SlideShare uma empresa Scribd logo
1 de 19
Marcel Dias
History
 Tech developers for electronic security were incorporated into large companies in
the field of electrical and electronic products.
 Pelco (Clovis – California): high quality equipment for closed circuit television
systems > acquired by Schneider Electric in 2007
 General Electric (GE) > acquired Casi-Rusco and Infographics.
 Bosch (2003) > wide range of self-developed products.
 Opening of trade to the Asian market > acceptable quality and reduced cost
 Import > Nationalization > Customization
The first devices
 Intercoms
 Electromechanical lock
 Biometrics
Definition
 Access Control is the part of security that, through the use of policies, procedures, devices,
hardware and software, qualified methods of identification and blocking systems, seeks to control
and manage the transit of people, objects and information, in a given physical or logical space.
 Purpose: provide protection to facilities, areas, equipment, data, information, goods and people,
by preventing unauthorized access to physical or logical environments.
 Control: is a noun used to define the domain or power to supervise and administer a certain
thing; to have control of the situation is to dominate or have power over what is happening.
 Access: refers to the act of entering, transiting, knowing or consulting information, either locally or
remotely, as well as the possibility of using the information assets of a body or entity.
 Access control can be considered any action, mechanism or system used to restrict and manage
access to a certain physical or logical environment.
Main Objective
 Protect physical and logical environments against unauthorized access;
 Detect, intercept and contain unwanted access from: invaders, contraband,
weapons, explosives, drugs, pirated products, viruses, etc.);
 Manage access permissions;
 Control and record entries and exits of people, objects and information;
 Provide complete records of all accesses or attempts to access the organization's
physical and logical environment;
 Allow traceability of consented accesses.
Safety x Security
 Safety (the importance of prevention): always seeking to avoid the accident or
at least minimize the damage and losses caused as much as possible, risks of an
accidental nature are analyzed. Ex1: environmental hazards, environmental
damage, to human health and life. Ex2: in the context of an enterprise, analysis of
the reliability of systems, security equipment, early detection, etc. always.
 Security (the focus on protection): the risks are usually derived from the actions
of an opponent or deliberate attacker, such as sabotage, theft, break-in, vandalism
or other explicit attacks. Threats in this case are deliberate and malicious incidents
generated by people. Ex: surveillance professionals and electronic security, video
analytics, AI, biometric control...
Advantages
 Greater security and control of all procedures
 Savings in personnel costs.
 Reduction in registration and authentication times for people and vehicles.
 Monetary valuation of the place where AC is installed.
 Real time record of vehicles, pedestrians and passengers.
 Cost saving
 Integrated departments can be more efficient and avoid security breaches.
 AC can improve hospitality.
 Adjust the amount of food for catering
 Facility management can close off areas that aren't being used to save on utility costs.
 Data privacy and update with HR integration
Disadvantages
 Pricey > specialized hardware, multiple control boxes, one control box may be
required for each entry.
 Location-specific > each control box is designed precisely for an area
 Requires a lot for installation > electrical power, specific wiring.
 Self-contained > integration with other systems and functions is challenging.
 Network dependent > network fails, disruptions, outage, backup data
 Prone to hacks > hackers > internet > door lock system
How to draw an ACS
 Identify the risks to be neutralized
 Analyze the risks in the context
 Different facilities: size, location, type of activity, flow of people and vehicles, etc.
 Control of the exterior perimeter and the interior areas.
 Open architecture (hardware/software) > work with possible third-party integrations
 Open hardware > allows design to evolve and adapt it to the future risks and needs of
an organization
 Access control: integrated, on premise, on cloud
 Reader types: keyboard, biometrics, multifactorial readers
10 biggest AC providers in Spain
2171
1599
439
412
