-eight percent of survey respondents indicated the features and applications available in new technologies as a top driver to upgrade their access control solutions. Building off the advantages of mobile and other touchless solutions in response to health and safety concerns, security directors also seek the advanced security of modern credential and reader systems. Enhanced encryption and biometric solutions are harder to clone or fake. Older systems do not allow for new standards such as Open Supervised Device Protocol or remote credential management. Q20 Top 3 Drivers to Upgrade Physical Access Control Pandemic response/touchless solutions 40.9% Take advantage of features/applications available in new technologies and products 38.0% Make physical access administration easier 31.7% with digital processes Improve user convenience and throughput at access control entries 31.3% Existing system near end of useful life 30.2% Better integration with other enterprise systems 27.5% Need to comply with new regulations or policies 25.4% Response to facility breach or failed security audit 19.7% Higher level of customer service 12.5% Company undergoes merger/acquisition; relocates or consolidates facilities 11.1% More sophisticated/modern brand image 7.5% Media/External coverage of recent security vulnerabilities 5.3% Other 36 4.9%
As the means and motivations of criminals and bad actors continue to advance, security directors are seeking to keep pace. The third most frequently selected motivation for upgrading access infrastructure was the need to make physical access administration easier with digital processes (32 percent). Beyond the advantages of remote credentialing, security directors seek to converge physical access control systems (PACS) and logical access control systems (LACS). Integrating digital processes can lead to more efficient systems, but aging technology can be challenging to merge. The top three concerns with converging PACS and LACS — difficulty with implementation (46 percent), managing multiple credentials in multiple systems (45 percent), and increased technological complexity (43 percent) — must be planned for before an organization retools its secure access infrastructure. Q17 Concerns Surrounding Converged Physical and Logical Access Control 45.8% 44.7% 42.7% Q7 Q4 Less Secur 27.5% 36.3% Current Age of Physical Access Control Components 7.3% 52.0% 49.6% Difficulty with Managing multiple 44.9 Increased % Managing multiple Other implementation and credentials in multiple technological 39.2% credentials prioritization of new systems complexity technologies 28.3% 26.4% 23.4% 24.2% Q10 Aging security Real-Time 17.2 infrastructure % Employee is a consistent & Visitor challenge that, 15.8 Location as 17.4 threats evolve, continues to erode 17.9 15.3 % % % % 8.7 confidence % 11.2 % in security. In 2017, 73 percent of survey respondents reported that their current 8.3 % physical access control solution met or exceeded all current requirements. In 2019, that number 50 percent.No Yes, I know both the fell LESSto THAN This 1 TOyear, it remained3 at 2 YEARS TO50 percent. Despite 6 YEARS the advancements UNSURE/NOT number and real-timein secure location of employees 125 kHz Low Frequenc 1 YEAR access technology, many companies still must make do with APPLICABLE aging infrastructure. and visitors The severity and profile of threats is Readers increasing, Credentials while confidence Controllers Software in security is not. Obstacles to Upgr Q6 24.8%Meets Needs Efficiency With Which Current Access Control Q19 40.9% 32.4% 44.0% 36.4% 5.6% 36.9% 19.7% I only know the I only know the location of employees number of employees and visitors, but not and visitors, but not the number real-time location st y rit Co io pr 7.1% Access Control Most Impactful Technology to Improve 6.4% s 6.1% es s in bu I/ RO ess/contactless solutions 23.3% tio ng ra lli pe g Satisfies essential Meets all current Meets or exceeds Exceeds current Does not meet te m In requirements requirements current and planned requirements requirements 18.5% co and logical access control of requirements ck La Biometrics 11.4% g. OSDP and interoperable How Security and IT Collaborate 11.0% Q14 based on open standards Q16 Challenges Secu
Secure Print/Follow-Me Printing Biometrics (fingerprint, facial recognition, other) Security guard tour applications 22.9% Time & Attendance Parking/Gate control C O M M U N I C A T I N G T H E V A L U E O F S E C U R17.3 ITY% Visitor Management Logical Access (secure computer/network login, Forty-one percent of survey respondents cite cost as the biggest obstacle to upgrading physical access to cloud and web resource) Identification (photo ID badge) access control solutions, yet the damage caused by a security breach often has a far greater cost, Controllers and readers measured in dollars, loss of brand reputation, or life. Twenty percent of survey respondents said 0 100 200 300 400 500 lack of compelling ROI was their main obstacle to upgrading their infrastructure. INCLUDED BUT UNUSED ACTIVELY USED PLANNED UPGRADE UPGRADE IN PROGRESS 125 kHz Low Frequency Prox Magnetic Stripe Bar Code Most Impactful Threat Relating to Access Control Syst Obstacles to Upgrading Physical Access Control 24.2% Q19 