From the editor's desk: Securing your secure access

SMART Access & Identity 2024 News & Events


Andrew Seldon, Editor.

Welcome to SMART Security Solutions’ first print publication of the year, the SMART Access & Identity Handbook 2024. In this issue, we cover various issues relevant to this industry, from digital to physical access and convergence between the two – although this convergence is happening at a snail’s pace.

As slow as it may be, more people realise the capabilities of using traditional access control for more than just opening a door. Some ascribe this move to the greater involvement of IT people in the access control and physical security markets, which is a reality. However, some blame business leaders and bean counters who always want more from what they have for less.

There is also growing momentum toward securing access and identity applications (physical or digital) as part of the general trend of cybersecurity paranoia – justified paranoia. Part of this trend is adopting standards, lacking in the access control industry where proprietary solutions have and are standard. In our round table discussion, Walter Rautenbach highlighted that the adoption of mobile access control (using mobile credentials), while happening, is hampered by a lack of standards – in most cases, you accept lock-in to the company providing the mobile access solutions.

However, as mentioned, standards are viewed as something other than critical in access. I discovered this may change as there is a new standard in the works from Europe – NIS 2. While this is a cybersecurity and not specifically an access control standard, it impacts access control installations. Initially, it applies to Europe, but the influence will spread. Sadly, I found out about it too late to write about it for the handbook, but look out for an article in our new Editor’s Choice email news brief in the near future.

I learned about NIS 2 when I learned about SPAC (courtesy of STid). The Smart Physical Access Control (SPAC) is an alliance or organisation, again born in Europe, designed to “federate Europe” and is worth having a look at https://en.sp-ac.org/. There is a download link to a NIS 2 guide on the site. There will also be an article coming up on the SSCP standard, which seems to be an even more secure and valuable protocol than OSDP – not that OSDP has been adopted everywhere.

We also include an HID article (shortened) about the NIST facial recognition test and what it means in simple terms. It is an interesting read for those making decisions about which facial biometric they should choose – or, I should say, those who do not make decisions based on who offers the cheapest reader.

I hope the handbook is of interest to readers. If you have any comments or criticisms, please feel free to let me know at [email protected].


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
From the editor's desk: AI and events
Technews Publishing News & Events
      Welcome to the 2024 edition of the SMART Surveillance Handbook. Reading through this issue will demonstrate that AI has undoubtedly made its mark on the surveillance industry. Like ‘traditional’ video ...

Read more...
Forbatt SA to distribute and support Tiandy in South Africa
Forbatt SA News & Events
The big news in this year’s SMART Surveillance Handbook is that Forbatt SA has signed a new distribution agreement with Tiandy Technologies. This brand has had limited exposure and support in South Africa in the past, but has posted significant growth internationally.

Read more...
The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Read more...
Surveillance on the edge
Axis Communications SA Guardian Eye Technews Publishing Surveillance
Edge processing, a practical solution that has been available for some time, has proven its utility in various scenarios, tailored to the unique requirements of each user.

Read more...
AI developments in surveillance
DeepAlert Secutel Technologies Technews Publishing Surveillance
When AI-powered video analytics first emerged in the surveillance market, it was heralded as a game-changer, promising near-magical object recognition and identification. As always, it was oversold, but times have changed and we are close to seeing the ‘magic’ at work.

Read more...
Putting cyber into surveillance
Dallmeier Electronic Southern Africa Cathexis Technologies Technews Publishing Editor's Choice
Cybersecurity has become an essential part of the physical security industry. However, unlike other IoT technologies, of which security products are a part, surveillance technologies have more to protect.

Read more...
Introducing the SecuShot Bullseye Robotic Guard MK2
Secutel Technologies News & Events Surveillance
The SecuShot Bullseye Robotic Guard MK2 is a marvel of modern engineering. It integrates CCTV monitoring, remote-controlled PTZ capabilities, and a gas-powered marker into a single, compact unit.

Read more...
Gallagher Security’s Integrate Roadshow
Gallagher News & Events
Gallagher Security recently teamed up with nine technology partners to showcase the latest integrated security capabilities at the Integrate Roadshow in Durban, bringing together about 60 attendees, including end users, channel partners, consultants, and other industry professionals.

Read more...
Ransomware impersonates employees and self-spreads
News & Events
Following a recent incident, the Kaspersky Global Emergency Response team is shedding light on an attack where adversaries crafted their own variant of encryption malware equipped with self-propagation capabilities.

Read more...