298
291
263
176 168
Distribution
Madrid Barcelona Valencia Sevilla Murcia Málaga Alicante Zaragoza Pontevedra
AC Worldwide Demand
 Construction - building projects require access control systems
 Manufacturing - prevent theft of technological equipment
 Financial institutions - valuable monetary assets, safes and ATMS
 Hotels and Food/Beverage - digital systems for card-key access
 Law firms and government agencies - sensitive and confidential documents
 Healthcare facilities - medical records
AC World Growth
Some competitors and what they said
 EnTTia: the demand is mostly for services, it comes from factories, chemical industry,
special machinery, high risk materials. They predicted growth after covid.
 GeoVictoria: biometrics growth during the pandemics, went back to normal. The priority
was to identify the source of na outbreak and contact all co-workers from the same plant.
Biometrics avoided vírus spread for a while, but were replaced by digital panels due to
cost. Mines will also require AC because of legal issues related to accidents.
 2N: Spanish law (work shift control), mobile integration is a must
Trends for 2022
 Remote management
 Cloud-based system
 Integrations for smart automation
 Seamless mobile experiences
 Touchless technology
 Multi-factor authentication and biometrics
 Combining video and access control
 Leveraging analytics
 Smart buildings
 Converging IT, cybersecurity, and PACS
 Key takeaways
Madrid x Control Access
 Most of the demand comes from industrial polygons.
 Since the city is a magnet for tourism, hospitality, fairs and crowd events, an
indefinite increment on demand is expected.
 There are specific AC programs designed for “ocio” (leisure)
Madrid Map – Providers Distribution
Sell arguments
 Cyber-awareness and user-experience are driving new purchases
 Digitized systems increase productivity and convenience with smartphone-compatibility
 All-in-one hub systems > smart ecosystems
 Hank Monaco, VP with Johnson Control Building Solutions > cloud management > customers certainly like that
 Reduce the risk associated with a lost or stolen key
 Better safety and security
 Control of the occupation and spaces in parking areas > minimize risks of crowds
 Control the evacuation in case of emergencies
 Internet security threats to businesses have been rising
 The access control market grew from $7.5 billion in 2018 to $12.1 billion > crime rates globally, widespread technological advancements in
security systems and across all business technology, and the prevalence of cloud-based security systems as a trend.
 North America is expected to be the largest market for access control systems by 2024.
 Moving into the access control market > lucrative business opportunity in the coming years and beyond.
 Cost to adapt to biometrics is expected to decline, making it a potentially very profitable opportunity.
Investment Considerations
 AC investment does not refer only to the organization, it will be directly linked to the importance of its assets,
always observing the cost/benefit ratio.
 Effective access control policy > management of the whole security process, not just the use of technology.
 Analyze the security risks of the organization > define a control policy that meets your particular needs.
 The more an actor invests in preventive insurance, the less damage it will have in case of undesirable events.
 Understand investment not only as control technology, but also managing employers and service providers.
 Converge efforts where the organization's risk is concentrated.
 Research, development, sales and CPD must have access restricted to those who work, and a specific access
control system.
 The Technique of Defense in Depth > to be efficient, the access control must be addressed in the perimeter of
the installations: fence, wall.
Source
 https://www.360connect.com/supplier-blog/access-control-industry-trend/
 https://study.com/academy/lesson/access-control-types-implementation.html
 https://elblogdesecuritas.es/tecnologia/disenar-un-sistema-de-control-de-acceso/
 https://www.securityforward.com/what-are-the-advantages-and-disadvantages-of-physical-
access-control-in-security/
 https://www.openpath.com/blog-post/access-control-security-trends
 https://www.fortinet.com/resources/cyberglossary/access-control
 https://www.nedapsecurity.com/es/insight/que-es-el-control-de-acceso-y-por-que-es-
fundamental/
 https://www.accesor.com/soluciones/control-de-accesos/
 https://www.2n.com/es_ES/productos/control-de-accesso-ip

