Combining virtual technologies to conquer the physical access world

Dec. 4, 2015
Leveraging multiple layers of security technology provides numerous benefits

For a large organization, it can be very difficult to track intruders with only a proximity card or smart card system in place. Choosing the right security system is an important decision, and there are a number of factors that organizations need to consider before picking the right solution. These factors include, but are not limited to, the specific entry points into a building, the layout of the entrance, the reason for controlling access to it, and the flexibility of a given budget.

Many businesses today are still working with security systems that are too slow, with regards to both cyber and physical security. Crimes like data and information transfer, terrorist activities, employee proxy, and tailgating are still difficult for companies to prevent. Even though technology has provided the industry with solutions like biometrics and RFID analysis, these technologies are still too costly for most enterprises, and even when a company can afford them, they are still unable to provide effective, real-time security breach alerts.

Currently most companies use sensor, controller, or configurable chip-based solutions, but again, these solutions are still not able to act as quickly as is needed. Security breaches can cost a lot of money and cause a company to lose credibility if they go unnoticed until it’s too late. Additionally, the RFID and biometric access systems that companies implement to track employees are not competent by themselves.

Another issue with only implementing RFID access systems or a biometric attendance system is that while they do record people’s attendance, the enforcement goal of these systems is to ensure that only the right people get access to a specific place. Unfortunately, however, it’s not very difficult for people to get inside a restricted area by simply tailgating – someone who does not have building access following in an employee who has access – or for employees to use biometric/RFID attendance to “swipe in”, but in actuality not attend or work in-office. So what can organizations do to solve this problem?

According to experts, the key to solving this problem is to incorporate multiple levels of security techniques into one security system. There are a variety of video analytics solutions options that can be put in place including door-open/close detection, advanced human detection, trajectory analysis, facial recognition, and suspicious movement tracking with varying lighting conditions. By incorporating intelligent analytics solutions that are able to get even more out of existing CCTV cameras in organizations, businesses can increase the validity and the amount of real-time alerts surrounding a proxy or tailgating incident, or any other abnormal behavior of employees. These video and data analytics solutions, in correlation with employee swipe information, can be used to derive conclusions on a given physical security breach.  From there, correlations on the data delivered by these solutions, provides organizations with real-time prediction of security breaches.

For example, if a company was to implement a human detection algorithm and combine data from CCTV cameras, it would help the organization’s security team accurately determine whether someone is tailgating and trying to “piggy back” off of an employee. Then, once an intruder is identified, the security team can take action and stop the breach in a timely manner.

Providing this additional level of security to help detect and track tailgating and  proxy incidents along with an organization’s base level surveillance camera and computer vision technologies vastly improves a given security system. Detected breaches should be able to be reported to security teams in real time in order to effectively stop the breach. Intelligent analytics, when performed on the swipe database within the organization, help predict and detect a potential breach, and allow organizations to implement preventative measures.