This document discusses access control systems. It begins with a history of major companies in the access control field and the development of early access control devices like intercoms and electromechanical locks. It then defines access control and outlines its main objectives to protect physical and logical environments from unauthorized access. The document discusses trends in the access control industry, including growth in cloud-based systems, mobile integration, and biometrics. It also maps the distribution of access control providers in Spain and considers factors influencing access control investment decisions.
2. History
Tech developers for electronic security were incorporated into large companies in
the field of electrical and electronic products.
Pelco (Clovis – California): high quality equipment for closed circuit television
systems > acquired by Schneider Electric in 2007
General Electric (GE) > acquired Casi-Rusco and Infographics.
Bosch (2003) > wide range of self-developed products.
Opening of trade to the Asian market > acceptable quality and reduced cost
Import > Nationalization > Customization
4. Definition
Access Control is the part of security that, through the use of policies, procedures, devices,
hardware and software, qualified methods of identification and blocking systems, seeks to control
and manage the transit of people, objects and information, in a given physical or logical space.
Purpose: provide protection to facilities, areas, equipment, data, information, goods and people,
by preventing unauthorized access to physical or logical environments.
Control: is a noun used to define the domain or power to supervise and administer a certain
thing; to have control of the situation is to dominate or have power over what is happening.
Access: refers to the act of entering, transiting, knowing or consulting information, either locally or
remotely, as well as the possibility of using the information assets of a body or entity.
Access control can be considered any action, mechanism or system used to restrict and manage
access to a certain physical or logical environment.
5. Main Objective
Protect physical and logical environments against unauthorized access;
Detect, intercept and contain unwanted access from: invaders, contraband,
weapons, explosives, drugs, pirated products, viruses, etc.);
Manage access permissions;
Control and record entries and exits of people, objects and information;
Provide complete records of all accesses or attempts to access the organization's
physical and logical environment;
Allow traceability of consented accesses.
6. Safety x Security
Safety (the importance of prevention): always seeking to avoid the accident or
at least minimize the damage and losses caused as much as possible, risks of an
accidental nature are analyzed. Ex1: environmental hazards, environmental
damage, to human health and life. Ex2: in the context of an enterprise, analysis of
the reliability of systems, security equipment, early detection, etc. always.
Security (the focus on protection): the risks are usually derived from the actions
of an opponent or deliberate attacker, such as sabotage, theft, break-in, vandalism
or other explicit attacks. Threats in this case are deliberate and malicious incidents
generated by people. Ex: surveillance professionals and electronic security, video
analytics, AI, biometric control...
7. Advantages
Greater security and control of all procedures
Savings in personnel costs.
Reduction in registration and authentication times for people and vehicles.
Monetary valuation of the place where AC is installed.
Real time record of vehicles, pedestrians and passengers.
Cost saving
Integrated departments can be more efficient and avoid security breaches.
AC can improve hospitality.
Adjust the amount of food for catering
Facility management can close off areas that aren't being used to save on utility costs.
Data privacy and update with HR integration
8. Disadvantages
Pricey > specialized hardware, multiple control boxes, one control box may be
required for each entry.
Location-specific > each control box is designed precisely for an area
Requires a lot for installation > electrical power, specific wiring.
Self-contained > integration with other systems and functions is challenging.
Network dependent > network fails, disruptions, outage, backup data
Prone to hacks > hackers > internet > door lock system
9. How to draw an ACS
Identify the risks to be neutralized
Analyze the risks in the context
Different facilities: size, location, type of activity, flow of people and vehicles, etc.
Control of the exterior perimeter and the interior areas.
Open architecture (hardware/software) > work with possible third-party integrations
Open hardware > allows design to evolve and adapt it to the future risks and needs of
an organization
Access control: integrated, on premise, on cloud
Reader types: keyboard, biometrics, multifactorial readers
10. 10 biggest AC providers in Spain
2171
1599
439
412
298
291
263
176 168
Distribution
Madrid Barcelona Valencia Sevilla Murcia Málaga Alicante Zaragoza Pontevedra
11. AC Worldwide Demand
Construction - building projects require access control systems
Manufacturing - prevent theft of technological equipment
Financial institutions - valuable monetary assets, safes and ATMS
Hotels and Food/Beverage - digital systems for card-key access
Law firms and government agencies - sensitive and confidential documents
Healthcare facilities - medical records
13. Some competitors and what they said
EnTTia: the demand is mostly for services, it comes from factories, chemical industry,
special machinery, high risk materials. They predicted growth after covid.
GeoVictoria: biometrics growth during the pandemics, went back to normal. The priority
was to identify the source of na outbreak and contact all co-workers from the same plant.
Biometrics avoided vírus spread for a while, but were replaced by digital panels due to
cost. Mines will also require AC because of legal issues related to accidents.
2N: Spanish law (work shift control), mobile integration is a must
14. Trends for 2022
Remote management
Cloud-based system
Integrations for smart automation
Seamless mobile experiences
Touchless technology
Multi-factor authentication and biometrics
Combining video and access control
Leveraging analytics
Smart buildings
Converging IT, cybersecurity, and PACS
Key takeaways
15. Madrid x Control Access
Most of the demand comes from industrial polygons.
Since the city is a magnet for tourism, hospitality, fairs and crowd events, an
indefinite increment on demand is expected.
There are specific AC programs designed for “ocio” (leisure)
17. Sell arguments
Cyber-awareness and user-experience are driving new purchases
Digitized systems increase productivity and convenience with smartphone-compatibility
All-in-one hub systems > smart ecosystems
Hank Monaco, VP with Johnson Control Building Solutions > cloud management > customers certainly like that
Reduce the risk associated with a lost or stolen key
Better safety and security
Control of the occupation and spaces in parking areas > minimize risks of crowds
Control the evacuation in case of emergencies
Internet security threats to businesses have been rising
The access control market grew from $7.5 billion in 2018 to $12.1 billion > crime rates globally, widespread technological advancements in
security systems and across all business technology, and the prevalence of cloud-based security systems as a trend.
North America is expected to be the largest market for access control systems by 2024.
Moving into the access control market > lucrative business opportunity in the coming years and beyond.
Cost to adapt to biometrics is expected to decline, making it a potentially very profitable opportunity.
18. Investment Considerations
AC investment does not refer only to the organization, it will be directly linked to the importance of its assets,
always observing the cost/benefit ratio.
Effective access control policy > management of the whole security process, not just the use of technology.
Analyze the security risks of the organization > define a control policy that meets your particular needs.
The more an actor invests in preventive insurance, the less damage it will have in case of undesirable events.
Understand investment not only as control technology, but also managing employers and service providers.
Converge efforts where the organization's risk is concentrated.
Research, development, sales and CPD must have access restricted to those who work, and a specific access
control system.
The Technique of Defense in Depth > to be efficient, the access control must be addressed in the perimeter of
the installations: fence, wall.