Mais conteúdo relacionado

Semelhante a Access Control Segment in Madrid 2022.pptx

INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
Christopher Nanchengwa
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile world
WTHS
 
Information Security
Information SecurityInformation Security
Information Security
steffiann88
 
Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control Plan
Angie Willis
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
cuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
salmonpybus
 
AssignmentWhen a traffic camera is installed in a designated .docx
AssignmentWhen a traffic camera is installed in a designated .docxAssignmentWhen a traffic camera is installed in a designated .docx
AssignmentWhen a traffic camera is installed in a designated .docx
normanibarber20063
 

Semelhante a Access Control Segment in Madrid 2022.pptx (20)

Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
Securing Smart Cities
Securing Smart CitiesSecuring Smart Cities
Securing Smart Cities
 
C018131821
C018131821C018131821
C018131821
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile world
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
 
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdf
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdfInnovative Surveillance_ The Rising Impact of Security Robot Services.pdf
Innovative Surveillance_ The Rising Impact of Security Robot Services.pdf
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
 
Information Security
Information SecurityInformation Security
Information Security
 
Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control Plan
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Can you trust your smart building
Can you trust your smart buildingCan you trust your smart building
Can you trust your smart building
 
security IDS
security IDSsecurity IDS
security IDS
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
AssignmentWhen a traffic camera is installed in a designated .docx
AssignmentWhen a traffic camera is installed in a designated .docxAssignmentWhen a traffic camera is installed in a designated .docx
AssignmentWhen a traffic camera is installed in a designated .docx
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Access Control Segment in Madrid 2022.pptx