40.9% Q22 19.4% 19.2% 17.6% 19.7% 9.1% 11.4% 9.3% 8.9% 6.1% 3.7% st s em ss ) ts y ify rit em en Co ne ec st io st m si sy pr sp sy re bu s r t s y w ss .1% ea te lic ui e he e cy ne ch ily as ne as q hr po ac ga re da le ea is a rt si re le of (p D ts bu g br de to yb in ith ee l ck er ra I/ si ity n rn m rit th m RO w La io u In a ur o at cu O pt Le n n rs ec N tio ng io ru e be t/ y/ ut ls rs ra is lli en um nc ol be D pe ca g s not meet em te s ge Cy i m (c ys nt In uirements ag er co s Ph rre ie m an of ic cu /E m ol ck ic o yp ge La N m an an de Ch m n Pa o To Q16 Challenges Q6 These figuresSecurity Faces tell us that Working With executive IT leadership in some companies continue their struggle to see the value of upgrading their physical access control systems. The industry needs to communicate 37.0% 43.9% the value of security without suffering catastrophic attacks. Survey respondents identified the most impactful threats to their organizations as physical security breaches (24 percent), pandemic and natural disasters (19 percent), and insider threats (19 percent). These risks suggest there 36.3% n Use Q5 is opportunity for security professionals Access to highlight Control System Featuresthe importance Currently of PACS in Use Q20investments in protecting employees and visitors. Closed loop payment (vending, cafeteria, other payments, public transportation) 17.0 % License plate registration 15.7% 14.4%how and when to safely return to the workplace, As organizations around the world decide Secure Print/Follow-Me Printing security professionals Biometrics (fingerprint, facial recognition, other) have the opportunity to champion the benefits of more secure, touchless guard tour applicationstouchpoints between people7.9 7.6 2.5% solutions. SecurityReducing and % objects is%key to protecting employees’ 7.1% 6.4% please specify) health, but the benefits do not end there. Security professionals should communicate the value of Time & Attendance solutions that Technical reduce acumen person-to-person contact via over-the-air Other (pleasecredentialing and provide real- Parking/Gate control Satisfies essential Meets all current Meets or exceeds Exceeds curren Project prioritization Project Conflicting objectives Conflicting budgets specify) requirements requirements current and planned requirements 3% time and alignment Visitor Management ownership/division of building occupancy data to help with social distancing and contact tracing in the event of an Logical Access (secure computer/network login, labor requirements access to cloud and web resource) infection. Each of these steps will help return employees safely to their workplaces and provide Identification (photo ID badge) longer termControllers improvements and readers to operational efficiency. While budgets remain constrained, the value of touchless access control 0 100 solutions 200 may be 300 400 a catalyst 500 600 for moving 700 800 to mobile. 900 INCLUDED BUT UNUSED ACTIVELY USED PLANNED UPGRADE UPGRADE IN PROGRESS UNSURE DO NOT HAVE THE FEATURE ode Most Impactful Threat Relating to Access Control Systems 24.2% Access Control Technology Adoption Curve Q22 Q25 19.4% 19.2% 29.0% 17.6% 26.0% 23.1% 9.1% 6.2% 4.3% 3.7% 10.3% ts en m re s r t es d) g y ea te lic i he fin qu re ch as hr po c oo no re ea a is rt re Sp of ig D s br de et yb e/ l ck ra si ity m rit La u In ur o at cu rs ec N e be y/ ls rs m nc be ca Innovator – risk taker, Early adopter – Early majority – take Late majority – most of u ge Cy i (c ys er has the resources and selective about which time before adopting, the uncertainty must s Ph ie m ic /E desire to try new new technologies to willing to embrace with be resolved, willing to ol ic yp things even if they fail invest in, highly the right use case embrace once proven m an de informed m n Pa o To Q6 Q23
n Use Q20 Q17 Concerns Surroun 45.8% 4 Industry Opportunities Q17 Concerns Surrounding Converged Physical and Logical Access Control When asked to evaluate where they consider their % 45.8 organization on a%technology adoption 44.7 curve, most survey respondents see their companies as part of the early majority (29%percent), 42.7 willing to cautiously embrace new technologies for certain use cases, or the late majority (26 percent), willing to embrace new technologies once they are proven and uncertainty is resolved. 800 900 The security directors see the most impactful technology for access control management as AVE THE FEATURE touchless solutions (23 percent), integrated PACS and LACS (19 percent), and biometrics (11 27.5% percent). As these technologies mature to a level that companies are comfortable adopting them, Difficulty with Ma they will unlock significant physical access control opportunities. implementation and prioritization of new crede technologies Access Control Technology Adoption Curve Q25 Q10 R 7.3% 29.0% No Difficulty with implementation and 26.0% Managing multiple credentials in multiple Increased technological Managing multiple credentials Other 23.1% prioritization of new systems complexity technologies tion Curve Q10 Real-Time Employee & Visitor Location 29.0% No Yes, I know both the 26.0% number and real-time location of employees and visitors 4.3% 10.3% 11.6% 24.8% 32.4% g fin oo I only