Introduction
Think about all the technological advances over the last 20 years. What was leading edge and cool then, is now antiquated and something you might see on the shelves at your local Goodwill®. The same holds true with some access control technologies. Decades ago, when they first came out RFID technology Prox cards or credentials were pretty cool. Some were blue, others green, and over three times as thick as a credit card. But when presented to the reader the door unlocked. This allowed access based on the assigned access schedule and doors. Again, cool at the time.
With the widespread adoption of the internet came the large-scale computer and electronic hacking of just about anything, including 125 kHz Prox technology. The 125 kHz Prox credential can literally be hacked in less than 5 seconds with a device you can purchase online for about $15.00. The other issue with this simple Prox technology is the limited scope of functionality. All you can do is present your credential to the reader and unlock the door. The Prox read-only technology does not allow vending or debiting apps to be downloaded to its internal chipset preventing greater versatility and across-the-board adoption.
Moving forward
Today, security has to be forefront of any modern-day electronic platform, especially so with technologies designed to protect persons, places, and information. Those who threaten the status quo, and current technology standards do not sit idle. They are always looking to hack the next technology and are constantly evolving.
Technology manufacturers have to respond to these evolving threats and have taken steps to fight back with cryptographically secure chipsets. That’s great, but what happens when that chipset is hacked, a firmware update or an updated chipset has to be released. The true answer is a cryptographic software shell around the chipset also known as the Secure Identity Object or SIO®. This is utilized with the 13.56 MHz technology which separates the previous Prox credentials with the new and updated HID iCLASS SE® and Seos® credentials. Now the industry can utilize a technology that can evolve and respond to future security attacks. This technology has been available for years but over half the industries using access control are still using the older, antiquated unsafe Prox technology leaving their employees, place of work, and intellectual property vulnerable to attacks. It is time to upgrade your credential technology!
User Convenience
Technology upgrades are not all about the scary boogie man in the black hoodie hiding out in the basement looking for their next victim. Like with many new and updated technologies these improvements can lead to increased convenience for the user. One of these conveniences is using a credential downloaded to your smartphone, this is known as a mobile credential. This allows a user to unlock the door by presenting their phone to the reader. This can be done at regular distances or by taking advantage of Bluetooth technology greater distances of around 12 feet or so. This is convenient for exterior doors. After exiting the vehicle and walking towards to the employee entrance the user can take their phone and present it to the reader from a greater distance allowing the door to be unlocked by the time, they enter the facility. This can be convenient in inclement weather as well as potentially unsafe areas. Other conveniences include utilizing smartwatches, both devices reduce the amount of physical contact between users and stationary public devices.
Flexibility
The transition from the older unsafe technology to the latest secure technology had a difficult hurdle to get over. The older readers do not support the new Seos credential technology. Users had to switch out both their credentials and readers at the same time. Which may not be too much of an issue for smaller organizations. Mid to large-size organizations with multiple campuses and buildings encounter difficulties with personnel and schedules to make across-the-board switchover on the same day. This leads to one technology working in one building but not another.
Now with the latest generations of readers, they can read both the older credential technology as well as the latest. Install the new readers first, allowing both sets of credentials to work. Then as it is convenient for the organization, one building at a time, or location at a time can be switched over from the old to the new credential technology. Once all of the readers and credentials have been switched over to the new updated technology. The ability of the reader to read the older technology can be switched off. All together preventing the older technology from working with the new readers. This process eliminates the previously encountered pain points from a technology upgrade.
In Conclusion
Security threats are going to continue to happen and evolve over time. You need a technology that is safe now, safe in the future, and can continue to adapt to ever-evolving threats. Just like that old speaker docking station you used to use for your smartphone, it is time to update your credentials to the latest secure and convenient technology. Use the convenience of your smartphone as your primary or secondary credential. Download vending and debit app to the new updated credential technology. Use your new credential for logical access to your PC, applications, and network file stores. Secure your copier and printers with access secured and controlled by a modern up-to-date credential.
Please contact us at sales@bankoe.com or 952-888-6688 to find out how to keep your persons, property, and information safe now, and safe in the future.
Commenti