  • 2. History  Tech developers for electronic security were incorporated into large companies in the field of electrical and electronic products.  Pelco (Clovis – California): high quality equipment for closed circuit television systems > acquired by Schneider Electric in 2007  General Electric (GE) > acquired Casi-Rusco and Infographics.  Bosch (2003) > wide range of self-developed products.  Opening of trade to the Asian market > acceptable quality and reduced cost  Import > Nationalization > Customization
  • 3. The first devices  Intercoms  Electromechanical lock  Biometrics
  • 4. Definition  Access Control is the part of security that, through the use of policies, procedures, devices, hardware and software, qualified methods of identification and blocking systems, seeks to control and manage the transit of people, objects and information, in a given physical or logical space.  Purpose: provide protection to facilities, areas, equipment, data, information, goods and people, by preventing unauthorized access to physical or logical environments.  Control: is a noun used to define the domain or power to supervise and administer a certain thing; to have control of the situation is to dominate or have power over what is happening.  Access: refers to the act of entering, transiting, knowing or consulting information, either locally or remotely, as well as the possibility of using the information assets of a body or entity.  Access control can be considered any action, mechanism or system used to restrict and manage access to a certain physical or logical environment.
  • 5. Main Objective  Protect physical and logical environments against unauthorized access;  Detect, intercept and contain unwanted access from: invaders, contraband, weapons, explosives, drugs, pirated products, viruses, etc.);  Manage access permissions;  Control and record entries and exits of people, objects and information;  Provide complete records of all accesses or attempts to access the organization's physical and logical environment;  Allow traceability of consented accesses.
  • 6. Safety x Security  Safety (the importance of prevention): always seeking to avoid the accident or at least minimize the damage and losses caused as much as possible, risks of an accidental nature are analyzed. Ex1: environmental hazards, environmental damage, to human health and life. Ex2: in the context of an enterprise, analysis of the reliability of systems, security equipment, early detection, etc. always.  Security (the focus on protection): the risks are usually derived from the actions of an opponent or deliberate attacker, such as sabotage, theft, break-in, vandalism or other explicit attacks. Threats in this case are deliberate and malicious incidents generated by people. Ex: surveillance professionals and electronic security, video analytics, AI, biometric control...
  • 7. Advantages  Greater security and control of all procedures  Savings in personnel costs.  Reduction in registration and authentication times for people and vehicles.  Monetary valuation of the place where AC is installed.  Real time record of vehicles, pedestrians and passengers.  Cost saving  Integrated departments can be more efficient and avoid security breaches.  AC can improve hospitality.  Adjust the amount of food for catering  Facility management can close off areas that aren't being used to save on utility costs.  Data privacy and update with HR integration
  • 8. Disadvantages  Pricey > specialized hardware, multiple control boxes, one control box may be required for each entry.  Location-specific > each control box is designed precisely for an area  Requires a lot for installation > electrical power, specific wiring.  Self-contained > integration with other systems and functions is challenging.  Network dependent > network fails, disruptions, outage, backup data  Prone to hacks > hackers > internet > door lock system
  • 9. How to draw an ACS  Identify the risks to be neutralized  Analyze the risks in the context  Different facilities: size, location, type of activity, flow of people and vehicles, etc.  Control of the exterior perimeter and the interior areas.  Open architecture (hardware/software) > work with possible third-party integrations  Open hardware > allows design to evolve and adapt it to the future risks and needs of an organization  Access control: integrated, on premise, on cloud  Reader types: keyboard, biometrics, multifactorial readers
  • 10. 10 biggest AC providers in Spain 2171 1599 439 412 298 291 263 176 168 Distribution Madrid Barcelona Valencia Sevilla Murcia Málaga Alicante Zaragoza Pontevedra
  • 11. AC Worldwide Demand  Construction - building projects require access control systems  Manufacturing - prevent theft of technological equipment  Financial institutions - valuable monetary assets, safes and ATMS  Hotels and Food/Beverage - digital systems for card-key access  Law firms and government agencies - sensitive and confidential documents  Healthcare facilities - medical records
  • 13. Some competitors and what they said  EnTTia: the demand is mostly for services, it comes from factories, chemical industry, special machinery, high risk materials. They predicted growth after covid.  GeoVictoria: biometrics growth during the pandemics, went back to normal. The priority was to identify the source of na outbreak and contact all co-workers from the same plant. Biometrics avoided vírus spread for a while, but were replaced by digital panels due to cost. Mines will also require AC because of legal issues related to accidents.  2N: Spanish law (work shift control), mobile integration is a must
  • 14. Trends for 2022  Remote management  Cloud-based system  Integrations for smart automation  Seamless mobile experiences  Touchless technology  Multi-factor authentication and biometrics  Combining video and access control  Leveraging analytics  Smart buildings  Converging IT, cybersecurity, and PACS  Key takeaways
  • 15. Madrid x Control Access  Most of the demand comes from industrial polygons.  Since the city is a magnet for tourism, hospitality, fairs and crowd events, an indefinite increment on demand is expected.  There are specific AC programs designed for “ocio” (leisure)
  • 16. Madrid Map – Providers Distribution
  • 17. Sell arguments  Cyber-awareness and user-experience are driving new purchases  Digitized systems increase productivity and convenience with smartphone-compatibility  All-in-one hub systems > smart ecosystems  Hank Monaco, VP with Johnson Control Building Solutions > cloud management > customers certainly like that  Reduce the risk associated with a lost or stolen key  Better safety and security  Control of the occupation and spaces in parking areas > minimize risks of crowds  Control the evacuation in case of emergencies  Internet security threats to businesses have been rising  The access control market grew from $7.5 billion in 2018 to $12.1 billion > crime rates globally, widespread technological advancements in security systems and across all business technology, and the prevalence of cloud-based security systems as a trend.  North America is expected to be the largest market for access control systems by 2024.  Moving into the access control market > lucrative business opportunity in the coming years and beyond.  Cost to adapt to biometrics is expected to decline, making it a potentially very profitable opportunity.
  • 18. Investment Considerations  AC investment does not refer only to the organization, it will be directly linked to the importance of its assets, always observing the cost/benefit ratio.  Effective access control policy > management of the whole security process, not just the use of technology.  Analyze the security risks of the organization > define a control policy that meets your particular needs.  The more an actor invests in preventive insurance, the less damage it will have in case of undesirable events.  Understand investment not only as control technology, but also managing employers and service providers.  Converge efforts where the organization's risk is concentrated.  Research, development, sales and CPD must have access restricted to those who work, and a specific access control system.  The Technique of Defense in Depth > to be efficient, the access control must be addressed in the perimeter of the installations: fence, wall.
  • 19. Source  https://www.360connect.com/supplier-blog/access-control-industry-trend/  https://study.com/academy/lesson/access-control-types-implementation.html  https://elblogdesecuritas.es/tecnologia/disenar-un-sistema-de-control-de-acceso/  https://www.securityforward.com/what-are-the-advantages-and-disadvantages-of-physical- access-control-in-security/  https://www.openpath.com/blog-post/access-control-security-trends  https://www.fortinet.com/resources/cyberglossary/access-control  https://www.nedapsecurity.com/es/insight/que-es-el-control-de-acceso-y-por-que-es- fundamental/  https://www.accesor.com/soluciones/control-de-accesos/  https://www.2n.com/es_ES/productos/control-de-accesso-ip