know the 11.6% Innovator – risk taker, Early adopter – Early majority – take Late majority – most of Laggard – prefers location of employees and visitors, but not has the resources and selective about which time before adopting, the uncertainty must traditional approach the number desire to try new things even if they fail new technologies to invest in, highly willing to embrace with the right use case be resolved, willing to 5.6% embrace once proven 36.9% informed Q23 I only know the location of employees I only know the number of employees y majority – take before adopting, Late majority – most of the uncertainty must Laggard – prefers traditional approach and visitors, but not the number Most Impactful Te and visitors, but not real-time location to embrace with be resolved, willing to right use case embrace once proven Touchless/contactless solutions Integrated physical and logical access control Most Impactful Technology to Improve Access ControlBiometrics Touchless/contactless solutions Modern protocols, e.g. OSDP and interoperable 23.3% technologies based on open standards Integrated physical and logical access control 18.5% Mobile access Biometrics 11.4% Adoption of other new credential form factors 6.1% Modern protocols, e.g. OSDP and interoperable technologies based on open standards 11.0% Mobile apps for system management 5.0% Mobile access 10.9% Location services for people 5.0% Adoption of other new credential form factors 6.1% BLE and NFC technology 3.6% 1% Mobile apps for system management 5.0% Other (please specify) 2.6% Location services for people 5.0% meet BLE and NFC technology 3.6% Remote credentialing 2.5% ments Other (please specify) 2.6% Remote credentialing 2.5%
Q17 Concerns Surrounding Converged Physical and Logical Access Control 45.8% 44.7% R E T U R N I N G T O W O R K S A F E LY 42.7% Security and safety look different now. Security professionals are responding to the current health concerns of the pandemic and designing robust systems to withstand future health and environmental crises. 27.5% Survey respondents identify touchless capabilities as the top feature they would require in a new access control system. Touchless solutions are part of creating a convenient, clean access infrastructure, but maintaining new contact tracing and physical distancing requirements necessitates Real-Time Location Services (RTLS). According to the survey, nearly 37 percent of respondents said they knew the number of employees and visitors, but not their location. An additional 32 percent indicated that they did not know the number or real-time 7.3 % location of employees and visitors while on the premises. Twenty-one percent of companies still rely on paper rosterscredentials Difficulty with implementation and for monitoring Managing multiple in multiple visitors, their location,Managing Increased technological and building multiple credentials usage during Other their time as a guest prioritization of newin the building, technologies systems and 16 percent stated complexity having no method at all. Q10 Real-Time Employee & Visitor Location No Yes, I know both the number and real-time location of employees and visitors 24.8% 32.4% 5.6% 36.9% I only know the I only know the location of employees number of employees and visitors, but not and visitors, but not the number real-time location RTLS brings value beyond the near-term return to work. Knowing the number and location of people in a building during an emergency can be invaluable. RTLS systems use RFID, Wi-Fi, or MostBluetooth Impactfulto determine the location of people and items. These systems can work in tandem with Technology to Improve Access Control access control to protect restricted areas, locate people and assets in an emergency, provide tactless solutions wayfaring to visitors over their smart devices, enable social distancing alerts, 23.3% and enhance contact tracing efforts in the event of exposure. cal access control 18.5% Biometrics 11.4% and interoperable n open standards 11.0% Mobile access 10.9% ential form factors 6.1% tem management 5.0% ervices for people 5.0% d NFC technology 3.6% er (please specify) 2.6% mote credentialing 2.5%
44.0% Secure Print/Follow-Me Printing Biometrics (fingerprint, facial recognition, other) 36.4% Security guard tour applications 22.9% 19.7% Time & Attendance B O L S T E R I N G C O L L A B O R AT I O N W I T H I T “Now, with Parking/Gate control Physical security and IT convergence projects are becoming more common, but % there appears to 17.3 heightened awareness Logical Access Visitor Management aroundlogin, (secure computer/network be room for improvement in the collaboration between security and IT at most companies. While access to cloud and web resource) 61 percent of security directors report working with IT to establish security best practices, which the health and Identification (photo ID badge) is consistent from the 2019 survey, 52 percent report looking for new technologies together with security Controllers benefits and readers IT, which is a decrease from 55 percent last year. As physical and logical access technologies of touchless st y rit Co technologies, io pr become more integrated, companies have an opportunity for collaboration between security and 7.1 6.4 s 6.1 es % percent of respondents % % companiesINCLUDED are BUT UNUS n si IT. But organizations have work to do. Thirty-seven with security titles bu ith I/ 125 kHz Low Frequency Prox Magnetic Stripe Bar Code starting to Most Impactful Th replace RO w listed project prioritization and alignment as the top challenge faced when working with their n tio ng out-of-date ra lli pe g Obstacles requirements toIT Satisfies essential organizations’ Upgrading departments. Physical Meets all current Access Meets or exceeds These current numbers Control suggest Exceeds current that exploring ways Does not meet to align security and te m In requirements and planned requirements requirements infrastructure co IT may be an opportunity to improve an organization’s overall security and IT systems. 24.2% of requirements ck with mobile-ready La Q19 40.9% Q22 solutions.” How Security and IT Collaborate Q14 Q16 Challenges -Henrik Hjelte 19.4% Securi HID Global 37.7% Mobile Access Product Marketing Manager 37.0% 32.0% 19.7% 11.4% 9.3% 8.9% 6.1% 3.7% 14.6% 17.0 13.0% st s em ss ) ts y ify rit em en Co ne ec st io st m si sy pr sp sy re bu es r w ss te ui e cy ne ch ily as ne as q ga re da le ea is a si le (p D ts bu g br to in ith ee l er ra I/ ity n rn th m RO w io u a ur at O 2.5% pt Le n n ec N tio ng io ru t/ y/ ut ls ra is lli en nc ol D pe ca g em te s ge i m ys nt In ag er co Ph rre m an of cu Establishing security Looking for new Little to no overlap Sharing a budget Other (please specify) /E m ck ic o best practices for your technologies together ge La N m an Project prioritization Technical ac de facility Ch n and alignment Pa Q16 Challenges Security Faces Working With IT Q6 37.0% 43.9% 3 17.0% 15.7% 14.4% 7.9% 7.6% Satisfies essential M Project prioritization Technical acumen Project Conflicting objectives Conflicting budgets Other (please specify) requirements and alignment ownership/division of labor
Moving Toward Secure, Efficient Solutions The industry is trending toward more secure access control technologies that prioritize user experience and efficient credential management. In 2017, 45 percent of organizations used at least one form of advanced credentialing technologies. In 2019, that number rose to 54 percent. In 2020, 58 percent of organizations had deployed at least one form of more secure credentialing technology. Mobile is the leader in advanced credentialing that puts access control into the hands of employees, contractors and visitors. While a majority of companies have deployed or plan to deploy new secure solutions, the work is not complete. Threats continue to evolve, and unprecedented events in 2020 revealed new vulnerabilities and demands of security systems. Improvements to secure access infrastructure add multi-application capabilities, introduce easier-to-manage credential options, and more user- friendly technology. Access control technology is poised to protect employees and visitors to companies and restore confidence as they navigate the future of work. For more information on Access Control Solutions visit https://www.hidglobal.com/access-control *The 2020 State of Access Control Report. This report was comprised of survey data collected in 2017 and 2019 and reflect statistics from both years on the single report.
METHODOLOGY This report is based on over 1000 responses to the 2020 Access Control Systems Trends Survey conducted by HID Global, ASIS International, and 1105 Media, Inc. in the summer of 2020. A link to the 25-question survey was emailed to Security and IT personnel across a range of titles representing more than a dozen different industries, including Education (11%), Software, Technology & Telecommunications (14%), Government (11%), Manufacturing (12%), Healthcare (8%), and Professional Services (18%). Breakdown of business size is as follows: 31% have fewer than 100 employees, 18% have 101-500 employees, 10% have 501-1,000 employees, 16% have 1,001-5,000 employees, 5% have 5,001-9,999 employees, 8% have 10,000-24,999 employees, and 14% have 25,000 or more employees. ABOUT HID GLOBAL HID Global powers the trusted identities of the world’s people, places and things. We make it possible for people to transact safely, work productively and travel freely. Our trusted identity solutions give people convenient access to physical and digital places and connect things that can be identified, verified and tracked digitally. Millions of people around the world use HID products and services to navigate their everyday lives, and billions of things are connected through HID technology. We work with governments, educational institutions, hospitals, financial institutions, industrial businesses and some of the most innovative companies on the planet. Headquartered in Austin, Texas, HID Global has over 4,000 employees worldwide and operates international offices that support more than 100 countries. HID Global® is part of ASSA ABLOY. North America: +1 512 776 9000 | Toll Free: 1 800 237 7769 Europe, Middle East, Africa: +44 1440 714 850 Asia Pacific: +852 3160 9800 | Latin America: +52 55 9171 1108 hidglobal.com © 2021 HID Global Corporation/ASSA ABLOY AB. All rights reserved. 2021-01-20-pacs-state-of-access-control-2021-wp-en PLT-05702 Part of ASSA ABLOY
You can also read